Search related to

WordPress error This site ahead contains harmful programs

This article will guide you on how to tackle this site ahead contains harmful programs error in #WordPress. 

To remove the #deceptive #site notice, you'll have to first remove the malware on your site. 

Then, submit a review request at Google Search Console to delete the notice. In 1-3 days, Google will update the status and remove the deceptive site warning.

You can check Google's Transparency Report to see if a website is blacklisted due to a Copyright or DMCA claim. 

You can also use Google's #Safe #Browsing Site Status tool.

To fix website that is NOT safe for browsing:

1. Scan your own computer with antivirus and malware detection software and remove all threats.

2. Change passwords to your hosting account (cPanel , plesk, webmin etc.)

3. Change FTP passwords.

4. Verify that your website is infected and remove malicious code.

Read More



WordPress Upload Failed to Write File to Disk error

This article will guide you on how to resolve 'Upload: Failed to Write File to Disk' Error in WordPress. 

The Upload: Failed to Write File to #Disk WordPress error can occur due to a number of reasons. 

The most typical cause of the error is incorrect folder permissions. 

But besides incorrect permissions, this error can also ocurr due to your website exceeding the quota limit of the hosting service.

To fix this #WordPress #error:

1. Try changing the permissions on the wp-content directory to 766. 

2. If you still have problems, try 767, 775 or 777. 

3. Once your uploads are working, change the permissions on wp-content back to 755 again and check that everything still works OK.

Read More



IMAP server wants to alert you to the following error

This article will guide you the different causes for the error 'your IMAP server wants to alert you to the following'.

IMAP #Error code #0x800cccdd appears alongside the message "Your IMAP server closed the connection", which signifies that the "Send/Receive" feature—a setting that retrieves your #Outlook mail whenever connected to the Internet in order to keep your mail synced—has failed.

The error message "Your account temporarily blocked for #IMAP use. This may be happen if you exceed the maximum number of simultaneous IMAP connections allowed. Kindly try after some time" occurs when the mail client or different mail clients are trying to establish too many connections to IMAP server.

A server connection timeout means that a server is taking too long to reply to a data request made from another device. Timeouts are not a reply message: they show up when there isn't a reply and a server request is not fulfilled in a predetermined length of time.

To fix the mail server is not responding:

1. Check your internet connection.

2. Check your #SMTP server details.

3. Verify all usernames and passwords.

4. Check your SMTP server connection.

5. Change your SMTP port.

6. Control your #antivirus or #firewall settings.

Read More



ACK flood DDoS attack

This article will guide you on methods to prevent ACK flood #DDoS #attack. An ACK flood DDoS attack occurs when an attacker attempts to overload a server with TCP ACK packets. 

Client requests connection by sending #SYN (synchronize) message to the server. Server acknowledges by sending SYN-ACK (synchronize-acknowledge) message back to the client. Client responds with an #ACK (acknowledge) message, and the connection is established.

When computers communicate via TCP, received packets are acknowledged by sending back a packet with an ACK bit set. 

The TCP protocol allows these acknowledgements to be included with data that is sent in the opposite direction. 

Some protocols send a single acknowledgement per packet of information.

To stop a SYN #DDoS attack:

1. Filtering.

2. Increasing Backlog.

3. TCP half-open: The term half-open alludes to TCP associations whose state is out of synchronization between the two potentially because of an accident on one side.

4. Firewalls and Proxies.

5. Reducing SYN-RECEIVED Timer.

6. SYN Cache.

7. Recycling the Oldest Half-Open TCP.

Read More



Perfmon counters for Disk Usage

This article will guide you on use performance counters (#Perfmon) to identify SQL server disk bottlenecks. 

The performance impact is negligible in updating. Microsoft's intent is that you always write to the performance counters. It's the monitoring of (or capturing of) those performance counters that will cause a degradation of performance. So, only when you use something like perfmon to capture the data.

Reliability #Monitor shows you your system stability history at a glance and lets you see details on a day-by-day basis about events that impact reliability. Reliability Monitor provides a quick view of how stability the system has been.

1. The Performance Monitor is primarily for viewing real time #statistics. 

2. By default only one counter is selected; the %Processor Time counter. However you can add additional counters by clicking on the green plus sign. 

3. This will allow you to monitor any counters you wish in real time.

4. Difference Between Performance Monitor and #Resource Monitor is that a performance monitor is a program that assesses and reports information about various computer resources and devices. 

5. While Resource Monitor is a tool by which you can monitor the usage of your CPU.

Read More



OpenLDAP and phpLDAPadmin on Linux

This article will guide you on how to install #OpenLDAP and phpLDAPadmin on #Ubuntu. Also, we covered the prospective error affacting OpenLDAP and phpLDAPadmin and its solution as well.

#LDAP (Lightweight Directory Access Protocol) is an open and cross platform protocol used for directory services authentication. LDAP provides the communication language that applications use to communicate with other directory services servers.

#Kerberos is used to manage credentials securely (authentication) while LDAP is used for holding authoritative information about the accounts, such as what they're allowed to access (authorization), the user's full name and uid.

To access #phpLDAPadmin:

Point your browser to http://IP_OF_SERVER/phpldapadmin (IP_OF_SERVER is the actual IP address of your LDAP server). 

From the main window, click the login button in the left pane. 

When prompted, you will log into your DN and enter the password for the admin user created during the slapd reconfiguration.

Read More



FFmpeg on CentOS

This article will guide you on how to install FFMPEG on #CentOS and fix its related #errors. FFmpeg is a powerful tool that can do almost anything with #multimedia files.

FFmpeg is a standard package on many #linux systems. 

You can check if it is installed with a #command like dpkg -s ffmpeg . 

If it is not installed, you should be able to install with your system's package manager. i.e. sudo apt-get install ffmpeg or search 'ffmpeg' in the Software Center on Ubuntu.

To run #FFmpeg in #Linux:

1. Start by updating the packages list: sudo apt update.

2. Next, install FFmpeg by typing the following command: sudo apt install ffmpeg.

3. To validate that the package is installed properly use the ffmpeg -version command which prints the FFmpeg version: ffmpeg -version. 

Read More



NTP amplification attack

This article will guide you on steps to mitigate this #NTP amplification attack. An Amplification Attack is any attack where an attacker is able to use an amplification factor to multiply its power. Examples of #amplification #attacks include Smurf Attacks (ICMP amplification), Fraggle Attacks (#UDP amplification), and DNS Amplification.

DNS flood is a type of Distributed Denial of Service (#DDoS) attack in which the attacker targets one or more Domain Name System (#DNS) servers belonging to a given zone, attempting to hamper resolution of resource records of that zone and its sub-zones.

To harden your DNS server:

1. Audit your DNS zones. First things first.

2. Keep your DNS servers up-to-date.

3. Hide BIND version.

4. Restrict Zone Transfers.

5. Disable DNS recursion to prevent DNS poisoning attacks.

6. Use isolated DNS servers.

7. Use a DDOS mitigation provider.

8. Two-Factor Authentication.

Read More



Setup OpenVPN on Windows Server

This article will guide you on how to setup OpenVPN on windows.

OpenVPN is a virtual private #network (#VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. 

To Configure OpenVPN client as service on Windows:

1. Editing your OpenVPN client configuration.

2. Storing your PrivateVPN.com credentials in a file.

3. Import edited .ovpn file and user.auth file to OpenVPN #config folder.

4. Configuring OpenVPN service to start automatically on boot.

To connect to OpenVPN from Windows Server:

i. Navigate to your #OpenVPN Access Server client web interface.

ii. Login with your credentials.

iii. Select 'OpenVPN Connect for #Windows'.

iv. Wait until the download completes, and then open it (specifics vary depending on your browser).

Read More



Perfmon Counters for memory usage

This article will guide you on how to use Perfmon Counters for memory usage. You will also learn some commonly used performance counters which can be used to identify #SQL server memory pressure.

To detect a memory leak using #Performance #Monitor, monitor these counters: The Memory/Available Bytes counter lets you view the total number of bytes of available memory. This value normally fluctuates, but if you have an application with the memory leak, it will decrease over time.

A system performance report is a part of Performance Monitor that details the status of local hardware resources, system response times, and processes on the local computer. You can use this information to identify possible causes of performance issues.

SQL performance tuning consists of making queries of a relation database run as fast as possible. 

To Check Detailed #Memory #Usage with Performance Monitor:

1. To open up Performance Monitor type: perfmon into the Run window (Windows Key + R). 

2. In the window that comes up, click the Performance Monitor under Monitoring Tools in the left pane. 

Read More



Reporting services configuration manager

This article will guide you on how to setup reporting services configuration manager. Report Manager is Web based interface that can be used to perform different tasks such as. Administer the Report Server,View the Reports and Manager the Report, and so on. You need to have the URL to access the Report Server by using Report Manager interface.

SQL Server Reporting Services (#SSRS) is a reporting #software that allows you to produce formatted reports with tables in the form of data, #graph, images, and charts. These reports are hosted on a server that can be executed any time using parameters defined by the users.

Report server items are always stored in libraries or in a folder within a library. 

When you access the SharePoint site, you see the Browse page and the Library Tools tab.

In #Reporting Services, URLs are used to access the Report Server Web service and the web portal. A test link of the URL appears on page when you define the URL so that you can immediately confirm that the settings you specified result in a valid connection.

To connect to Reporting Services Configuration Manager:

1. Click Start, then click #Programs, then click #Microsoft #SQL Server, then click Configuration Tools, and then click Report Server Configuration Manager. 

2. The Report Server Installation Instance Selection dialog box appears so that you can select the report server instance you want to configure.

Read More



WordPress Error Too Many Redirects Issue

This article will guide you on how to resolve “error too many #redirects issue” in #WordPress.

There are no limits in using 301 redirects on a site. You can implement multiple number of 301 redirects without getting any penalty. 

But Too many 301 redirects put unnecessary load on the server and reduce speed. 

Try to reduce direct redirects by using rules.

To fix WordPress #301 Moved Permanently:

i. Change the #HTTPS response code to 200 if you don't want the URL to redirect.

ii. If the URL is supposed to redirect, then remove the loop and fix the final destination URL.

Read More



WordPress 403 Forbidden Error

This article will guide you on different methods to fix the 403 #forbidden error in WordPress.

The 403 Forbidden #error means that your server is working, but you no longer have permission to view all or some of your site for some reason.

The two most likely causes of this error are issues with your WordPress site's file permissions or .htaccess file. 

Also, some plugin issues might also cause the #403 Forbidden error.

To Fix 403 Forbidden WordPress Error:

1. Create a Backup. Most of the time, you are not responsible for the errors that occur on your WordPress website hosting server.

2. Check . htaccess File.

3. Deactivate All Plugins. Login to your WordPress admin dashboard and navigate to #Plugins - Installed Plugins.

Read More



WordPress RSS Feed Errors

This article will guide you on different methods to fix WordPress RSS feed #errors on your #site. You will also see the causes those errors and how to avoid them in the future.

A feed is a function of special #software that allows feedreaders to access a site, automatically looking for new content and then posting the information about new content and updates to another site. 

This provides a way for users to keep up with the latest and hottest information posted on different blogging sites.

To enable an #RSS feed in #WordPress:

1. Log in to your WordPress admin area and go to Widgets in the Appearance section.

2. Click on Add next to the RSS widget.

3. In the Current Widgets section on the right, click on Edit for the RSS widget.

4. Type the RSS feed URL, its title (optional) and check what item details to display (optional).

Read More



WordPress Error Briefly Unavailable for Scheduled Maintenance

This article will guide you on how to #fix 'Briefly unavailable for scheduled maintenance' #error in WordPress. 

To take your site out of #maintenance mode and get rid of the “Briefly unavailable for scheduled maintenance. Check back in a minute” message, all you need to do is delete that . maintenance file.

There are many reasons a site might not load such as a misconfiguration, corrupt files, problems with a database or something as simple as needing to clear your browser's cache and cookies on your computer.

To place your #WordPress Website down for maintenance:

1. First, you need to select the status. You can select 'Enable Coming Soon Mode' or 'Enable Maintenance Mode'. 

2. You can also select redirect mode which allows you to simply redirect your users to some other website. 

3. After choosing maintenance or coming soon mode, click on the 'Save all changes' button.

Read More



MySQL error log cPanel

This article will guide you on more information about MySQL error logs and methods to resolve its errors. 

You will learn how to fix MySQL errors, crashes and other unexpected behavior from #MySQL. 

To view mysql error logs:

1. edit /etc/my.cnf [mysqld] log=/tmp/mysql.log.

2. restart the computer or the mysqld service service mysqld restart.

3. open phpmyadmin/any application that uses mysql/mysql console and run a query.

4. cat /tmp/mysql.log ( you should see the query ).

To Clear cPanel Error Log:

1. Login to your server using an #SSH client.

2. To clear the #Apache #errors, type the following and press Enter. cat /dev/null> /usr/local/apache/logs/error_log.

3. To delete PHP error_log files, type the following and press Enter. find /home -type f -name error_log -delete.

Read More



Enable FirewallD logging for denied packets on Linux

This article will guide you on how to enable #FirewallD logging for denied packets on #Linux. It is an important task to keep an eye on the rejected and dropped packets using FirewallD for #Linux system administrators. 

To enable logging option you need to use #LOG iptables/kernel module. It turn on kernel logging of matching packets. When this option is set for a rule, the Linux kernel will print some information on all matching packets (like most IP header fields) via the kernel log.

To log a dropped packet in iptables:

1. iptables -N LOGGING: Create a new chain called LOGGING.

2. iptables -A INPUT -j LOGGING: All the remaining incoming packets will jump to the LOGGING chain.

3. line#3: Log the incoming packets to syslog (/var/log/messages).

To  restart iptables:

i. To start firewall from a shell enter: # chkconfig iptables on. # service iptables start.

ii. To stop firewall, enter: # service iptables stop.

iii. To restart #firewall, enter: # service iptables restart.

Read More



Memcached DDOS attack

This article will guide you on methods to mitigate Memcached DDOS attacks which occur mostly by accident. To mitigate this attack, you can Disable #UDP, #Firewall #Memcached servers, and so on.

 DoS attack is a denial of service attack where a computer is used to flood a server with TCP and UDP packets. A DDoS attack is where multiple systems target a single system with a DoS attack. The targeted network is then bombarded with packets from multiple locations.

DDoS attacks are illegal under the Computer Fraud and Abuse Act. Starting a DDoS attack against a network without permission is going to cost you up to 10 years in prison and up to a $500,000 fine.

There are three essential security measures that all small businesses should take to protect themselves from #DDoS #attacks: Use a web application firewall (#WAF): The absolute best way to prevent a DDoS attack is through the use of a WAF that blocks bad traffic and prevents DDoS attacks from accessing your web server.

A Denial-of-Service (#DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Different DDoS attack method:

1. UDP flood.

2. ICMP (Ping) flood.

3. SYN flood.

4. Ping of Death.

5. Slowloris.

6. NTP Amplification.

7. HTTP flood.

Read More



Node js Application with Docker on Ubuntu

This article will guide you on how to build a Node.js Application with Docker on Ubuntu. npm install downloads a package and it's dependencies. #npm install can be run with or without arguments. When run without arguments, npm install downloads dependencies defined in a package. json file and generates a node_modules folder with the installed modules.

The #docker build command builds Docker images from a Dockerfile and a “context”. 

A build's context is the set of files located in the specified PATH or URL . The build process can refer to any of the files in the context. 

With Dockerfile written, you can build the image using the following command: $ docker build .

Containerizing an #application is the process of making it able to run and deploy under Docker containers and similar technologies that encapsulate an application with its operating system environment (a full system image).

Some Docker #commands:

1. docker run – Runs a command in a new container.

2. docker start – Starts one or more stopped containers.

3. docker stop – Stops one or more running containers.

4. docker build – Builds an image form a Docker file.

5. docker pull – Pulls an image or a repository from a #registry.

Read More



Install SQL Server 2019 on Linux

This article will guide you the process to install #MSSQL Server 2019 on #CentOS 7 and Ubuntu 16.04.

SQL Server 2019 #Developer is a full-featured free edition, licensed for use as a development and test database in a non-production environment.

SQL Server 2019 allows us to integrate data from structured and unstructured data sources. 

We can now process diverse big data and relational data sources using Transact-SQL from SQL Server using PolyBase. 

We can see below PolyBase support external databases.

SQL Server Express can be used in production (beware of the limitations, like the 10GB cap), but according to this link Express is available for Linux. SQL Server Express is available to use in Production.

Starting with SQL Server 2017, SQL Server runs on Linux. It's the same SQL Server database engine, with many similar features and services regardless of your operating system. It's the same SQL Server database engine, with many similar features and services regardless of your operating system.

To run a SQL script in #Linux terminal:

1. Open Terminal and type mysql -u to Open the MySQL command line.

2. Type the path of your #mysql bin directory and press Enter.

3. Paste your #SQL file inside the bin folder of mysql server.

4. Create a #database in MySQL.

5. Use that particular database where you want to import the SQL file.

Read More



Install WireShark CentOS

This article will guide you on how to install WireShark on #CentOS. WireShark is one of the leading #network analyzing tools. It helps in troubleshooting the traffic problems of a server and malicious activity. 

Wireshark is an open-source, free network packet analyzer, used to capture and analyze network traffic in real-time.

Basically, with Wireshark you can capture and view data traveling through your network.

You can install WireShark with yum install wireshark-gnome . 

After you install it, the Wireshark application will be at /usr/sbin/wireshark .

To install #wireshark on RHEL 8 / CentOS 8 Linux step by step instructions:

1. Install package called Whireshark using the dnf command. For a GUI Wireshark application execute: # dnf install wireshark To install Wireshark command line tool only execute: # dnf install wireshark-cli.

2. Launch Wireshark.

To install Wireshark from #terminal:

Open terminal and type the #commands:

i. sudo apt-get install wireshark.

ii. sudo dpkg-reconfigure wireshark-common.

iii. sudo adduser $USER wireshark.

iv. wireshark.

Read More



Prestashop 404 error on homepage

This article will guide you on how to resolve Prestashop 404 error on homepage which mainly occurs due to many reasons which include bad permissions, memory limit, a problem with .htaccess file, and many more. 

The HTTP error 404, or more commonly called "404 error", means that the page you are trying to open could not be found on the server.

This is a client-side incident which means either the page has been deleted or moved, and the URL has not been modified accordingly, or that you have misspelled the URL.

In other words, this means that there is no web page corresponding to the entered URL.

To resolve a #Prestashop HTTP 404 error:

1. The first thing to do is to refresh the page. Press F5 to refresh the URL.

An error may have occurred if the page wasn't loaded correctly.

2. Clear the browser cache and delete cookies. If you are able to connect to the site via another device such as your mobile phone, clearing the cache and clearing cookies should easily solve the problem.

3. Check the #URL and make sure it is spelled correctly.

Check spelling, hyphens, page extension, etc.

4. Remove malware: some malware can cause a 404 error to occur. It is imperative to make sure that your computer is protected and that it does not contain viruses.

5. Contact the site owner to report the 404 error. If you are the website owner, contact your web host and request further information.

Read More



Drupal Ajax error 500

This article will guide you on steps to resolve drupal #ajax error 500 which occurs due to various reasons like insufficient memory, bad permissions, and broken modules.

An internal server error happens when the server encounters a situation it doesn't know how to handle. 

Any syntax #errors will cause a 500 Internal Server Error message to be displayed instead of your #website. 

To confirm whether a misconfiguration . htaccess is the cause of the 500 Internal Server error, either remove or rename the . htaccess file temporarily and then try to reload the page.

To Resolve 500 Internal Server #Error in #Drupal:

1. Debugging the Issue. The first step is to make sense of the situation and try to make sense of the error.

2. Check if the Admin Works.

3. Revert Recent Changes.

4. Audit Your Plugins/Extensions/Modules.

5. Check File Permissions.

6. Increase PHP Memory Limit.

Read More



Deploy PHP application with Kubernetes on Ubuntu

This article will guide you on steps to deploy #PHP application with Kubernetes on #Ubuntu. 

Kubernetes, at its basic level, is a system for running and coordinating containerized applications across a cluster of machines. 

It is a platform designed to completely manage the life cycle of containerized applications and services using methods that provide predictability, scalability, and high availability.

#Kubernetes really shines when your #application consists of multiple services running in different containers.

Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments. 

In other words, Kubernetes can be used to manage microservice architectures and is deployable on most cloud providers.

Read More



Joomla 503 service unavailable

This article will guide you on method to fix #Joomla #503 service unavailable which occurs due to web traffic or bad PHP scripts or corrupted #modules.

A 503 Service Unavailable Error is an HTTP response status code indicating that a server is temporarily unable to handle the request. This may be due to the server being overloaded or down for maintenance. 

To Fix an #HTTP #Error 503:

1. Reboot your server.

2. Check to see if your web server is going through maintenance.

3. Fix faulty firewall configurations.

4. Sift through your server-side logs.

5. Comb through your website's code to find bugs.

Read More



Zabbix Postgres vs MySQL

This article will help you give you more informations about #Zabbix Postgres vs MySQL and the criteria to choose between them. 

PostgreSQL is an Object Relational #Database Management System (#ORDBMS) whereas MySQL is a community driven DBMS system. PostgreSQL support modern applications feature like #JSON, XML etc. while MySQL only supports JSON.

PostgreSQL supports Materialized Views whereas #MySQL doesn't supports Materialized Views.

#PostgreSQL is known to be faster while handling massive data sets, complicated queries, and read-write operations. 

Meanwhile, MySQL is known to be faster with read-only commands.

Advantages Of Using MySQL:

1. It's Easy To Use.

2. Support Is Readily Available Whenever Necessary.

3. It's Open-Source.

4. It's Incredibly Inexpensive.

5. It's An Industry Standard.

6. It's Got A Few Stability Issues.

7. It Suffers From Relatively Poor Performance Scaling.

Read More



Monitor System Metrics with the TICK Stack on CentOS 7

This article will guide you on how the TICK stack can be a powerful tool for storing, analyzing, and visualizing time series data. To monitor InfluxDB _internal metrics in a production #cluster, use Telegraf and the influxdb input plugin to capture these metrics from the InfluxDB /debug/vars endpoint and store them in an external InfluxDB monitoring instance.

More about Kapacitor:

#Kapacitor is a native data processing engine for #InfluxDB 1. x and is an integrated component in the InfluxDB 2.0 platform. 

Kapacitor can process both stream and batch data from InfluxDB, acting on this data in real-time via its programming language TICKscript.

A retention policy (RP) is the part of InfluxDB data structure that describes for how long InfluxDB keeps data. 

InfluxDB compares your local server's timestamp to the timestamps on your data and deletes data that are older than the RP's DURATION . 

A single database can have several RPs and RPs are unique per database.

Read More



ICMP Flood Attack Methods to mitigate

This article will guide you on methods to mitigate ICMP flood #attack. This is the type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.

Many network administrators feel that ICMP is a security risk, and should therefore always be blocked at the firewall. It is true that ICMP does have some security issues associated with it, and that a lot of #ICMP should be blocked. 

But this is no reason to block all ICMP traffic!

To mitigate Ping flood attack:

1. Disabling a ping flood is most easily accomplished by disabling the ICMP functionality of the targeted router, computer or other device. 

2. A network administrator can access the administrative interface of the device and disable its ability to send and receive any requests using the ICMP, effectively eliminating both the processing of the request and the Echo Reply. 

3. The consequence of this is that all network activities that involve ICMP are disabled, making the device unresponsive to ping requests, traceroute requests, and other network activities.

Read More



Sitemap blocked by robots txt

This article will guide you on tips to resolve sitemap blocked by robots.txt which is generally caused due to developers improperly configuring the robots.txt file. 

A #sitemap is a blueprint of your website that help search engines find, crawl and index all of your website's content. #Sitemaps also tell search engines which pages on your site are most important.

A sitemap is vital for good SEO practices, and #SEO is vital in bringing in traffic and revenue to the website. 

On the flip side, sitemaps are essential to having search engines crawl and index the website so that the content within it can be ranked within the search results.

txt file is usually the first place crawlers visit when accessing a website. Even if you want all robots to have access to every page on your website, it's still good practice to add a robots. txt file that allows this. txt files should also include the location of another very important file: the #XML Sitemap.

Crawl-delay in robots. txt.:

The Crawl-delay directive is an unofficial directive used to prevent overloading servers with too many requests. 

If search engines are able to overload a server, adding Crawl-delay to your robots. txt file is only a temporary fix.

Read More



Install Minecraft Server on Ubuntu 20.04

This article will guide you on how to install a Minecraft server on #Ubuntu 20.04 and set up a daily backup. You can now launch the Minecraft client, connect to the server and start Minecraft adventure. 

Setting up a #Minecraft server on #Linux (Ubuntu 12.04) is a fairly easy task on the command line.

Of the previously given ports, the only one I want you to memorize is 25565, because that is Minecraft's default port number. What we want to do is forward inbound traffic on port 25565 to our Minecraft server that's located on the private internal network.

Process of Setting up Minecraft Server on Ubuntu:

1. Create New Minecraft User. Add the new “minecraftuser” to the “sudo” group.

2. Add Minecraft User To Sudo Group.

3. Switch To Minecraft User.

4. Install wget Package.

5. Install Java OpenJDK package.

6. Check Installed Java Version.

7. Install Screen Package.

8. Create A Minecraft Directory.


To Install #Steam from Ubuntu package repository :

i. Confirm that the multiverse Ubuntu repository is enabled: $ sudo add-apt-repository multiverse $ sudo apt update.

ii. Install Steam package: $ sudo apt install steam.

iii. Use your desktop menu to start Steam or alternatively execute the following command: $ steam.

Read More



Cloudflare 404 Not Found error

This article will guide you on differerent methods to fix Cloudflare 404 Not Found #error which occurs when website content has been removed or moved to another URL. 

There are also other reasons why an error message could appear. 

The URL or its content (such as files or images) was either deleted or moved (without adjusting any internal links accordingly).

To fix #Cloudflare #404 error:

1. Retry the web page by pressing F5, clicking/tapping the refresh/reload button, or trying the URL from the address bar again.

2. Check for errors in the URL.

3. Move up one directory level at a time in the URL until you find something.

4. Search for the page from a popular search engine.

Important factors relating to 404 error:

i. A 404 not found error is an HTTP status code that means that the page you wanted to access a website couldn't be found on their server. 

ii. Did you know that search engines, such as Google and Yahoo, will get a negative impression of a website if it has too many HTTP 404 errors?

iii. A 404 is an HTTP status code that means you're able to communicate with the server but the server can't find the specific page.

Read More



Cloudflare 403 forbidden error


This article will guide you in fixing Cloudflare 403 forbidden error. The Cloudflare error is caused by server end. The major reasons for this error are IP deny rules, #permissions rules, or browser #cache. 

To fix Cloudflare #error?

Contact your site administrator or hosting provider to eliminate these common causes:

1. Ensure your origin web server is responsive.

2. Review origin web server error logs to identify web server application crashes or outages.

3. Confirm #Cloudflare IP addresses are not blocked or rate limited.

4. Allow all Cloudflare IP ranges in your origin web server's firewall or other security software.

Read More



Drupal Unexpected Error

This article will guide you on how to fix #drupal unexpected error. Drupal error occurs due to many reasons that include corrupt #database, non-compatible modules installation, cache, #PHP configuration, custom codes, and so on. 

1. An "Internal Server Error" is an #error on the web server that you're trying to access. 2. That server is misconfigured in some way that is preventing it from responding properly to what you're asking for. 

3. An "Internal Server Error" often occurs due to: Misconfigured Drupal core file or folder read and write permissions.

To clear cache in #Drupal:

i. In the Manage administrative menu, navigate to Configuration > Development > Performance (admin/config/development/performance).

ii. Click Clear all caches.

iii. A message saying the cache has been cleared appears at the top of the page.

Read More



Push Notification using Firebase Cloud Messaging

This article will guide you on steps to set up push notifications. Also, you will learn how to set up push notification using Firebase.  

#Firebase #Notifications is a free service that enables user notifications for Android and iOS devices. These notifications can be directed at your individual users; to topics that they subscribe to; or to segments defined by analytics audiences.

Notification messages are handled by the FCM SDK automatically and displays the message to end-user devices on behalf of the client app. Notification messages have a predefined set of user-visible keys and an optional data payload of custom key-value pairs.

To the end user, push notifications may not seem noticeably different from marketing communications via SMS or email. 

However, from a mobile app's end, push notifications are an enormous improvement in terms of reliability and sophistication to SMS.

To check my firebase push notifications:

1. #Install and run the app on the target device.

2. Make sure the app is in the background on the device.

3. Open the Notifications composer and select New notification.

4. Enter the message text.

5. Select Send test message.

Read More



Benefits of Push notification

This article is about the different benefits of push notifications. Basically, the push #notifications benefits the #website in improving the traffic. 

Push notifications can considerably enhance your customer experience. They're less intrusive than other forms of user engagement and can effectively drive traffic and help users by providing useful information. They allow your users to keep up with the latest updates, promotions, and offers.

Read More



DNS Amplification Attack

This article will guide you on different methods to mitigate DNS amplification attack. Basically, DDoS attacks can really freeze websites or even cause server downtime. 

DNS flood is a type of Distributed Denial of Service (#DDoS) attack in which the attacker targets one or more Domain Name System (DNS) servers belonging to a given zone, attempting to hamper resolution of resource records of that zone and its sub-zones.

A Domain Name Server (#DNS) Amplification attack is a popular form of Distributed Denial of Service (DDoS), in which attackers use publically accessible open DNS servers to flood a target system with DNS response traffic.

1. UDP reflection attacks exploit the fact that UDP is a stateless protocol.

2. An attacker then sends the UDP packet containing the spoofed source IP to an intermediate server. 

3. The server is tricked into sending its UDP response packets to the targeted victim IP rather than back to the attacker's IP address.

Read More



Improve sales with customer service

In summary, we saw how to improve sales with reliable customer service. Along with some of the reasons to invest on customer service.

Basically, good customer service will always increase the likelihood of making a sale. It's not always guaranteed, and pressuring customers to buy won't get you anywhere. 

But keeping the human-to-human sentiment in mind will help people feel like they're not just there to make you money.

Providing excellent customer service means going the extra mile in making sure a customer is happy and satisfied with a company's products or services. 

It also involves providing service to a customer in a timely, pleasant manner.

To to deliver great customer service:

1. Know your product.

2. Maintain a positive attitude.

3. Creatively problem-solve.

4. Respond quickly.

5. Personalize your service.

6. Help customers help themselves.

7. Focus support on the customer.

8. Actively listen.

Read More



Laravel error 403

This article will guide you on tips to resolve Laravel error 403 which occurs mainly due to bad permissions, improper ownerships and incorrect .htaccess file. 

The 403 Forbidden error is an #HTTP status code which means that accessing the page or resource you were trying to reach is absolutely forbidden for some reason. 

To fix #WordPress #403 #forbidden #error:

1. Create a Backup. Most of the time, you are not responsible for the errors that occur on your WordPress website hosting server.

2. Check . htaccess File.

3. Deactivate All Plugins. Login to your WordPress admin dashboard and navigate to Plugins - Installed Plugins.

Read More



Django 400 bad request

This article will guide you on methods to resolve the #Django 400 bad request which is caused due to many reasons which include incorrect syntax, corrupt extensions, incorrect URL, and so on.

The 400 Bad Request #error is an #HTTP status code that means that the request you sent to the website server, often something simple like a request to load a web page, was somehow incorrect or corrupted and the server couldn't understand it.

To resolve 400 Bad Request:

1. Check for errors in the URL.

2. Clear Browser Cache and cookies.

3. Clear DNS Cache.

4. Check your File upload Size.

5. Deactivate Browser Extensions.


Read More



MySQL is not running

This article will guide you on methods to resolve MySQL #error 'MySQL is not running'. Basically, this MySQL error occurs due to many reasons that include stopping MySQL improperly, tables crashing and so on. 

Both MySQL and #Microsoft SQL Server (MSSQL) are widely used enterprise database systems. MySQL is an open-source relational #database management system (RDBMS), while MSSQL Server is a Microsoft-developed RDBMS. 

Enterprises can choose between multiple #MSSQL Server editions to suit their individual needs and budgets.

Why #MySQL is not opening?

1. You can also check the MySQL service is running in background or not. 

2. To do that open Task manager ( Press CTRL + SHIFT + ESC simultaneously ) and look for mysqld service in background process section. 

3. If it isn't listed there then the service is stopped or disabled.

Read More



Default PHP settings in OpenLiteSpeed webserver

This article will guide you on the default settings for LSAPI. Basically, by default #OpenLiteSpeed support #PHP with external application and script handler. 

CyberPanel is a web hosting control panel powered by OpenLiteSpeed, which helps you set up sites on your DigitalOcean droplets easily and automatically back them up to DigitalOcean Spaces. Features. Different Level Of users.

To Configure #CyberPanel:

1. Enter admin for the username and 1234567 for the password.

2. Click on the user-menu arrow, next to the name "Cyber Pan".

3. Choose Edit Profile.

4. Select admin in the dropdown menu on the Modify User page.

5. You may now change the first name, last name, email address and password accordingly.

Read More



Galera cluster asynchronous replication

This article will guide you on steps to perform Galera cluster asynchronous replication for #MySQL.  Galera Cluster for MySQL is a true Multi-Master Cluster based on synchronous replication. It's an easy-to-use, high-availability solution, which provides high system up-time, no data loss and scalability for future growth.

To do you get a Galera Cluster:

1. Create a #Cloud Server. First, log in to your Cloud Server via an SSH tool such as putty.

2. Install #MariaDB Server on All Servers.

3. Configure Each Server in the #Cluster.

4. Initialize the Galera Cluster.

5. Test Galera Cluster #Replication.

Read More



Joomla error displaying the error page

This article will guide you on steps to resolve #Joomla #error displaying the error page which occurs due to trouble in the configuration file or a corrupt #database.

After you have determined the correct database settings, you are ready to update the configuration.php file. 

To do this, follow these steps:

1. In the FILES section of the cPanel home screen, click File Manager:

2. Navigate to the directory where Joomla is installed.

3. Right-click the configuration.php file, and then click Edit.

4. Locate the $db variable, and then replace the value with the name of the Joomla database that you obtained in the previous procedure. 

For example, if your database name is username_joom123, modify the text as follows:

public $db = 'username_joom123';

5. Locate the $user variable, and then replace the value with the database username that you obtained in the previous procedure. For example, if your database username is username_joomuser, modify the text as follows:

public $user = 'username_joomuser';

6. Locate the $password variable, and then replace the value with the database user's password. For example, if your database user's password is example_password, modify the text as follows:

public $password = 

7. Locate the $dbprefix variable, and then replace the value with the database table prefix that you obtained in the previous procedure. 

For example, if the database table prefix is jos_, modify the text as follows:

public $dbprefix = 'jos_';

8. irm that the $host variable is set to localhost as follows:

public $host = 'localhost';

9. Click Save Changes.

10. Use your web browser to go to the Joomla site's URL. The site should load.

Read More



301 redirect dns record

This article will guide you on how to set up 301 redirect DNS record. Basically, we must create the redirects carefully, so that we don't lose the traffic. 

301 redirect #DNS records are the best method that we can implement for achieving a good redirect.

Redirects are not bad for #SEO, but — as with so many things — only if you put them in place correctly. 

1. A bad implementation might cause all kinds of trouble, from loss of PageRank to loss of traffic. 

2. Redirecting pages is a must if you make any changes to your URLs.

3. A 301 redirect is a permanent #redirect that passes full link equity (ranking power) to the redirected page. 301 refers to the HTTP status code for this type of redirect. 

4. In most instances, the 301 redirect is the best method for implementing redirects on a website.

Read More



Remote Desktop on Debian Using X2Go

This article will guide you on the steps to set up remote desktop on #Debian. X2Go can be used to access Windows systems through a #proxy. Client packages can be run on #FreeBSD, Linux, #OS X, or #Windows. 

With the desktop sharing function of X2go you can gain full-access to the desktop of another computer, similar to programs such as Remote Desktop, TeamViewer, and LogMeIn. You can see an #X2go session from somebody else, but you can also see a normal desktop. Desktop Sharing functionality requires access to port 22.

To Connect to Linux Remotely Using #SSH in #PuTTY:

1. Select Session > Host Name.

2. Input the #Linux computer's network name, or enter the IP address you noted earlier.

3. Select SSH, then Open.

4. When prompted to accept the certificate for the connection, do so.

5. Enter the username and password to sign into your Linux device.

Read More



Copy rds snapshot to s3

This article will guide you on resolve common rds #error. Basically, the process to copy rds snapshot to s3 is simple and creates and saves backups of the DB instance in the Amazon S3 bucket. 

Amazon Relational Database Service (#Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching and backups.

RDS creates a storage volume snapshot of your #DB instance, backing up the entire DB instance and not just individual databases. RDS saves the automated backups of your DB instance according to the backup retention period that you specify.

To copy a #RDS snapshot from one region to another:

1. Create a #snapshot of your RDS.

2. In your newly created snapshot go to Actions -> Copy Snapshot.

3. Click orange View snapshots in destination region.

4. In the target region's snapshots table find your copied snapshot, and wait until status "Copying" becomes "Completed".

5. Select the snapshot, click Actions -> Restore Snapshot.

Read More



Preserve Permissions in rsync

This article will guide you on how to use rsync to preserve permissions. 

Rsync, or Remote #Sync, is a free command-line tool that lets you transfer files and directories to local and remote destinations. #Rsync is used for mirroring, performing backups, or migrating data to other servers.

a = archive - means it preserves #permissions (owners, groups), times, symbolic links, and devices. Use of "/" at the end of path: When using "/" at the end of source, rsync will copy the content of the last folder.

To preserve permissions when files and folders are copied or moved, use the Xcopy.exe utility with the /O or the /X switch. 

The object's original permissions will be added to inheritable permissions in the new location.

To make rsync to preserve timestamps:

1. To overcome this, there is another option that you can specify in the rsync command that will preserve the timestamps during the synchronization process. 

2. Without preserving the timestamp, the files will display the modification date and time as the time that the rsync command was run.

Read More



OpenVPN on Linux

This article will guide you on steps to set up OpenVPN on Linux.

OpenVPN config files (. ovpn) offer an easy way to configure #OpenVPN on your computer to work with our servers. These files contain the correct cipher types, #Certificate Authority, Certificate, and Private Keys. You can use these files on Mac, Linux, #Windows, Android, and iOS.

By default the OpenVPN Access Server comes configured with OpenVPN daemons that listen on port 1194 UDP, and OpenVPN daemons that listen on port 443 TCP. While the best connection for an OpenVPN #tunnel is via the #UDP port, we implement TCP 443 as a fallback method.

To Set up OpenVPN Server on Ubuntu #Linux:

1. Find and note down your public IP address.

2. Download openvpn-install.sh script.

3. Run openvpn-install.sh to install OpenVPN server.

4. Connect an OpenVPN server using iOS/Android/Linux/Windows client.

5. Verify your connectivity.

Read More



Install WordPress with Docker Compose

This article will guide you on how to install WordPress with docker compose.

Docker Hub is an official repository where individuals and organizations can upload Docker images for public consumption.

The reason for using Docker is used to define and start running multi-container Docker applications. You need to define docker-compose. yml for the services that make up your app services. You should run docker-compose up and Compose starts and runs your entire app.

Steps to #Install WordPress with Docker on #Ubuntu 20.04 :

1. Create a Cloud Server. First, log in to yourCloud Server.

2. Install Required #Dependencies.

3. Install Docker.

4. Create a MariaDB #Container.

5. Create a #WordPress Container.

6. Configure #Nginx as a Reverse Proxy.

7. Access WordPress Interface.


To Update WordPress

The docker-compose.yml specifies the latest version of the WordPress image, so it's easy to update your WordPress version:

docker-compose down

docker-compose pull && docker-compose up -d

Read More



WordPress Brute Force Attack

This article will guide you on Brute Force Attack and different ways to troubleshoot and fix a Brute-Force Attack in #WordPress.

Brute-force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct password. 

As the password's length increases, the amount of time, the computational power required on average, to find the correct password increases exponentially.

#Brute #Force #Attack Prevention Techniques:

1. Limit failed login attempts.

2. Make the root user inaccessible via #SSH by editing the sshd_config file.

3. Don't use a default port, edit the port line in your sshd_configfile.

4. Use Captcha.

5. Limit logins to a specified IP address or range.

6. Two factor authentication.

7. Unique login URLs.

Read More



Install Firejail in Linux

This article will guide you on steps to #install #Firejail in Linux. Basically, Firejail reduces the risk of security breaches by restricting the untrusted applications and separating them from other parts of the system. 

#Sandboxing involves providing a safe environment for a program or #software so that you can play around with it without hurting your system. It actually keeps your program isolated from the rest of the system, by using any one of the different methods available in the #Linux #kernel.

To Install the Firejail Software:

1. Open up a terminal window.

2. Issue the command sudo apt-get install firejail.

3. Type your sudo password and hit Enter.

4. If prompted, type y to allow the installation to continue.

5. Allow the installation to complete.

Read More



Install XRDP Server

This article will guide you on steps to install XRDP #Server on #Ubuntu. To provide remote access via RDP, a Windows native protocol, XRDP behind the scenes uses #VNC, a remote access protocol more common in Linux.

After #xrdp is installed you can start the server with the following command:

Service xrdp start.

Service xrdp-sesman start (Thanks to Greg for pointing that out) — UPDATE!!

If want it to auto start after reboot you need to run this command also: update-rc.d xrdp enable (It will not start xrdp-sesman automatic).


To use XRDP Linux:

1. With #Ubuntu 18.04 first install xrdp: sudo apt-get -y install xrdp.

2. Next, one may adjust the configuration file: sudo nano /etc/xrdp/xrdp.ini.

3. Set encryption level to high: encrypt_level=high.

4. Next, allow just RDP through the local firewall: sudo ufw allow 3389/tcp.

Read More



Install Microsoft PowerShell on Ubuntu

This article will guide you on steps to install PowerShell on #Ubuntu. #PowerShell is a configuration management tool that brings the capabilities of Linux command-line interface (#CLI) control into the historically point-and-click Windows environment to manage Windows servers efficiently in virtual deployments.

With PowerShell and WSL, we can integrate Linux commands into #Windows just as if they were native applications. 

No need to hunt around for Win32 builds of #Linux utilities or be forced to interrupt your workflow to drop into a Linux shell.

To check the PowerShell version installed in your system, you can use either $PSVersionTable or $host command.

To get a list of PowerShell commands:

1. Get-Command gets the commands from #PowerShell modules and commands that were imported from other sessions. 

2. To get only commands that have been imported into the current session, use the ListImported parameter. 

3. Without parameters, Get-Command gets all of the #cmdlets, functions, and aliases installed on the #computer.

Read More



WHM Mail Queue Manager

This article will guide you on use different features available in the #WHM Mail Queue Manager. Basically, the #Mail #Queue Manager feature in WHM is a handy tool that allows us to view, delete, and attempt to deliver queued emails that have not yet left the server. 

Postfix is a free and open-source mail transfer agent (#MTA) that routes and delivers electronic mail.

postfix flush helps to Flush queued mail.

This command will attempt to redeliver all queued mail. Use the command sparingly, multiple flushes will impact the overall performance of your mail server

To check my mail queue in cPanel:

i. Log into WHM.

ii. Go to Main >> Email >> Mail Queue Manager.

iii. You can click on the message to see the details.

Read More



HTTP status code 410 Methods to fix it

This article will guide you on methods to fix HTTP status code 410 error.

When a user tries to access an asset that no longer exists on the requested server, it often returns an http status #code of 410.

The #HyperText Transfer Protocol (#HTTP) 410 Gone client error response code indicates that access to the target resource is no longer available at the origin server and that this condition is likely to be permanent.

To Fix an #Error 405:

1. Check the #URL.

2. Rollback Recent Upgrades.

3. Uninstall New Extensions, Modules, or Plugins.

4. Double-Check Your Database Changes.

5. Check the Configuration Files for Your Web Server.

6. Check the Application Logs.

7. Debug Your Application Code or Scripts.

Read More



Configure and Use Microsoft SQL Server Management Studio

This article will guide you on how to setup SQL server management studio. SQL Server Management Studio is a free #Windows #application to configure, manage, and administer Microsoft SQL Server (#MSSQL). 

SSMS is available only as a 32-bit application for Windows.

To get SQL Server Management Studio:

1. Go To Start Menu>Programs>Microsoft SQL Server Tools 18> Microsoft #SSMS 18. 

2. Below 'Connect to Server' screen will appear. 

3. Server Name defaults to the name selected while installing MS SQL server. 

4. Server type: This is an option to select one out of four available MS SQL services option.

To Enable remote connections to your SQL Server:

i. Open #SQL Server Management Studio.

ii. Right-click your server's name and select Properties.

iii. Tick the checkbox Allow remote connections to this server.

iv. Select OK.

Read More



Frequent connection timeout errors due to cPanel firewall issues

Make sure that your browser is up to date. Sometimes the “Connection timed out” message can appear if your browser is out of date. Outdated #software can have compatibility issues and bugs that can cause this and other errors to appear. 

The HyperText Transfer Protocol (HTTP) 408 #Request Timeout response status code means that the server would like to shut down this unused connection. It is sent on an idle connection by some #servers, even without any previous request by the client.

To fix the problem, be sure that your browser is up to date.

To Fix the ERR_CONNECTION_TIMED_OUT Error:

1. Check Your Connection. Google Chrome, Firefox, and Edge all recommend that you should check your network connection.

2. Disable Firewall and Antivirus Software Temporarily. Firewalls and antivirus software are intended to protect users and their systems.

3. Disable Proxy Settings.

4. Change DNS Servers.

Read More



Logging in Apache More about it

The Apache access logs stores information about events that occurred on your #Apache web #server. Apache web servers also provide administrators with another type of log file called error logs. 

The Apache error log has a logging level that filters the messages sent to the log. Apache #logs nothing for a single page request in warn level.

This log file is used to provide more information regarding a particular error that has occurred on the web server.

By default, you can find the Apache #access log file at the following path:

i. /var/log/apache/access. log.

ii. /var/log/apache2/access. log.

iii. /etc/httpd/logs/access_log.

To enable the Apache #HTTP access logs:

1. Open the Apache HTTP configuration at /Applications/MAMP/conf/apache/httpd.conf.

2. Find this line.

3. Change the line.

4. Restart Apache using the MAMP widgit.

5. Now, view your new logfiles!

Read More



Directadmin ioncube How to install and fix related errors

This article will guide you on how to set up the Ioncube loader and fix DirectAdmin Ioncube #errors. Incorrect timezone and misconfiguration in the php.ini file cause errors after installing the Ioncube loader in #DirectAdmin.

ionCube and Zend are fine for code protection, and even if some decompilation service produced usable code from an encoded file, this would typically do little if anything to diminish the benefits from encoding and license enforcement, and may even result in increased revenue in the longer term for the software.

To use ionCube #PHP encoder?

To use this PHP function to output the required data complete the following steps:

1. Connect to your server via #SSH.

2. Create a PHP file.

3. Add the phpinfo() function.

4. Save the file inside the root website folder.

5. Display in a browser.

6. Search the document for ionCube references.

7. Delete the file when done.


To enable Ioncube #loader in #cPanel:

1. Login to #WHM (root)

2. Go to Server Configuration -> Tweak Settings -> PHP.

3. Select #ioncube check box for cPanel PHP loader.

4. Click on Save button.

That's it. 

This will enable Ioncube for you in 3rd party PHP binary.

Read More



cPanel MySQL error query PHP

This article will guide you on methods to fix cPanel MySQL #error query #PHP. Generally, the MySQL error query PHP is mainly related to the PHP file. This can be either caused due to incorrect database details in the PHP file or incorrect permissions or incorrect ownership in files. 

To fix this issue:

1. Update to the latest version of #MySQL to resolve the issue. 

For some, this may require removing yum version locks on the MariaDB packages.

If packages are locked for #MariaDB clear the lock with the below command:

yum versionlock clear

Otherwise, proceed with the updates for MariaDB:

yum upgrade MariaDB-*

Read More



Create user in DirectAdmin

This article will guide you on how we can create a #user in DirectAdmin and fix errors related to it. DirectAdmin provides an easy way to create a user as a reseller. And the errors during its creation are mainly due to home directory unavailability or improper permissions or due to the disk being full. 

#DirectAdmin can be accessed at http://server.ip.address:2222. 

Use the Admin username/password from the output information provided by setup.sh (the same information is specified in the /usr/local/directadmin/scripts/setup.

To install Direct Admin:

1. Set a main #domain name. By default, no web #site is associated with your server.

2. Create nameservers (optional) Add at least one additional IP address to your sever.

3. Set your e-mail address in the control panel.

Read More



Create a virtual machine using lightsail in AWS

This article will guide you on how to create a virtual #machine using Lightsail in #AWS.

#Lightsail is an easy-to-use virtual private server (#VPS) that offers you everything needed to build an application or website, plus a cost-effective, monthly plan.

To create a virtual machine in #cloud:

1. Using the left-hand navigation bar, click Compute Engine and then select #VM instances from the item list. 

2. If this is your first #VM on the platform. 

3. If you have a VM template you can import it to GCP, but in this case we will create a VM from scratch.

Read More



MSSQL replication setup

This article will guide you on how to setup #MSSQL replication and fix related errors. The MSSQL replication is a bit long procedure to configure replication. 

Through embedded SQL database replication technology, #SQL Server supports three types of #replication: snapshot, transactional, and merge replication.

#Snapshot replication sends the entire data set to the subscriber. 

Transactional replication only sends modifications to the data. 

Merge replication items are modified at both the publisher and subscribers. 

Heterogeneous replication allows access to other database products.

To enable replication in SQL Server:

Using SQL Server Management Studio (#SSMS)

1. On the Publication Databases page of the Publisher Properties - <Publisher> dialog box, select the Transactional and/or Merge check box for each database you want to replicate. 

2. Select Transactional to enable the database for snapshot replication.

3. Click OK.

Read More



Asp net error 1334

This article will guide you on steps to resolve Asp.net #error 1334 which is a generic error often encountered while trying to run an #ASP .NET web application in Windows. ASP.NET uses the common language runtime (CLR), which provides a way of notifying #applications of errors in a uniform way. 

When an error occurs, an exception is thrown. An exception is any error, condition, or unexpected behavior that an application encounters.

To fix Asp.net error #1334:

1. Run a repair of .NET #Framework 2.0 and attempt to restart the Backup Exec Server service.

2. If the issue persists, uninstall .NET Framework 2.0 and all related updates.  

3. Reboot the #Media Server. 

4. Reinstall .NET Framework 2.0.

5. Reboot the Media Server.

Read More



Are You Sure You Want to Do This Error in WordPress

This article will guide you on how to go about fixing "Are You Sure You Want to Do This" Error in WordPress. 

Critical errors damage your website's credibility, usability and accessibility. An important part of website optimization is therefore to detect critical errors and correct them as quickly as possible. The most common critical errors include server errors, broken pages, and broken images.

To fix WordPress #errors:

1. Check Your .htaccess File.

2. Switch To The Default Theme. If you are seeing the 500 Internal Server Error message, then you probably can't access the dashboard.

3. Increase #Memory Limit.

4. Deactivate All Your #WordPress #Plugins.

To get rid of warnings in WordPress:

i. Access your website by clicking the “public_html” folder in the directory.

ii. Select the wp-config.

iii. Click the “Edit” button on the new window.

iv. You may see “true” instead of false.

v. Click the “Save Changes” button in the top right.

Read More



Common Image Issues in WordPress

This article will help you #fix some of the most common #image issues in #WordPress. 

If your Media Library is loading but not showing images, there are two primary causes: an incompatible plugin, and improper file permissions. 

Testing #plugins follows the same advice as above, and if they're not the cause, file permissions may be.

To fix image size in WordPress:

1. Navigate to your WordPress admin dashboard.

2. Go to Settings - Media.

3. In Media Settings, edit the width and height dimensions to suit your values.

4. Click Save Changes to confirm.

Read More



Image Upload Issue in WordPress

This article will guide you on resolve Image Upload #Issue in WordPress. You will also learn its causes and how you can prevent this error in the future.

If your Media Library is loading but not showing images, there are two primary causes: an incompatible plugin, and improper file permissions. Testing plugins follows the same advice as above, and if they're not the cause, file permissions may be.

To Fix Common Image #SEO Issues in #WordPress:

1. #Upload an image in png or JPG format.

2. Align Image to the Left or Right.

3. Caption uploaded images.

4. Display Photos in Columns and Rows.

5. Create Responsive Gallery.

6. Set Features Image.

7. Add Cover Image for WordPress Pages and Posts.

8. Fix Twice Appearing Featured Image.

Read More



Nagios migration to new Linux server

This article will guide you on steps to #migrate Nagios server to a new Linux server. Nagios provides complete monitoring of #applications and application state – including #Windows applications, #Linux applications, #UNIX applications, and #Web applications.

Main benefits of #Nagios:

1. Increased server, services, process, and application availability.

2. Fast detection of network and server outages and protocol failures.

3. Fast detection of failed servers, services, processes and batch jobs.

Read More



Using CSF firewall to block countries

This article will guide you on how to block/allow countries in the CSF #firewall. CSF is used to restrict or allow countrywide IP ranges in the server using the country codes. For every country you want to deny, you just enter those letters in the field (separated by a comma). Once you're done, scroll to the bottom of the page and click CHANGE. This will restart the firewall, and you're now all set to go.

ConfigServe Firewall (#CSF) is a firewall configuration script created to provide better security for your server while giving you an easy to use and advanced interface for managing your #firewall settings in cPanel servers.

To limit the ability to connect on a specific port or ports to visitors with IP addresses originating in a specific country or countries, you must:

1. close the ports in the firewall.

2. define the country code allowed to connect on those blocked ports.

3. specify the blocked #ports to be opened for the specified country.

Read More



Install SSL Certificate in IIS 7

This article will guide you on steps to #install SSL Certificate in IIS 7 #windows 2008 server. 

IIS (Internet Information Services) is used to host ASP.NET web applications and static #websites. It can also be used as an #FTP server, host WCF services, and be extended to host #web #applications built on other platforms such as #PHP. There are built-in authentication options such as Basic, ASP.NET, and Windows auth.

To install a certificate in Windows Server:

i. In the left pane of the console, double-click #Certificates (Local Computer). 

ii. Right-click Personal, point to All Tasks, and then select Import. 

iii. On the Welcome to the Certificate Import Wizard page, select Next. 

iv. On the File to Import page, select Browse, locate your certificate file, and then select Next.

To enable SSL in IIS:

1. On the #IIS server, start the IIS Manager (on the Windows taskbar, select Start > Administrative Tools > Internet Information Services (IIS) Manager).

2. Enabling SSL in IIS

3. In Type, select https.

4. In SSL certificate, select an appropriate certificate from available choices.

5. Click OK.

Read More



Install Vesta control panel in Ubuntu

This article will guide you on easy steps to install Vesta control panel in #Ubuntu. VestaCP is a control panel for Linux with many features that facilitate the administration of a #server. 

Vesta Development team provides an installer script that automates setting up of Vesta hosting control panel on Ubuntu / Debian and RHEL based Linux distributions. Login to your Ubuntu / #Debian system and ensure the system is updated. Download #Vesta installer. Run install with sudo if you're logged in as standard user.

To install vestaCP on Ubuntu:

1. # Connect to your server as root via #SSH

ssh root@your.server

2. # Download installation script

curl -O http://vestacp.com/pub/vst-install.sh

3. # Run it

bash vst-install.sh

To change my VestaCP port:

i. conf file and change the port that NGINX listens on from 8083 to 2083 (or the port you chose to use). listen 2083; 

ii. Once the port has been changed, press CTRL+X , followed by y , and then hit enter to save your changes. 

iii. The final step is removing the firewall entry for the previous port we were using.

Read More



SPF record cPanel

This article will guide you on how to enable SPF record in #cPanel to reduce the chances of spoofing and thus saves the confidential information from being corrupted.

An #SPF (Sender Policy Framework) record is a type of TXT record in your #DNS zone file.

SPF allows email senders to define which #IP addresses are allowed to send mail for a particular domain.

To enable SPF record in cPanel:

1. Go to Add a record (or edit your #record if you already have one).

2. Name: enter the name of your #domain or subdomain used in your sender e-mail address.

3. TTL: enter 14400.

4. Type: select #TXT.

5. TXT Data: Enter your SPF record (e.g. v=spf1 a mx ~all)

6. Save your modifications.

Read More



DNN reset host password in database

This article will guide you on how to perform DNN reset host passwords in the database easily. 

Forgot DNN host password? 

1. DNN host account is the superuser or administrator of DotNetNuke websites. 

2. If you lost host or admin password for DNN site, you do not need to create a new DNN site again unless it is new installation. 

3. By the way, it is easy to create a new one if not yet. 

4. Do not miss out this guide to set up DNN website. 

5. DNN site has the password retrieval system which can help you recover password for non-superuser accounts. 

Read More



Packet Drop On bond0

This article will help to fix packet drop on bond0. Here, you will learn more about packet loss. 

In Linux, in order to connect more than one network interfaces into a single interface, a special kernel module named bonding is used.

Here, two or more network interfaces can be connected into a single logical “bonded” interface.

Read More



DNN Favicon How to change

This article will guide you on steps to uploaded favicon on your Website.

Basically, we can upload favicon in DNN websites either by using the Favicon upload option or by the Enter URL Link option from Site Settings.


The favicon is an important aspect of a site's brand identity and is an important attribute which needs to be customized for marketing purposes:


1. Navigate to Admin >  Site Settings.

2. Click on the country flag icon associated with the culture (language) to be updated. This field only displays when multiple languages are enabled. See "Viewing a Site in a Secondary Language".

3. Select the Basic Settings tab and expand the Appearance section.

4. At Logo, select from these options:

5. To select an existing image, select the folder where the file is located from the Folder drop down list, begin entering the file name into the File text box and select the required file from the search results.

6. Click the Upload File button to select the file from the local computer - OR - Drag the image file from the computer and release it over the "Drop File(s) Here" window.

7. At Body Background, select a new or existing image as detailed above. The background image will be tiled on all site pages, unless the skin applied to the page includes a background image.

8. At Favicon.ico, select a new or existing image as detailed above. Only files with an *.ico extension can be selected at this field, as these are the only files supported by Internet Explorer.

Read More



Digitally Signed Files with PowerShell

This article will guide you on how to implement reporting on digitally signed files with PowerShell. 

Get-Command gets the commands from PowerShell modules and commands that were imported from other sessions. 

To get only commands that have been imported into the current session, use the ListImported parameter. 

Without parameters, Get-Command gets all of the cmdlets, functions, and aliases installed on the computer.

Read More



Shorewall forward reject How to resolve this error

The 'Shorewall forward reject' error mainly occurs when there is any misconfiguration or missing in the rules added to the Shorewall configuration files. 

Shorewall rules file:

Entries in this file govern connection establishment by defining exceptions to the policies laid out in shorewall-policy(5). By default, subsequent requests and responses are automatically allowed using connection tracking. 

Read More



Install a module in DNN

This article will guide you on how to #install a module in #DNN.

To Install / Update a #DotNetNuke #Module:

1. Log into your site as either HOST or another supersuser level account.

2. Open Settings -> Extensions.

3. Click "install extension".

4. Drag and drop the package into the window, or browse to the desired file to upload it.

5. Click Next, accept the license, continue through the install. When finished click on the Return button.

Read More



Wildcards in SQL Server

This article will guide to use #Wildcards in #SQL server. Also you will learn how to use and escape wildcards SQL-based databases. 

To use a wildcard character within a pattern: Open your #query in Design view. In the Criteria row of the field that you want to use, type the #operator Like in front of your criteria. Replace one or more characters in the criteria with a wildcard character.

i. The wildcard is an advanced search technique that can be used to maximize your search results in library databases. 

ii. Wildcards are used in search terms to represent one or more other characters. 

iii. The two most commonly used wildcards are: An asterisk (*) may be used to specify any number of #characters.

Read More



DNN reindexing crawling

This article will guide you on how to resolve DNN #websites not #indexing. When the DNN site re-indexing is not #crawling properly, we delete the files in \App_Data\Search folder and we click the re-index button.

1. You may clear the search tables and re-index, but I suggest upgrading to DNN 7.3.4 or 7.4.1, where a log of issues with new (#DNN 7.1) search engine).

2. You might Need to remove all Content of /app_Data/search Folder, if there are issues with indexing.

Read More



Disable ModSecurity for a domain

This article will guide you on how to disable Mod_Security for a specific domain. Basically, ConfigServer #Modsecurity Control allows us to disable the #rules that are blocking access to a specific #domain.

1. Mod_security module helps to protect your website from various #attacks. 

2. ModSecurity is an open-source web-based firewall application (or #WAF) supported by different web servers: Apache, Nginx and IIS. The module is configured to protect web #applications from various attacks.

3. If mod-security is disabled on your account, your website will be at risk from vulnerabilities.

4. To disable modsecurity, all we need to do is remove/rename that file and restart apache. Remove the include line loading mod_security (or more likely mod_security2) from your Apache config.

Read More



Automate Windows Server 2019 Administration with Ansible

This article will guide you on steps to automate Windows Server 2019 #Administration with Ansible. 

Ansible can be used to manage and execute core functions in Windows #environments, from security updates to remote management using #WinRM. Although Ansible must be run on #Linux, Windows administrators can use Ansible to manage and automate their systems without needing to know how to use a Linux #terminal.

To Connect Ansible on Windows from #Ubuntu:

1. Create Ansible Windows User. Create a new user for the Ansible windows connection setup.

2. Setup Libraries and WinRM.

3. Update the Ansible Inventory file.

4. Update the Ansible Group Variables.

5. Configure #Windows Servers to Manage.

6. Test Connectivity to the Windows Server.

Read More



SQL error 825 How to fix it

This article will guide you on methods to resolve SQL error 825 which indicates a major disk problem and not a SQL server problem. 

The connection to #SQL server cannot be established or is no longer usable. There can be various causes of this #error. The most common causes are that Microsoft Dynamics NAV Server has stopped or the connection to SQL #Server is not configured correctly.

To find SQL errors:

i. In SQL Server Management Studio, select Object Explorer.

ii. In Object Explorer, connect to an instance of SQL Server, and then expand that instance.

iii. Find and expand the Management section (assuming you have permissions to see it).

iv. Right-click SQL Server Logs, select View, and then choose SQL Server Log.


Every SQL Server #database has a transaction log that records all transactions and the database modifications made by each transaction. The transaction log is a critical component of the database. If there is a system failure, you will need that log to bring your database back to a consistent state.

To get SQL query history in SQL Server:

1. In Object Explorer, connect to an instance of the SQL Server Database Engine, and then expand that instance.

2. Expand SQL Server Agent, and then expand Jobs.

3. Right-click a job, and then click View History.

4. In the Log File Viewer, view the job history.

5. To update the job history, click Refresh.

Read More



Powershell to enable script execution

This article will guide you on how to fix #Windows script error via PowerShell. Basically, we used #PowerShell to enable script #execution by running some #commands.

PowerShell is a cross-platform task automation and configuration management framework, consisting of a command-line shell and scripting language. Unlike most shells, which accept and return text, PowerShell is built on top of the . #NET Common Language Runtime (CLR), and accepts and returns . NET objects.

To enable script execution in PowerShell:

i. Open Start.

ii. Search for PowerShell, right-click the top-result and click the Run as administrator option.

iii. Type the following command to allow scripts to run and press Enter: Set-ExecutionPolicy RemoteSigned.

iv. Type A and press Enter (if applicable).

Read More



Optimize Opencart website speed

This article will guide you on methods to optimize #OpenCart #Website to boost  and improve speed and pages load time.

OpenCart is one of the most recommended e-commerce platforms used by online merchants to set up their digital store. This PHP based platform provides users with an open source solution, allowing users to download and integrate any additional features to optimize one's e-commerce store.

Sometimes #websites load slowly because of the server. How this works is that your browser notifies your server asking it to send the data for your website over, so that the site can load. 

If there is an issue with the server, this will take longer than normal. The cause of slow servers usually lays with the web host.

To increase your Website page #speed:

1. Enable compression.

2. Minify CSS, JavaScript, and HTML.

3. Reduce redirects.

4. Remove render-blocking JavaScript.

5. Leverage browser caching.

6. Improve server response time.

7. Use a content distribution network.

8. Optimize images.

Read More



Azure Cache for Redis client-side issues

This article will guide you on troubleshoot Azure #Cache for Redis client for issues and fix common Redis #error.

Azure Cache for Redis gives you the ability to use a secure open source Redis cache. It is a dedicated offering managed by Microsoft, to build highly scalable and responsive applications by providing you super-fast access to your data.

All #Redis #data resides in the server's main memory, in contrast to databases such as PostgreSQL, Cassandra, MongoDB and others that store most data on disk or on SSDs.

The way to test for this in Redis is to simply query the key. If the key is empty, populate it. If it is a string use get (or exists).

To configure a storage account for your cache metrics:

1. In the Azure Cache for Redis page, under the Monitoring heading, select Diagnostics.

2. Select + Add diagnostic setting.

3. Name the settings.

4. Check Archive to a storage account.

5. Select Configure to choose the storage account in which to store the cache metrics.

Read More



Modify MSSQL port

This article will guide you on the right steps to change the #MSSQL port using #SQL Server Configuration Manager. 

You can check TCP/IP connectivity to SQL Server by using telnet. For example, at the command prompt, type telnet 192.168. 0.0 1433 where 192.168. 0.0 is the address of the #computer that is running SQL Server and 1433 is the port it is listening on.

To specify a port in SQL Server Management Studio (#SSMS)?

1. You'll need the SQL Server Configuration Manager. 

2. Go to Sql Native Client Configuration, Select Client Protocols.

3. Right Click on #TCP / #IP and set your default port there.

Read More



Disable Password Expiration with PowerShell

This article will guide you on the method to disable password expiration in the #Windows server with PowerShell.

#PowerShell is the shell #framework developed by Microsoft for administration tasks such as configuration management and automation of repetitive jobs. 

The term 'PowerShell' refers to both – the shell used to execute commands and the scripting language that goes along with the framework.

Why did #Microsoft make me change my password?

This is a security feature of all Microsoft accounts which cannot be turned off. 

If the option for 72 days password expiration is enabled in your account then it will automatically ask you to reset password.

To turn off the password feature on Windows 10:

1. Click the Start menu and type "netplwiz." The top result should be a program of the same name — click it to open.

2. In the User Accounts screen that launches, untick the box that says "Users must enter a name and password to use this computer."

3. Hit "Apply."

4. When prompted, re-enter your password to confirm the changes.

Read More



WordPress Login Page Refreshing and Redirecting Issue

This article will guide you on methods to resolve WordPress Login Page Refreshing and Redirecting Issue. 

Your login credentials (username/password) are incorrect. You're being blocked by your security plugin. You changed the WordPress login URL. There's a problem with your #WordPress #site (White Screen of Death, 500 Internal Server #Error, and so on.)

To fix redirect #problems in WordPress:

1. Delete cookies on that specific site.

2. Clear WordPress site, server, proxy, and browser cache.

3. Determine nature of redirect loop.

4. Check your HTTPS settings.

5. Check third-party services.

6. Check your WordPress site settings.

7. Temporarily disable WordPress #plugins.

8. Check redirects on your server.

Read More



Outsourcing Improves Software Development

In summary, in order to stay at the top, it is vital to respond to the demands and trends of your consumers. This is made easy and possible through Outsourcing. Today, we saw how #Outsourcing Improves #Software #Development.

Outsourcing has the potential to improve your business' efficiency, reduce the time to market of your application, and result in significant cost-savings, but only if it is done correctly. There are significant risks involved in outsourcing development as well.

Advantages of Outsourcing includes:

1. Focus on core tasks.

2. Lower costs.

3. Promote growth.

4. Maintain operational control.

5. Offer staffing flexibility.

6. Provide continuity and risk management.

7. Develop internal staff.

Read More



mchk plesk How to use it

This article will guide you on mchk utility in #Plesk and how to use it to fix errors. It helps to repair malfunctioning Plesk services.

By using Plesk Reconfigurator, you can check and #repair Plesk installation that is malfunctioning due to misconfiguration of one or more of its components.

The following problems can be identified and corrected by using the Repair Plesk Installation option:

1. problems with mail delivery caused by user-made changes in DNS server addresses.

2. misconfigurations of system user accounts or groups used by Plesk to access system objects.

3. malfunction of Plesk's services.

4. misconfigurations in user access permissions for files and folders on server disks and hosting folders.

5. miscalculations of disk space usage by individual domains and subdomains.

Read More



Winsock Error 10061 Steps to fix it

This article will guide you on different methods to resolve #Winsock error 10061. A socket error is when there is a problem with the user's #computer or the other computer or server while making this connection.

Winsock is actually short " #Windows sockets," which are files that allow Windows programs to connect to the Internet and other computers. Technically, Winsock is an "Application Programming Interface (#API)," that developers use to make their #programs network-enabled.

To fix Winsock #error in Windows 10:

1. Type netsh winsock reset and press Enter.

2. Type netsh int ip reset and press Enter.

3. Type #ipconfig /release and press Enter.

4. Type ipconfig /renew and press Enter.

Read More



Cloudflare error 1014 CNAME Cross-User Banned

This article will help to resolve #Cloudflare #error 1014 by applying different methods. By default, Cloudflare prohibits a DNS CNAME record between domains in different Cloudflare accounts. #CNAME records are permitted within a domain (www.example.com CNAME to api.example.com) and across #zones within the same user account (www.example.com CNAME to www.example.net).

To fix error 520:

1. Start by logging into Cloudflare. Then, find your site on the list and click on it. Click on your listed site.

2. Next, click on the #DNS tab, then on the orange cloud under the Proxy status section in the table. 

You'll know Cloudflare was disabled because the cloud will have turned gray.

Read More



Cloudflare error 1016 Origin DNS error

This article will guide you on the methods to resolve #Cloudflare error 1016. The main cause of this error is a failed DNS resolution.

Name resolution is the process of converting a host name to an IP address, so a Name Resolution Failure occurs when the Domain Name System (#DNS) used by your computer can't convert website into the relevant IP address.

To resolve Cloudflare error 1016:

1. Verify your Cloudflare DNS settings include an A record that points to a valid IP address that resolves via a DNS #lookup tool.

2. For a #CNAME record pointing to a different domain, ensure that the target domain resolves via a DNS lookup tool.

Read More



Windows Error Code 17

This article will guide you on different methods to tackle Windows Error Code 17 which causes Windows #program to crash, slow Windows performance and periodic system freeze.

#Windows error code 17 is a standard device driver error. This error can be attributed to either a corrupt driver or an outdated driver. To resolve, Do a search for your device #driver and see if the newest version available was released since you bought your hardware. If it was, you probably need to download the newest version.

To Fix #Spotify Could Not Be Started #Error Code 17:

1. Open the “Firewall & network protection” via Search bar;

2. Click on “Allow an app through firewall”;

3. Press “Change settings”;

4. In the list of programs, find Spotify and check the boxes for it under the Private and Public columns. 

If it's absent here, click on the “Allow another app …” button and add it manually.

Read More



GameGuard redundant execution error 115

This article will guide you on different methods to get rid of Windows #Application #Error 115

To fix this #Windows 10 GameGuard error, allow NProtect access through your #firewall, and if it persists, delete #GameGuard directory. If the update isn't successful or GameGuard file is corrupted, try again later or check firewall settings.

To fix GameGuard error 114?

Initialization error 114 could occur in GameGuard in many different cases:

1. System restart(rebooting).

2. Spyware/Virus.

3. Windows Security update.

4. Collisions with other #programs.

Read More



HTTP 400 Bad Request error

This article will guide you on different methods to resolve #HTTP 400 Bad Request error which indicates that the request you sent to the #website #server, often something simple like a request to load a web page, was somehow incorrect or corrupted and the server couldn't understand it.

To Fix 400 Bad Request Error:

1. Check the Submitted URL.

2. Clear Browser #Cache.

3. Clear Browser Cookies.

4. File Upload Exceeds Server Limit.

5. Clear #DNS Cache.

6. Deactivate Browser Extensions.

Read More



SMTP Error 451

This article will guide you on different methods to resolve #SMTP #error 451 which occurs due to the receiving server rejecting your email. 

This can happen for a number of reasons but most likely is due to the recipients server being overloaded with #messages.

To fix SMTP Error: Failed to connect to server:

1. Modify the #firewall rules on the server to allow outbound connections on #ports like 465.

2. Modify the SMTP restrictions on the server.

3. Edit #PHPMailer settings like Host, Port etc.

4. Correct #DNS resolution for mail server.

Read More



Windows error 577

This article will guide you on different methods to fix Windows error 577. This error appears due to the issues with #Security Center that is an in-built Windows tool, which is set to scan the system on a regular basis and inform its user about a pending update, missing software, turned off antivirus, and similar issues.

To repair Windows startup:

1. Hold the Shift key down at the #Windows sign-in screen and press the Power button at the same time.

2. Continue holding the Shift key, then click Restart.

3. Once the PC restarts, it'll present a screen with a few options.

4. From here, click Advanced options.

5. In the Advanced options menu, choose Startup #Repair.

Read More



Microsoft office Error code 1309

This article will guide you on different methods to resolve #Microsoft office Error code 1309. To avoid this error please right click the downloaded file and select “Extract All,” then choose a destination for the files to be extracted to.

If you encountered a problem while installing Office on a PC, try restarting your computer and then attempting to install Office again. If that didn't help, use this easy fix tool to uninstall #Office completely. After your uninstall is complete, try reinstalling Office.

To fix Another installation is already in progress on Windows 10:

1. Restart the #Windows Installer service.

2. End Windows Installer process.

3. Disable Windows Installer service and restart your #PC.

4. Perform Disk Cleanup.

5. Perform a Clean #Boot.

6. Check your #Registry.

7. Uninstall and reinstall Office.

Read More



GlusterFS install CentOS 7

This article will guide you on the steps to install and setup #GlusterFS. 

GlusterFS is a scalable #network filesystem suitable for data-intensive tasks such as cloud storage and media streaming. 

GlusterFS has a client and #server component. Servers are typically deployed as storage bricks, with each server running a glusterfsd daemon to export a local file system as a #volume.

To install GlusterFS:

1. Have at least two nodes. CentOS 7 on two servers named "server1" and "server2".

2. Format and mount the bricks.

3. Installing GlusterFS.

4. #Iptables configuration.

5. Configure the trusted pool.

6. Set up a GlusterFS volume.

7. Testing the GlusterFS volume.

Read More



PowerShell Error clear

This article will guide you on how to tackle PowerShell $Error clear and method to clear errors with $Error. 

To clear error variable when you start #PowerShell, simply run $error. clear(). A downside of this method is that you lose all the errors that were generated before you clear the error variable.

To delete a variable, along with its value, use Remove-Variable or Remove-Item. This cmdlet does not delete the values of variables that are set as constants or owned by the #system, even if you use the Force parameter.

1. You can use this variable to represent an absent or undefined value in #commands and #scripts. 

2. #Windows PowerShell treats $null as an object with a value, that is, as an explicit placeholder, so you can use $null to represent an empty value in a series of values.

Read More



psql to restore a text dump How to do it

This article will guide you on steps to perform  text dump restoration. Basically, psql restores a text dump in the same file format.

You can backup a single table, a #schema, or a complete database. Select the name of the backup source in the #pgAdmin tree control, right click to open the context menu, and select Backup… to open the #Backup dialog. 

The name of the object selected will appear in the dialog title bar.

In #PostgreSQL, you can restore a database in two ways:

i. Using psql to restore plain #SQL script file generated by pg_dump and pg_dumpall tools.

ii. Using pg_restore to restore tar file and directory format created by the pg_dump tool.


To Restore Postgres Database:

1. Restore a postgres database. $ psql -U erp -d erp_devel -f mydb.sql.

2. Backup a local postgres database and restore to remote server using single command: $ pg_dump dbname | psql -h hostname dbname.

3. Restore all the postgres databases.

4. Restore a single postgres table.

Read More



How to set rDNS in Windows Name Servers

This article will guide you on how to set #rDNS records in Windows Name servers. rDNS means mapping the address to a #hostname.

Nslookup is an MS-DOS utility that enables a user to look up the IP address of a domain or host on a network. The #nslookup command can also perform a reverse lookup using an IP address to find the domain or host associated with that IP address.

PTR record ( a pointer record ) is the certain type of DNS record that resolves an IP address to a host name. Getting reverse #DNS going is done by finding the PTR records in use by a DNS server. These PTR records will be managed by the company that is in control of the IP address which was assigned to you.

1. A pointer (PTR) record is a type of Domain Name System (DNS) record that resolves an IP address to a domain or host name, unlike an A record which points a domain name to an IP address. 

2. PTR records are used for the reverse DNS lookup. Using the IP address, you can get the associated domain or host name.

3. An A record should exist for every PTR record. 

4. The usage of a reverse DNS setup for a mail server is a good solution. 

5. While in the domain DNS zone the hostname is pointed to an IP address, using the reverse zone allows to point an IP address to a hostname.

Read More



git fetch failed with exit code 1

This article will guide you on how to get rid of Git fetch error and also the causes of this error. To fix git fetch failed with exit code 1 error, simply add an explicit --force, checking for syntax error, and verifying the configuration file for its properness in case sensitivity. 

Read More



Plesk MSSQL remote connection

This article will guide you on how to enable and resolve #MSSQL related #errors. MSSQL remote connection is disabled in #Plesk servers by default.

To enable remote connections to MS SQL server:

1. Connect to the server via RDP.

2. Press the Start button, go to Microsoft SQL Server XXXX (where XXXX is the MSSQL version) and click the SQL Server XXX Configuration Manager.

3. Open the SQL Server Configuration Manager (Local) > #SQL Server Network Configuration menu and click the Protocols for MSSQLSERVERXXXX (where XXXX is the MSSQL version).

4. Make sure that the TCP/IP protocol has the Enabled status

5. Double-click the TCP/IP protocol, go to the IP Addresses tab and scroll down to the IPAll section.

6. Specify 1433 in the TCP Port field (or another port if 1433 is used by another MS SQL Server) and press the OK button:

Note: the specified port, e.g, 1433, must be opened in the firewall.

Read More



Add special character domain names in cPanel

This article will guide you on how to add special character to #domain #names in #cPanel. A domain name can be up to 63 #characters (letters, numbers or combination) long plus the 4 characters used to identify the domain extension (.com, . net, . org). The only symbol character domain names can include is a hyphen (-) although the domain name cannot start or end with a hyphen nor have consecutive hyphens.

Domain names can only use letters, numbers, the fada character (acute accent) and hyphens (“-“). Spaces and other symbols are not permitted for use. Names cannot begin or end with a hyphen and are not case sensitive.

To customize my domain name:

1. Log in to your Domain.com, hosting account.

2. Go to the Domain Control Panel settings.

3. Click on the Website Builder Icon.

4. Right next to the Domain name you wish to change, click on Options.

5. A menu will drop down, click on Change Domain.

Read More



More about Engintron cPanel

This article will guide you on how to #install #Engintron in #cPanel & fix relating #errors.  Engintron is a third-party plugin to integrate Nginx on cPanel servers. 

Engintron integrates Nginx into cPanel so you can enjoy amazing performance for your sites, without having to sacrifice important hosting features found in cPanel.

Engintron is totally free to use!

The way Engintron sets up Nginx inside your cPanel is a lot like how the popular #CloudFlare CDN works. Nginx (like CloudFlare) directly serves all static content like CSS, JS, images etc. instead of your actual web server, thus lowering the load on your cPanel server.


Engintron is the easiest way to integrate Nginx to your cPanel server:

1. Installation process is not very complicated for Engintron. 

2. Also, installation and updates are very fast, they take only a few seconds. 

3. Engintron is using the official repositories for Nginx, all Engintron software is updated whenever cPanel is updated. If something has changed on Engintron and you need to re-install it, you can install it on top of the previous installation. You don't need to uninstall it first like other Nginx installer plugins for cPanel. It works from CentOS 5 up to CentOS 7. Engintron has an app dashboard inside WHM. 

4. The interface has basic controls for Nginx, Apache, MySQL. These controls allow you to edit various configuration files. Inside the Engintron app dashboard you’ll also find some utilities to monitor things like Nginx access & error logs, check processes on your server or see incoming traffic on port 80. It doesn’t require Nginx or Apache host synchronization when adding new domains via cPanel. 

5. Also, Engintron is released under the GNU/GPL license and is 100% open source.

Read More



PHP header not redirecting error

This article will guide you on ways to fix #PHP #header not #redirecting error which generally occurs mainly due to the absence of ob_start() function, incorrect header formats, and so on. Your target destination server does not allow iframe redirects. Fix: Servers can solely determine if websites hosted on them can be reached via an #iframe redirect. The easiest way to resolve this is to simply change your selection from "Redirect using iframe" to "Redirect URL".

To redirect URL in PHP:

1. You can simply use the PHP header() function to redirect a user to a different page. 

2. The PHP code in the following example will redirect the user from the page in which it is placed to the URL http://www.example.com/another-page.php . 

3. You can also specify relative #URLs.

Read More



Effective methods to control bounce back email messages

This article will guide you on how to control #bounce back #email #messages. Email bounce back is the condition when emails fail to reach the recipient’s inbox. 

The accepted benchmark for bounced emails is 2%. This means for every 100 emails you send, two will be returned to you. Often times, your bounce rate will be much lower. Anything between 2% and 5% is worth noting.

On average maintaining a lower bounce rate is an essential part of your SEO. Normally, your bounce rate should be between 26% - 70%. On average you should maintain between 41% - 55%. However, if you could lower it down to 26% - 40% that's excellent.

To Reduce Email Bounce Rate:

1. Only Use Permission-Based (Opt-In) Email List.

2. Keep Your Subscribers' List Updated.

3. Don't Use Your First Campaign As A Way To 'Clean' Your List!

4. Verify The Email Addresses.

5. Be Consistent With Your Emails.

6. Write Quality Emails.

7. Avoid Creating Spam-Like Emails.

8. Do Not Use Free #Sender #Domains.

Read More



Configure and host an application in Apache web server on Ubuntu

This article will guide you on how to configure #Apache on #Linux. This includes #firewall configuration, managing Apache services, setting up virtual hosts, changing default listening ports, and allowing/denying specific IPs from accessing the #sites.
Apache #HTTP Server is a free and open-source web server that delivers web content through the internet. It is commonly referred to as Apache and after development, it quickly became the most popular HTTP client on the web.
The httpd. conf file is the main configuration file for the Apache web server. It's highly recommended to run Apache in standalone type for better performance and speed. ServerRoot "/etc/httpd" The option ServerRoot specifies the directory in which the configuration files of the Apache server lives.
On most systems if you installed Apache with a package manager, or it came preinstalled, the Apache configuration file is located in one of these locations:
1. /etc/apache2/httpd. conf.
2. /etc/apache2/apache2. conf.
3. /etc/httpd/httpd. conf.
4. /etc/httpd/conf/httpd. conf.

Read More



Server sent passive reply with unroutable address

This article will guide you on ways to resolve #Server sent passive reply with unroutable address which occurs due to bad server settings or when an FTP client is behind #NAT. 

#FileZilla has updated their FTP #client, and FTP over TLS is now used by default. This results in clients being unable to connect to their server from the outside network.

Make sure that you properly set up for FTP over TLS/SSL, explicit and passive ports are allowed on the #firewall and set on Serv-U:

i. Go to the Serv-U settings at: Global Limits & Settings > Settings - Network Settings.

ii. Ensure the Auto-configure firewall through UPnP checkbox is not checked.

iii. Ensure the Packet time-out is set to 300 seconds.

iv. Set #PASV Port Range is 50,000-50,009, and port forward these ports to your router.

This configures the file transfer traffic to be routed through the router and directly to Serv-U through “Port Forwarding”.


If, after this, you are still unable to connect, try disabling the "Block FTP_Bounce and FXP" option - this has been known to cause issues for some clients. To do this, follow the steps below:

1. Navigate to Global > Limits and Settings  > #FTP Settings.

2. Select Global Properties. (If this is not available, first select Use Custom Settings to gain access to it).

3. On the Advanced Options tab, make sure "Block FTP_Bounce and FXP" is unchecked (which it is by default).

Read More



Could not allocate space for object sql server error

This article will guide you on how to fix #SQl #error "Could not allocate space for object" which occurs due to insufficient space in the database. 

SQL SERVER – Msg 1105 – Could Not Allocate Space for #Object Name in Database ‘DB’ Because the ‘PRIMARY’ Filegroup is Full.

Whenever you get such error check below:

1. Check if auto growth is restricted.

2. Check if auto growth is set to a high value which would cause disk space to become full.

3. Check if disk space is low.

4. Check SQL edition because SQL #Express has a database file size limit.

Here is the command to set the growth to UNLIMITED:

[sq]USE [master] GO

ALTER DATABASE


[SQLAuthDB] MODIFY FILE (NAME = N’SQLAuthDB’, MAXSIZE = UNLIMITED)

GO[/sql]

Read More



Troubleshooting DHCP client issues

This article will guide you on troubleshooting different DHCP #client issues. Whenever a DHCP server gets a request from a client it responds with a DHCP offer containing IP address being offered, #network mask offered, the amount of time that the client can use and keep it, the ip address of the DHCP server making this offer.

To #Troubleshoot DHCP:

1. Check for IP Address Conflicts. #DHCP clients connect to the network using a leased IP address.

2. Check Physical Connectivity.

3. Test connections with other Client using a Static #IP Address.

4. Confirm Switch #Port #Configuration.

5. Verify the source of Clients IP Address.

Read More



Optimize Image before Upload Using PHP

This article will guide you on how to #optimize the #image on upload in #PHP. #TinyPNG uses smart lossy compression techniques to reduce the file size of your PNG files. By selectively decreasing the number of colors in the image, fewer bytes are required to store the data. The effect is nearly invisible but it makes a very large difference in file size.

To optimize images for the web:

1. Name your images descriptively and in plain language.

2. Optimize your alt attributes carefully.

3. Choose your image dimensions and product angles wisely.

4. Reduce the file size of your images.

5. Choose the right file type.

6. Optimize your thumbnails.

7. Use image sitemaps.

Read More



Make Element Draggable in AngularJS Without Using any Module

The draggable global attribute is an enumerated attribute that indicates whether the element can be dragged, either with native browser behavior or the #HTML Drag and Drop API. #draggable can have the following values: true : the #element can be dragged. false : the element cannot be dragged.

If you apply draggable() to the modal dialog element, the browser window scroll bars will drag around the screen as you drag the modal dialog. The way to fix that is to apply draggable() to the modal-dialog class instead: $(". modal-dialog").


Read More



Enable firewalld in Centos 7 How to do it

This article will guide you on steps to enable firewalld on #centos 7 servers for our customers. The firewall is one of the most important features of webservers. The #firewalld supports both IPv4 and IPv6 #firewall #settings.

Never run the iptables service and FirewallD service at the same time! The #iptables service is now provided by a separate package called iptables-services: Stop and disable the firewalld service first. # systemctl stop firewalld.

The firewalld daemon manages groups of #rules using entities called "zones". Zones are basically sets of rules dictating what traffic should be allowed depending on the level of trust you have in the networks your #computer is connected to.

To use FirewallD:

1. Installing and Managing FirewallD.

2. To start the service and enable FirewallD on boot: sudo systemctl start firewalld sudo systemctl enable firewalld.

3. Check the firewall status.

4. To view the status of the FirewallD daemon: sudo systemctl status firewalld.

5. To reload a FirewallD configuration: sudo firewall-cmd --reload.

Read More



SQL server error 1326 Steps to fix it

This article will guide you on methods to resolve SQL server error 1326 which occurs due to the IIS Service not having any rights to use the named pipe.

If the SQL server resides on a separate server from IIS, then the IUSR_machinename account needs to be validated on the Windows NT server that SQL resides on.

#SQL #SERVER – Fix : Error : 1326 Cannot connect to #Database Server Error: 40 – Could not open a connection to SQL Server.

Now if SQL Server can be connected perfectly from #local system, but cannot be connected from a remote system, in that case firewall on the server where SQL Server is installed can be issued.

Follow instructions below to fix the issue:

1. Go to control panel >> #Firewall Settings >> Add SQL Server’s Port to Exception List.

2. Now try to connect to SQL Server again. It will allow you to connect to the server successfully.

Read More



Install NET framework 4.8 on windows server 2016

This article will guide you on how to #install .NET framework 4.8 on windows server 2016. 

Can't install .NET Framework 3.5 #Windows 10 0x800f0954?

NET Framework 3.5 or Any Optional #Feature. If the error 0x800f0954 occurs installing optional Windows features, it may be because the system is unable to access the Windows Update server. This is especially true in case of domain-joined computers which is configured to downloads updates from a WSUS server.

By using the Windows server 2016, we can install . NET Framework 3.5 which can be easily installed through Server Manager. 

i) Open the 'Server Manager' and navigate to the 'Manage' and then select 'Add Roles and Features'. 

ii) Click next to 'Features' section and select the option '.

To install Microsoft . #NET Framework 3.5. 1 on Windows Server 2012 R2:

1. Open Server Manager and select Features.

2. Select Add roles and features to launch the Add Roles and Features wizard.

3. In the Add Roles and Features wizard, click.

4. In the Confirm Installation Selections dialog box, click Install.

When you try to install the Microsoft . NET Framework 4.7 on a #computer that runs Windows 7 Service Pack 1 (SP1), Windows Server 2008 R2 SP1, or Windows Server 2012, the setup is blocked and cannot continue. 

This issue occurs when the computer does not have the update for D3DComplier (D3DCompiler_47. dll) installed.

Read More



PHP cURL 403 forbidden error

This article will guide you on different methods to fix #PHP #curl #error which can occur due to syntax errors, mod_security issues, and also due to incorrect coding issues. A 403 #error indicates that the user cannot access certain web pages. It is a generic error that says: "You do not have permission to view this page". 

The "Access Denied" error appears when your Mozilla Firefox browser uses a different proxy settings or VPN instead of what's really set on your Windows 10 PC. Thus, when a #website detected that there is something wrong with your browser cookies or your network, it blocks you which is why you can't open it.Typically, the error is caused by an issue with the #URL or with cached files within the browser.

To fix 403 #forbidden:

1. What is a 403 Forbidden Error?

2. Refresh the Page.

3. Double Check the Address.

4. Clear Your Browser Cookies and Cache.

5. Check if You Have Permission to Access the URL.

Read More



Imagick php install

This article will guide you on how to install #Imagick #PHP #extension. Imagick is the most popular PHP extension which helps to create edit convert, and/or manipulates images. ImageMagick is a free and open source, feature-rich, text-based and cross-platform image manipulation tool used to create, edit, compose, or convert bitmap images. It runs on #Linux, #Windows, #Mac Os X, iOS, Android OS, and many other operating systems.

To use Imagick with PHP in your server, you can easily achieve it with the following #command:

sudo apt-get install php-imagick.

php -m | grep imagick.

sudo service apache2 restart.

Read More



Duplicity restore full backup

This article will guide you on steps to perform a Duplicity-restore full backup. #Duplicity is an efficient #backup application.

#rsync is a protocol built for Unix-like systems that provides unbelievable versatility for backing up and synchronizing data. It can be used locally to back up files to different directories or can be configured to sync across the Internet to other #hosts.

Incremental Backup captures only the changes made since the last incremental backup. Saves both time and #storage space, and ensures that your backup is up to date. Differential Backup captures only the changes made since the last full backup, not since the last differential backup.

When a normal or full backup runs on a selected drive, all the files on that drive are backed up. This, of course, includes system files, application files, user data — everything. The downside of normal backups is that they take a very long time to run, and in some cases this is more time than a company can allow.

To Use Duplicity with GPG to Securely Automate #Backups on #Ubuntu:

1. Install the Prerequisite Packages.

2. Download and Install Duplicity from Source.

3. Create SSH Keys.

4. Create GPG Keys.

5. Run an Initial Test.

6. Create Your First Backup.

7. Restore a Backup.

Read More



How to install OBS on Linux Windows and MacOS

This article will guide you on steps to #install #OBS on #Windows. Also, we saw some common errors that we came across while installing OBS.

Open Broadcaster Software (OBS) is a free and open-source cross-platform streaming and recording program built with Qt and maintained by the OBS Project. There are versions of OBS Studio available for Microsoft Windows, macOS, and Linux distributions. OBS is funded on Open Collective.

As a standard Windows application, OBS should run fine on Windows 10 without any issues in the core program. However, OBS makes heavy use of advanced hardware features, particularly on your GPU such as texture sharing and hardware encoding. Windows 10 will come with new #drivers for your hardware, including your #GPU.

To set up OBS for #streaming:

1. Run the auto-configuration wizard. When you load OBS Studio for the first time you should see the Auto-Configuration Wizard.

2. Set up your audio devices. By default, OBS Studio is set to capture your system default desktop audio device and microphone.

3. Add your sources for video.

4. Test your stream and record settings.

Read More



Windows Live Mail Error 0x800ccc0e

This article will guide you on steps to fix #Outlook #Error #0x800ccc0e. Usually, this error occurs due to bad #email settings or because of minor problems with the email server or internet connection. Also, the customer may experience this error while receiving the mail on the email #client.

Try to run Windows Live Mail as Administrator in compatibility mode. Try to re-configure the Windows Live Mail account. Remove the existing WLM account and create a new one. Try reinstalling Windows Essentials 2012 on your Windows 10.

To get rid of Windows Live Mail error:

1. Open your Windows Live mail program.

2. Select the Home tab at the top right of your Windows Live Mail.

3. Click the Outbox to the left. Find any emails that are not sending out.

4. Once you send the email again, you can delete the email in the Outbox. 

The error will go away after the sent email is deleted.

Read More



FileZilla connection closed by server

This article will guide you on how to resolve #FileZilla connection closed by #server. Also we discussed about the causes for the FileZilla connection getting closed by the server.

If your computer cannot connect to that server, then either your FTP software is not working correctly, or something on your #computer (probably a #firewall or other security software) is blocking all #FTP connections. You may want to try using other FTP software such as the free FileZilla.

In general, connection refused #errors are generated during a connect system call when an application attempts to connect using #TCP to a server port which is not open.

To fix FTP Connection refused error:

1. Make sure ftp server installed. Make sure ftp server installed and service is running.

2. Is ftp server running (is port 21 open)? Login to ftp server using ssh and try to telnet port 21 (to see port is open or not).

3. FTP user permissions.

4. Security or Firewall.

Read More



IMAP server closed the connection 0x800cccdd

This article will guide you on steps to resolve #IMAP #server closed the connection #0x800cccdd #Outlook #error. We also saw that the reason for this error is an incorrect IMAP settings. 

A server connection #timeout means that a server is taking too long to reply to a data request made from another device. Timeouts are not a reply message: they show up when there isn't a reply and a server request is not fulfilled in a predetermined length of time.

Sometimes Outlook users get the 0x800CCCDD error ('Your IMAP server closed the connection') whenever they send or receive #emails via an IMAP account. This particular error code is signaling that the Send/Receive feature has failed.

To stop Outlook from timing out:

1. Click Outlook 2010's "File" tab.

2. Double-click an email account's name in the list to edit its settings.

3. Click the "Advanced" tab on the settings window, then locate the Server Timeouts section.

4. Click "OK" and then "Cancel" to save the new timeout setting for the selected account.

Read More



ISPConfig DKIM to verify mail server

This article will guide you on how to enable #DKIM on ISPConfig control panel. DKIM is an authentication standard for a domain name that sends an email, for use against spam and phishing. 

It's possible to have more than one DKIM key published in your #DNS records. So, the DKIM selector is important for ensuring that your emails can be properly authenticated. The <selector> field specifies which DKIM key you're using, and the <header domain> field is filled with your domain name.

To generate DKIM Record in #ISPConfig:

1. Login to ISPConfig.

2. Click on Email.

3. Inside Email Accounts >> Select Domain and click on Mail Domain name.

4. Click on #DomainKeys Identified Mail (DKIM).

5. Tick Enable DKIM and Click on Generate DKIM Private-key Button.

6. Copy #DNS Record and add it to your DNS with its DKIM Selector.

7. Click on Save Button.

Read More



Microsoft SQL server error 18470 How to fix it

This article will guide you on the different factors that causes SQL server error: 18470 and also how to fix this #error.

In SQL Server Configuration Manager, in the left pane, click SQL Server Services. In the results pane, right-click SQL Server (#MSSQLServer) or a named instance, and then click Start, Stop, Pause, Resume, or Restart.

User gets the #Microsoft SQL Server Error: 18470. This may happen if the SA (System Administrator) user account is disabled in #SQL Server. It can be verified by trying to log in to SQL Server Management Studio (#SSMS) using the SA account. In the Login Properties screen, select Status on the left side.

To Microsoft SQL Server Error 18456:

1. Log In with Remote Desktop.

2. Run Microsoft SQL Server Management.

3. Checking the Server Authentication Mode.

4. Restart the SQL Service.

5. Checking SQL User Permissions.

6. Mapping the User to the #Database.

Read More



HTTP IIS redirect not working

This article will guide you on different methods to fix HTTP IIS redirect not working #error. There are several reasons why you might want to redirect clients to a new location. For example, if your company is migrating to a new Web site, you could redirect all requests from the old Web #site to the new Web site. Likewise, if you have deployed a new #application on a Web server, you could redirect all requests for the old application's #URL namespace.

To install HTTP Redirection on IIS 7 and later:

1. On the taskbar, click Server Manager.

2. In Server Manager, click the Manage menu, and then click Add Roles and Features.

3. In the Add Roles and Features wizard, click Next. Select the installation type and click Next. Select the destination server and click Next.

4. On the Server Roles page, expand Web Server (#IIS), expand Web Server, expand Common HTTP Features, and then select HTTP Redirection. Click Next.

5. On the Select features page, click Next.

6. On the Confirm installation selections page, click Install.

7. On the Results page, click Close.


Also, you can Configure the HTTP status #code, which can be one of these three options:

i. 301 Permanent.

ii. 302 Found.

iii. 307 Temporary.

iv. 308 Permanent #Redirect.

Read More



Reset Windows Administrator Password from Hyper-V

This article will guide you on steps to reset the forgotten #Windows Administrator password from Hyper-V using an #ISO file.

Microsoft's Hyper-V virtualization can greatly reduce cost of operations. By purchasing a few very powerful #servers you can virtualize all or most of your entire infrastructure while reducing the cost of #hardware and maintenance.

To Reset Lost Admin Password for Hyper-V Virtual #Machine:

1. Select the administrator account, then click the Reset Password button to reset the password to blank. 

2. Click the Restart button to reboot the virtual machine, you are able to log in to the administrator account with a blank password.

Read More



Install Drush on Drupal 8

This article will guide you on steps to #install #Drush in #Drupal 8. Drush is a command-line utility to manage Drupal #CMS. For this installation of the Drush scripting interface, we will be working primarily on the command line. This is because Drush is a command line interface, and all of the commands you will use will need to be issued from there.

Drush is the command line shell and Unix scripting interface for Drupal.

To Install a global Drush via #Composer:

1. Install Composer globally.

2. Install the cgr tool following the instructions in that project.

3. Add composer's bin directory to the system path by placing export PATH="$HOME/.

4. Install latest stable Drush: cgr drush/drush .

5. Verify that Drush works: drush status.

Read More



VestaCP mail not working How to fix

This article will guide you on different methods to resolve #Vestacp #mail #problems which generally occurs mainly due to #Exim problem, firewall issues, and so on. This tips will resolve the #email problems in VestaCP.

To fix email not working:

1. Verify your internet connection is working. If it's not, there are four things you can do to fix it.

2. Make sure you're using the correct email server settings.

3. Confirm your password is working.

4. Confirm you don't have a security conflict caused by your firewall or antivirus #software.

Read More



SMTP error 10051 How to resolve

This article will guide you on the causes and different methods to solve SMTP #error #10051 which occurs due to improper #SMTP authentication, ISP #firewall issues, #Antivirus on #PC, and so on. You can generally find your SMTP server address in the account or settings section of your mail client.) When you send an email, the SMTP server processes your email, decides which server to send the message to, and relays the message to that server.

To fix email not connecting to server:

1. Check your internet connection.

2. Check your SMTP server details.

3. Verify all usernames and passwords.

4. Check your SMTP server connection.

5. Change your SMTP port.

6. Control your antivirus or firewall settings.

Read More



How Chmod 777 works

This article will guide you on how to give #Chmod 777 to folders and files in #Linux. We also discussed the risks and more information about file permissions. 

If you are managing a Linux system, it is crucial to know how the Linux #permissions work.

You should never set 777 (rwxrwxrwx) permissions #files and #directories permissions. 777 means that anyone can do anything with those files.

To Give Root Privileges to a User in Linux:

1. Adding to Root Group using usermod. Let see how we can grant normal user root access by adding to root group.

2. Adding to #Root Group using Useradd Command.

3. Editing /etc/passwd file.

4. Setting as Sudo User.

Read More



Add User To Group in Linux

This article will guide you on how to add a #user to a #group in #Linux. The group permissions apply only to the group that has been assigned to the file or directory, they will not effect the actions of other users. The others permissions apply to all other users on the system, this is the permission group that you want to watch the most.

Groups can be thought of as levels of #privilege. A person who is part of a group can view or modify files belonging to that group, depending on the permissions of that file. User belonging to a group has privileges of that group, for example - sudo groups lets you run software as super user.

To view all groups present on the system simply open the /etc/group file. Each line in this file represents information for one group. Another option is to use the getent command which displays entries from #databases configured in /etc/nsswitch.


To Create a New Sudo User:

1. Log in to your server as the root user. #ssh root@server_ip_address.

2. Use the adduser command to add a new user to your system. Be sure to replace username with the user that you want to create.

3. Use the usermod command to add the user to the wheel group.

4. Test sudo access on new user account.


To List Users in Linux:

i. Get a List of All Users using the /etc/passwd File.

ii. Get a List of all Users using the getent Command.

iii. Check whether a user exists in the Linux system.

iv. System and Normal Users.

Read More



Vim Show Line Numbers in Linux

This article will guide you on how to show line numbers in #Vim. You can ask #nano to temporarily turn on line numbers by pressing Alt-C (meaning “Hold down the Alt key and the C key simultaneously”). This will show line and column numbers near the bottom of nano's window.

To Turn on absolute line numbering by default in vim:

1. Open vim configuration file ~/.vimrc.

2. Append set number.

3. Press the Esc key.

4. To save the config file, type :w and hit Enter key.

5. You can temporarily disable the absolute line numbers within vim session, type:/> :set nonumber.


Use the “:set number” command if you want to enable absolute line numbers; or “:set relativenumber” for relative Vi numbers.

If you want to turn off the line numbering, remember the command “set nonumber.”

When you have both absolute and, hybrid numbers enabled, you’ll have access to the hybrid mode!

Read More



How to tell if its a leap year with PHP

This article will guide you on how to work with PHP date() function to work out if the current year, or a specific year, is a leap year or not. 

JavaScript is the client side scripting language and PHP is the server side scripting language. In #PHP, HTML is used as a string in the code. In order to render it to the browser, we produce JavaScript code as a string in the PHP code.

PHP #program to check if a year is leap year or not:

php #function year_check($my_year) { if ($my_year % 400 == 0) print("It is a leap year"); if ($my_year % 4 == 0) print("It is a leap year"); else if ($my_year % 100 == 0) print("It is not a leap year"); else print("It is not a leap year"); } $my_year = 2024; year_check($my_year); ?>

Read More



Executing queries from the MySQL Command Line

This article will guide you on how to run queries from the 3MySQL command line. The MySQL #Command Line Tool is a useful way to run #queries from the command line. It’s easy to run select queries and display the results in either a horizontal or vertical format, and the queries run are kept in a history file which you can navigate through. 

If you don't want to run a particular query after all you can use the c command to clear it.

The most common way to get a list of the MySQL #databases is by using the mysql client to connect to the MySQL server and run the SHOW DATABASES command. If you haven't set a password for your MySQL user you can omit the -p switch.

To Connect to a MySQL Database:

1. Click Services tab.

2. Expand the Drivers node from the Database Explorer.

3. Enter User Name and Password.

4. Click OK to accept the credentials.

5. Click OK to accept the default schema.

6. Right-click the MySQL Database #URL in the Services window.

Read More



SQLSTATE42000 syntax error or access violation

This article will guide you on methods to resolve 'sqlstate42000 #syntax error or access violation' which occurs due to wrong syntax entry or extra space or no space in the user's #SQL #query. 

The #1064 error displays any time you have an issue with your SQL syntax, and is often due to using reserved words, missing data in the database, or mistyped/obsolete commands.

As you can see there is more than one cause for the 1064 error within MySQL code. Now, you know how to correct the issues with your SQL Syntax, so your query can run successfully. This list will be updated as more specific instances are reported.

Read More



Install and Configure OpenSSH on windows

This article will guide you on steps to install and configure #OpenSSH on #windows. Also, we saw some common errors relating to OpenSSH.

OpenSSH is the premier connectivity tool for remote login with the #SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks.

i. To install OpenSSH, start Settings then go to Apps > Apps and Features > Manage Optional Features. 

ii. Scan this list to see if OpenSSH client is already installed. 

iii. If not, then at the top of the page select "Add a feature", then: To install the OpenSSH client, locate "OpenSSH Client", then click "Install".

To Enable the OpenSSH Server in Windows 10:

1. Open the #Settings app and go to #Apps -> Apps & features.

2. On the right, click Manage optional features.

3. On the next page, click the button Add a feature.

4. In the list of features, select OpenSSH Server and click on the Install button.

5. Restart Windows 10.

Read More



Zero sized reply squid error in Horde

This article will guide you on how to fix #Horde webmail 'Zero sized reply squid #error' by making changes to the system configuration file of #Apache. This error occurs in webmail in Plesk after the upgrade of the Plesk version.

#Squid is a caching and forwarding #HTTP web 3proxy. It has a wide variety of uses, including speeding up a web server by caching repeated requests, caching web, DNS and other computer network lookups for a group of people sharing #network resources, and aiding security by filtering traffic.

To fix this error:

1. Try to add to squid.conf an option:

server_http11 on

and restart squid.

2. Put the website to Proxy Exception.

Read More



Recover deleted items in Microsoft outlook

This article will guide you on methods to recover deleted #emails in #Outlook. This is possible by retrieving contents from the Recoverable Items folder. 

By default, the deleted #items won't be included while searching in Outlook. Actually Outlook provides you with a feature of automatically searching all folders include emails in the Deleted Items folder in each #data file.

To Recover Permanently Deleted #Hotmail Messages:

1. Go to Outlook.com and log in to your Live, Hotmail, or other Microsoft email account. 2. Select the Deleted Items folder in the left pane. 

3. Select Recover items deleted from this folder at the top of the message list. The Recoverable Items folder will open.

Read More



Windows Activation Error Code 0xc004f074

This article will guide you on methods to fix #Windows activation error code #0xc004f074 and its causes.

When attempting to activate the Windows operating system, users sometimes receive the 0xC004f074 error code. This is a Windows Activation error that occurs when Windows is unable to reach your company's activation service or system administrator.

Changing your Windows #Product Key does not affect your personal files, installed applications and settings. Enter the new product key and click Next and follow the on screen instructions to #activate over the Internet.

To fix error 0xc004f074 in Windows 10:

1. Use the slmgr. vbs command.

2. Use the Slui 3 command. While on your start screen you need to press and hold the button Windows and the button R.

3. Run SFC scan.

4. Run the Update and Activation #Troubleshooters.

5. Contact #Microsoft Support.

Read More



ISPConfig 500 internal server error

This article will guide you on different ways to resolve #ISPConfig 500 internal server #error and also you will learn about some factors that triggers this error such as exceeded MaxRequest value or PHP-fpm issue. 

The HyperText Transfer Protocol (#HTTP) #500 Internal Server Error server error response code indicates that the server encountered an unexpected condition that prevented it from fulfilling the request. Usually, this indicates the server cannot find a better 5xx error code to response.

The 500 internal server error runs on every page of your site when there's a problem with the server or file system that's powering your site. 

The cause most likely occurs in the root directory, where your WordPress files are, but it can also be caused by a problem on your host's server.

To Resolve 500 Internal Server Error:

1. Debugging the Issue. The first step is to make sense of the situation and try to make sense of the error.

2. Check if the Admin Works.

3. Revert Recent Changes.

4. Audit Your #Plugins/Extensions/Modules.

5. Check File Permissions.

6. Increase PHP #Memory Limit.

Read More



Vestacp 502 bad gateway error

This article will guide you on common causes for #Vestacp #502 bad gateway #error and different methods to fix this error.

A 502 Bad Gateway indicates that the edge server (server acting as a proxy) was not able to get a valid or any response from the origin server (also called upstream server).

Server software timeouts: This error can also occur when a web server takes more time to complete and a caching tool reaches its timeout values that time. Slow queries can also cause this problem too.'

To fix Error 502 Gateway:

1. Refresh the page.

2. Start a new browser session or load the site on a different browser.

3. Restart your computer and networking equipment.

4. Clear your #cache and cookies.

5. Change your #DNS server.

Read More



The application failed to start correctly 0xc00007b in Windows

This article will guide you on steps to fix #application failed to start correctly #0xc00007b in Windows which occurs due to different reasons.

Application Error #0xc0000005 (Access Violation) error is usually caused by your computer not being able to correctly process the files and settings required to run a particular program or installation.

To can apply the methods below and see if they can help you get rid of this error.

1) Reboot your computer.

2) Run your application as #administrator.

3) Reinstall your application.

4) Reinstall Microsoft .NET #framework (for Windows 7 or below)

5) Reinstall Microsoft Visual C++ Redistributable Packages.

6) Update your #Windows.

Read More



Add domain in PRTG

This article will guide you on how to add a #domain in the #PRTG #monitoring system.

PRTG is a network monitoring system to monitor a #website.

If you are working in more complex environments or those with a desire to reduce the number of authentication mechanisms on their networks, PRTG includes the option to easily integrate with Active Directory (AD).

1. PRTG additionally adds the probe device to the local probe. This is an internal system device with several sensors. It has access to the probe system and monitors the system's health parameters. 

2. PRTG automatically analyzes the devices that you add and recommends appropriate #sensors on the device's Overview tab.

Read More



Transfer Files with Rsync on Windows using SSH connection

This article will guide you on steps to perform Rsync from Windows to Linux over SSH.

#Rsync can use #SSH as a secure transport agent. Make sure rsync is installed by opening a #terminal session and typing rsync --version on each machine.

Most #Linux distributions can now read the FAT32 or NTFS disk formats natively, so you could copy your files to an external hard drive formatted in Windows with either of those file systems, which will then allow you to read the data back easily in Linux.

1. cwRsync is an implementation of rsync for Windows. 

2. rsync uses a #file #transfer technology specified by the rsync algorithm, transferring only changed chunks of files over the network. 

3. #cwRsync can be used for remote file #backup and #synchronization from/to Windows systems.

Read More



HTTP IIS error 500 19

This article will guide us on steps to fix #IIS #error 500.19. To fix the error, we verify the user permissions and make sure the ASP.NET version is right.

The error 500.19 is an internal server error often occurring on a server using Microsoft IIS software. It indicates that the configuration data for the page is invalid.

To solve the issue, delete the malformed XML element from the Web.config file or from the ApplicationHost.config file.

Read More



Security certificate does not specify subject alternative names

This article will guide you on steps to fix #Security certificate does not specify subject alternative names. 

Basically, the #error, Security certificate does not specify subject alternative names trigger if the certificate does not have the correct SubjectAlternativeName extension.

Subject Alternative Names or SANs allow you to secure multiple domains from one SAN SSL certificate. SANs are additional domain names added to an SSL certificate.

To add a Subject Alternative Name to a certificate:

1. If you want to add #SAN, most CAs allow you to reissue a certificate with new details, though this will usually revoke your old certificate. 

2. You don't need the old CSR to reissue a certificate, you can instead create a new CSR with the updated details using a new or existing private key.

The Subject Alternative Name (#SAN) is an extension to the X. 509 specification that allows users to specify additional host names for a single SSL certificate. The use of the SAN extension is standard practice for #SSL #certificates, and it's on its way to replacing the use of the common name.

Read More



Modprobe vboxguest failed in Ubuntu

This article will guide you on the easiest way to fix #modprobe #vboxguest error. Basically, the modprobe vboxguest #error occurs when we are installing the virtual box in #Ubuntu.

The primary benefits of virtual memory include freeing #applications from having to manage a shared memory space, ability to share memory used by libraries between processes, increased security due to #memory isolation, and being able to conceptually use more memory than might be physically available.

To Install Guest Additions for #Windows:

1. Launch the guest OS in VirtualBox and click on Devices and Install #Guest Additions. 

2. The AutoPlay window opens on the guest #OS and click on the Run #VBox #Windows Additions executable. 

3. Click yes when the UAC screen comes up. 

4. Now simply follow through the #installation wizard.

Read More



Windows PSExec error code 20

This article will guide you on methods to resolve #PsExec #errors. Also you will learn common mistakes made when executing PsExec #commands.

PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console #applications, without having to manually install #client #software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like #IpConfig that otherwise do not have the ability to show information about remote #systems.

Read More



Laravel Contact Form to Send Emails with SendGrid

This article will guide you on steps to follow to create a #Laravel contact form to send #emails with the help of SendGrid.

#SendGrid manages all of the technical details, from scaling the infrastructure to #ISP outreach and reputation monitoring to whitelist services and real time analytics.

To integrate with SendGrid's #SMTP #API:

1. Create an API Key with at least "Mail" permissions.

2. Set the server #host in your email client or application to smtp.sendgrid.net.

3. Set your username to apikey.

4. Set your password to the API key generated in step 1.

5. Set the #port to 587.

Read More



Restore a database in Alwayson Availability Group

This article will guide you on steps to restore a #database in alwayson availability group.

If you receive an #error that the database is in use, try to set the user to single user mode: USE master; GO ALTER DATABASE Database_name SET SINGLE_USER WITH ROLLBACK IMMEDIATE; Then try the restore with #recovery command again. Also, make sure you are on the latest service pack or cumulative update.

Creating a #SQL #Server AlwaysOn Availability Group.

Open SQL Server Management Studio and connect to the SQL Server instance. Expand the AlwaysOn High Availability folder in the Object Explorer. Right-click on the Availability Groups folder and select the New Availability Group Wizard.

To Restore a Database in a SQL Server AlwaysOn Availability Group:

1. Make the secondary server from which the backups were taken the primary server.

2. Remove the database to be restored from the AlwaysOn Availability Group.

3. Restore the database.

4. Add the database back into the Always Availability Group.

Read More



Windows update error 0x800B0109

This article will guide you on steps to fix the #windows #update error 0x800B0109.

Windows error code #0x80070422 refers to an inability of Windows 7 to startup the Windows Update service so your computer can connect to the update servers at Microsoft.

Steps For Fixing #Error Code #0x800b0109:

1. Open Administrative Tools from Control Panel. Open Control Panel, type administrative tools in the search box, and then click Administrative Tools.

2. Double-click Services.  If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.

3. Right-click the Background Intelligent Transfer Service (BITS) service, and then click Properties.

4. On the General tab, next to Startup type, make sure that Automatic (Delayed Start) is selected.

5. Next to Service status, check to see if the service is started. If it’s not, click Start.

6. Click OK to close the #Properties dialog box.

7. Right-click the Windows Event Log service, and then click Properties.

8. On the General tab, next to Startup type, make sure that Automatic is selected.

9. Next to Service status, check to see if the service is started. If it’s not, click Start.

Read More



curl 9 Server denied you to change to the given directory

This article will guide you on steps to fix curl 9 Server denied you to change to the given directory. This #curl #error occurs when we are denied access to the resource given in the URL.

Curl is a #command line tool and library which implements protocols like #HTTP, #HTTPS, FTP and so on. Curl also supports HTTPS protocol which is secure version of the HTTP.

curl is a widely used because of its ability to be flexible and complete complex tasks. For example, you can use curl for things like user authentication, HTTP post, #SSL connections, proxy support, FTP uploads, and more! You can also do simple things with curl, such as #download web pages and web images.

Read More



Ansible Playbook to Install WordPress with LAMP

This article will guide you on the step to follow to use #Ansible Playbook to install #WordPress with #LAMP on #Ubuntu 18.04.

In Ansible, the role is the primary mechanism for breaking a #playbook into multiple files. This simplifies writing complex #playbooks, and it makes them easier to reuse. The breaking of playbook allows you to logically break the playbook into reusable components.

To start using Ansible:

1. Prerequisites.

2. Install Ansible.

3. Establish a manual connection to a managed node.

4. Run your first network Ansible command.

5. Create and run your first network Ansible Playbook.

6. Gathering facts from network devices.

Read More



Configure Reporting Services in SQL Server

The article will guide you on the steps to follow to configure #reporting services after renaming the #SQL server. Also , you will learn how to rename the SQL server instance. 

To Configure #Report Server After Renaming SQL Server #Instance:

1. Go to #Database Setup page. 

2. Enter SQL Server name in Server Name and then click Connect. 

3. If Reporting Services is configured using the server name, you must update the database connection information whenever the server name is changed.

To change the service account for SQL Server Reporting Services:

i. Open Reporting Services Configuration Manager, and then connect to the instance of SQL Server Reporting Services.

ii. Click #Microsoft service Identity on the left pane.

iii. Change the account and the password in the Account text box and the Password text box, and then click Apply.

Read More



Harden the security of Django

This article will guide you on steps to #harden the #security of #Django. We leveraged python-dotenv for handling secrets and settings.

Our sensitive mostly kept in settings.py file. We can protect that data using Python Decouple #Library. It is the library for separating parameters from the source code.

To make Django secure:

1. Use #SSL.

2. Change the URL.

3. Use 'django-admin-honeypot'.

4. Require stronger passwords.

5. Use two-factor authentication.

6. Use the latest version of Django.

7. Never run 'DEBUG' in production.

Read More



Install imagemagick on CentOS

This article will guide you on steps to #install #ImageMagick and fix its errors. Basically, ImageMagick is used to manipulate the digital images.

ImageMagick helps to create, edit, compose, or convert #bitmap images. It can read and write images in a variety of formats (over 200) including #PNG, JPEG, GIF, HEIC, TIFF, DPX, EXR, WebP, Postscript, PDF, and #SVG.

To install ImageMagick from the source:

1. First #download the latest version of the program sources - ImageMagick.

2. Unzip the package to a folder of choice.

3. In the folder where you have unzipped ImageMagick run the configuration script.

4. If no errors were found, you can start the install process.

Read More



RoundCube CONNECTION FAILED Database Error

This article will guide you on the different methods to fix Database Error: Connection Failed error shows up due to database errors or #PHP #errors. 

Establishing a Database Connection #Error basically means that for some reason or another the PHP code was unable to connect to your #MySQL database to retrieve the information it needs to fully build that page. That's why the error is always shown on a blank page because there is no information about your site as it is not connected to your database.

Establishing a Database Connection Error Occur due to:

1. Incorrect Login Credentials.

2. Corrupt #Database

Read More



Exim error 53 How to fix it

This article will guide you on how to fix Exim #error #53 which occurs as a result of #database corruption or due to any server related #problems. 

If you find the following error in your EXIM logs, it means that your EXIM #databases could be corrupted.

defer (-53): retry time not reached for any host


The fix is to rebuild exim #databases. To rebuild #exim databases you can run the following commands as root:

/usr/sbin/exim_tidydb -t 1d /var/spool/exim retry > /dev/null

/usr/sbin/exim_tidydb -t 1d /var/spool/exim reject > /dev/null

/usr/sbin/exim_tidydb -t 1d /var/spool/exim wait-remote_smtp > /dev/null

/scripts/eximup --force

Read More



When You Are Locked Out of WordPress Admin

This article will guide you on different ways to tackle Your #WordPress Site #error when you Are Locked Out of WordPress #Admin #Dashboard.
A common reason that can lock you out of the WordPress admin area is error establishing the #database connection. Usually, this error occurs when your database is corrupted, unresponsive or your web #hosting service provider has issues with its servers. Sometimes, this error can last for hours and spoil your user experience badly.

Read More



WordPress Memory Exhausted Error

This article will guide you on steps to resolve #WordPress #memory exhausted #error by simply increasing #PHP memory limit.
The memory exhausted errors only occur when your web host allocated lower amounts of memory for each website.
To increase the PHP memory limit, you need to manually set a new memory limit for your server. This involves editing the wp-config.php file located in the server.

Read More



DirectAdmin Skin or Interface Issues

This article will guide you on different methods to fix #DirectAdmin #skin or #interface issues.
To fix DirectAdmin Skin or Interface Issues:
What if the DirectAdmin skin is corrupted? How to fix DirectAdmin Skin or Interface Issues? Here are some steps you can try.
1. Reinstall skin.
cd /usr/local/directadmin/data/skins/
./packskins.sh
2. Recompile PHP using the following commands.
cd /usr/local/directadmin/custombuild
./build update
./build clean
./build php d
These steps will fix almost every issues with DirectAdmin skin.

Read More



New files of configuration for Apache error in Plesk

This article will guide you on methods to fix the Plesk error : new files of configuration for Apache.
The causes of this Plesk error:
1. Mailman package is not installed.
2. Database related error.
3. PHP memory issue.
To fix this Plesk issue:
Mailman package is not installed
When you try to reconfigure the domain, you will get the following error.
# /usr/local/psa/admin/sbin/httpdmng --reconfigure-all
No valid mailman bindir detected
So, in this case it is clear that the issue is causing because the mailman package is missing.
To fix the issue, you can follow the steps mentioned below.
a) Download and install the mailman package from  http://autoinstall.plesk.com
b) After that remove all entries from the ‘Configurations’ table of the ‘psa’ database.
mysql -uadmin -p`cat /etc/psa/.psa.shadow` psa -e"delete from Configurations"
c) Remove all ‘Include’ records from configuration files and all content from the directory below:
# sed -i /Include/d /usr/local/psa/admin/conf/ip_vhosts_bootstrap.conf&& sed -i /Include/d /usr/local/psa/admin/conf/vhosts_bootstrap.conf&& sed -i /include/d /usr/local/psa/admin/conf/nginx_vhosts_bootstrap.conf&& sed -i /Include/d /usr/local/psa/admin/conf/webmail_horde_bootstrap.conf&& sed -i /Include/d /usr/local/psa/admin/conf/webmail_atmail_bootstrap.conf&& sed -i /Include/d /etc/httpd/conf.d/zz010_psa_httpd.conf&& rm -f /usr/local/psa/admin/conf/generated/*
d) Now you can reconfigure and that will fix the issues.
/usr/local/psa/admin/bin/httpdmng --reconfigure-all
This will resolve the error.

Read More



An error has occurred in DNN Websites

This article will guide you on how to easily fix 'An #error has occurred' error message appears in #DNN #Pages which occurs when there is a null entry in the #database table. We also looked into the steps for adding the temporary URL.
When trying to add a file attachment to the #DotNetNuke forum module, we received an error that looked like this:
An Error Has Occurred When Attempting To Save The File C:\webroot\site\site.com\wwwroot\Portals\0\imge.jpg. Please Contact Your Hosting Provider To Ensure The Appropriate Security Settings Have Been Enabled On The Server.
If you have a superuser account (common username is HOST) you can login and go to the Host menu, and see if you have an EXTENSIONS page listed, from that page you can see what version of DNN you are on. you can also try the HOST/HOST SETTINGS page.

Read More



Webmail timeout issue in DirectAdmin


This article will guide you on how to resolve #timeout #error in #webmail in #DirectAdmin. Generally, webmail timeout issue can occur if the timeout value is exceeded.
The term timeout or time-out has several meanings, including: A network parameter related to an enforced event designed to occur at the conclusion of a predetermined elapsed time.
To fix Webmail timeout error in DirectAdmin:
Modify the config file "/var/www/html/webmail/inc/config.php" or in /var/www/html/webmail/inc/config.security.php
and set
Code:
# Session timeout for inactivity
#
$idle_timeout = 10; //minutes
to whatever value you need.

Read More



Database version or build from backup file

This article will guide you on how to determine the database #version or build from a #backup file.
To know what #SQL version a #database is:
The first is by using either Enterprise Manager or SQL Server Management Studio and right clicking on the instance name and selecting Properties. In the general section you will see information such as on the following screenshots. The "Product version" or "Version" gives you a number of the version that is installed.
In order to find the SQL Server version from a bak file:
1. Here is the output returned by the RESTORE HEADERONLY statement. Here you will see a DatabaseVersion column that contains the value.
2. That's how you find out from which version of SQL Server a given backup file came.

Read More



Improve SQL Server Bulk Data Import Performance

This article will guide you improve #bulk #data #import #performance. The BULK INSERT command is much faster than bcp or the data pump to perform text file import operations, however, the BULK INSERT statement cannot bulk copy data from #SQL Server to a data file. Use the bcp utility instead of DTS when you need to export data from the SQL Server table into a text file.
To Speed up SQL Bulk Insert with #transactions:
1. Declare the variables that store the number of desired items ( @items ), the size of the chunks( @chunk_size ) and the counter of the number of executed inserts( @counter )
2. Open the first transaction and initialize the while loop.

Read More



Rsync to Exclude Files and Directories

This article will guide you on easily exclude #files and #directories using the #rsync #command.
The --exclude option with the rsync command uses relative paths to the source #directory. Append the --exclude option to the rsync command, followed by the relative path to a directory or file(s).
The basic syntax for the rsync exclude option looks like this:
rsync [OPTIONS] --exclude 'file_or_directory' source/ destination/
Replace source/ with the directory name you want to use as a source for data transfer to another location.
Replace destination/ with the directory name rsync will use as the target location for your data. If the directory does not exist, rsync creates one for you and transfers the files to that directory.

Read More



Install Froxlor on CentOS 7

This article will guide you on steps to #install Froxlor on #CentOS 7 and also resolve common Froxlor #errors.
#Froxlor is a simple but powerful server administration #software for managing #domains, emails and files.
To install Froxlor web hosting control panel:
1. Ensure that your webserver serves /var/www.
2. Extract froxlor into /var/www.
3. Point your browser to http://[ip-of-webserver]/froxlor.
4. Follow the #installer.
5. Login as #administrator.
6. Adjust "System > Settings" according to your needs.
7. Choose your distribution under "System > Configuration".
8. Follow the steps for your services.

Read More



Steps to create SQL server alias

Steps for Deleting an alias using SQL Server Configuration Manager ?
#SQL aliases are used to give a table, or a column in a table, a temporary name. Aliases are often used to make column names more readable. An alias only exists for the duration of the query.
To find my SQL Server #alias name:
Expand SQL Native client #configuration, and you can find a subfolder Alias. By default, we do not have any alias defined for the SQL Server #instance. In the screenshot, we can see it does not see any items for the Alias. Right-click on Aliases and click on New Alias.
1. Take SQL Server Configuration Manager and go to SQL Server Native #Client Configuration, then click Aliases.
2. We can right-click the alias that we want to delete, and then click Delete.
3. A warning will pop up, we can click on Yes to remove the alias. This removes the SQL Server alias.

Read More



Nginx multiple domains SSL Certificates

This article will guide you on steps to resolve common issues with "Nginx multiple domains #SSL". Basically, the multi-domain SSL #certificate offers security for multiple websites.
The technique for hosting more than one domain/subdomain on a single IP address/host is called #virtual #hosts. The http get request contains the domain name that the requests is for which allows the web server to match up the request with a particular virtual domain.
You can host multiple websites on #Nginx:
1. Configure Nginx to Host Multiple Websites.
2. Create Directory Structure.
3. Create Virtual Configuration.
4. Test Your #Websites.
5. Adding PHP-FPM Support to Nginx.

Read More



Windows update error 0x80240023

This article will guide you on steps to fix #Windows #update #error #0x80240023 which usually triggers while updating the Windows #system.
When you encounter an error #message, reboot your #machine and try to run the updates again. If you haven't run Windows #Update for some time, then you might have to repeat this process several times before all updates have been installed.
To fix errors on Windows 10:
1. Make sure that your #device has enough space.
2. Run Windows Update a few times.
3. Check third-party #drivers and download any updates.
4. Unplug extra #hardware.
5. Check Device #Manager for errors.
6. Remove third-party security #software.
7. Repair hard-drive errors.
8. Do a clean restart into Windows.

Read More



Perfmon Counters for CPU usage

This article will guide you on how to use #Perfmon Counters for CPU #Usage and #Optimization.
Monitoring #CPU #Performance #Counters:
1. System, #Counter: Processor Queue Length. This Performance Monitor counter displays the number of threads waiting to be executed in the queue, which all the processors on your system share.
2. Processor, Counter: % Processor Time.
3. Processor, Counter: Interrupts/sec and Performance Object; Processor, Counter: % DPC Time.

Read More



Orphaned users in SQL Server

This article will help you to identify #Orphaned #Windows #Logins and Groups in #SQL Server.
To Resolve an Orphaned User:
To map an orphaned user to a login which already exists in master, execute the ALTER USER #statement in the user database, specifying the login name.
ALTER USER <user_name> WITH Login = <login_name>; When you recreate a missing login, the user can access the database using the password provided.
To fix orphaned users for all databases in SQL Server:
1. Login with same name as user exists – generate ALTER LOGIN to map the user to the login.
2. No login with same name exists – generate DROP USER to delete the orphan user.
3. Orphan user is [dbo] – change the database owner to SA (or whatever SA was renamed to).

Read More



Auto shrink feature in SQL server

This article will guide you on how to enable and disable AutoShrink #database property. Basically, it is not recommended to enable the AutoShrink database property as it can cause many issues in the #SQL Server.
Auto Shrink is database property that allow SQL Server to automatically shrink database files if its value set to ON/True. Shrinking a database is not a good practice because it is very expensive operation in terms of I/O, CPU usage, locking and #transaction log generation.
Users can enable and disable database auto shrink option using SSMS and T-SQL both ways.
To turn on auto shrink in SQL Server:
1. Activating the database auto shrink by using #SSMS:
2. Enable database auto shrink using T-SQL:
3. Database >> #Reports >> Standard Reports >> Disk Usage.
4. Check free space for the database files:
5. Shrink database file:

Read More



Install WebsitePanel on Windows

This article will guide you on steps to #install #WebsitePanel on #Windows. Also, we saw how to fix some common errors of WebsitePanel.
WebsitePanel began as #DotNetPanel, which its creators made only for the Windows web technology platform as a Windows #hosting panel. The initial DotNetPanel developers contributed a great deal to WebsitePanel. And now #Microsoft has added to their legacy by investing in WebsitePanel’s future.
WebsitePanel is a Multi-Tenant, Enterprise Hosting Automation Tool with support for Private #Cloud Servers. It enables you to centralize the management of your hosting infrastructure and share resources across multiple customer accounts.
1. Save time and money spent on system management.
2. Simplify deployment processes.
3. Administer everything from a single interface.

Read More



Manage Docker Volumes using Docker Compose

This article will guide you on steps to use #Docker #Compose for manging Docker #Volumes.
When you execute a docker-compose command, the volumes #directive in docker-compose. yml file mounts source directories or volumes from your computer at target paths inside the container. If a matching target path exists already as part of the container image, it will be overwritten by the mounted path.
A #Dockerfile is a text document that contains all the commands a user could call on the command line to assemble an image. Using docker build users can create an automated build that executes several command-line instructions in succession. This page describes the commands you can use in a Dockerfile .
List of Docker #Commands:
i. docker run – Runs a command in a new #container.
ii. docker start – Starts one or more stopped containers.
iii. docker stop – Stops one or more running containers.
iv. docker build – Builds an image form a Docker file.
v. docker pull – Pulls an #image or a repository from a registry.

Read More



Rsync from Linux to Windows share

This article will guide you on how to use #Rsync to transfer #files from #Linux to #Windows share.

cwRsync is an implementation of rsync for Windows. rsync uses a file transfer technology specified by the rsync algorithm, transferring only changed chunks of files over the network. #cwRsync can be used for remote file backup and synchronization from/to Windows systems.

Syntax of rsync #command:

1. -v, –verbose Verbose output.

2. -q, –quiet suppress message output.

3. -a, –archive archive files and directory while synchronizing ( -a equal to following options -rlptgoD).

4. -r, –recursive sync files and directories recursively.

5. -b, –backup take the backup during synchronization.

Read More



Azure PowerShell context objects How to manage them

This article will guide you on how to manage #Azure #PowerShell #context #objects. Azure PowerShell context objects are to hold subscription and authentication information. 

Azure PowerShell is basically an extension of #Windows PowerShell. It lets Windows PowerShell users control Azure's robust functionality. From the command line, Azure PowerShell programmers use preset scripts called cmdlets to perform complex tasks like provisioning virtual #machines (#VMs) or creating #cloud services.

To select Azure subscription in PowerShell:

1. Enter Login-AzAccount and hit enter, then provide your user id and password.

2. Get-AzureSubscription (this will give you the list of subscription).

3. Select-AzureRmSubscription -SubscriptionId xxxxx-xxxxx-xxxxxx-xxxx (this way you can set which particular subscription you want to use).

Read More



HTTP Flood DDOS Attack How to Mitigate the attack

This article will guide you on how to recover from DDoS attacks. Basically, protecting the web server against #DDoS #attacks is important. You can apply these measures to mitigate the error from causing troubles.

DNS #flood is a type of Distributed Denial of Service (DDoS) attack in which the attacker targets one or more Domain Name System (#DNS) servers belonging to a given zone, attempting to hamper resolution of resource records of that zone and its sub-zones.

To prevent DDoS attacks:

1. Buy more bandwidth. 

2. Build redundancy into your infrastructure. 

3. Configure your network hardware against DDoS attacks. 

4. Deploy anti-DDoS hardware and #software #modules. 

5. Deploy a DDoS protection appliance. 

6. Protect your DNS servers.

Read More



Share Data between Docker Containers

This article will guide you on steps to share #data between #docker #containers. To mount a data volume to a container add the --mount flag to the docker run #command. It adds the volume to the specified container, where it stores the data produced inside the virtual 3environment.

From the Docker #host, as Docker Volumes: Volumes are stored in an area of the host filesystem that's managed by Docker. Bind mounts can map to any folder in the host filesystem, so access can't be controlled from a Docker process and can pose a security risk as a container could access sensitive OS folders.

A Docker container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings.

To copy from Docker to local container:

1. First, set the #path in your localhost to where the file is stored.

2. Next set the path in your docker container to where you want to store the file inside your docker container.

3. Then copy the file which you want to store in your docker container with the help of CP command.

Read More



Pros and Cons of Outsourcing Customer Service

In this article, you will see the different pros and cons to #outsourcing #customer #service. However, each case is unique. We should know best if outsourcing customer service could be the right way.

Outsourcing to someone who specialises in delivery of that part of your process, and therefore has up-to-date systems, technology and staff, can improve the quality of that service by reducing costs, improving final output quality or freeing up your internal staff for other roles they could be performing.

However, the flexible solutions allow you to consider the best-case scenario. Consider all possibilities and pick a scaleable, high-quality solution that best fits the business profile.

Benefits of outsourcing customer service:

1. Focus on core tasks.

2. Lower costs.

3. Promote growth.

4. Maintain operational control.

5. Offer staffing flexibility.

6. Provide continuity and risk management.

7. Develop internal staff.

Read More



Wget SSL error How to fix it

This article will guide you on steps to fix #Wget #SSL error which is a generic #error that pops an error message "Unable to establish SSL connection" .
To support encrypted HTTP ( #HTTPS ) downloads, Wget must be compiled with an external SSL library, currently #OpenSSL. If Wget is compiled without SSL support, none of these options are available."
You might need to check whether the version of wget you are using supports #SSL.

Read More



Could not load file or assembly Microsoft ReportViewer WebForms

This article will guide you on ways to resolve Could not load #file or #assembly 'Microsoft.ReportViewer.WebForms' #error occurs when #ReportViewer files are missing from the #bin folder.
You need to reference both Microsoft.ReportViewer.WebForms and Microsoft.ReportViewer.Common and set the CopyLocal property to true. This will result in the dll's being copied to our bin #directory (both are necessary).

Read More



Yum http error 416 How to fix it

This article will guide you on steps to fix #yum #HTTP #error 416 which occurs while updating, installing, upgrading packages. This is rectified easily via disabling the delta #rpm problem, reinstalling a #package, clear #caching and so on.
To fix this error:
1. yum clean all
2. yum upgrade --exclude=polkit*
3. reboot
4. yum clean all
5. yum upgrade

Read More



Smurf DDoS attack How to fix

In this article , you will learn the measures taken by our Support Experts to mitigate #Smurf #DDoS #attacks.
A Smurf attack is a form of a distributed denial of service (DDoS) attack that renders computer networks inoperable. The Smurf program accomplishes this by exploiting #vulnerabilities of the Internet Protocol (#IP) and Internet Control Message Protocols (#ICMP).
Smurf is a network layer distributed denial of service (DDoS) attack, named after the DDoS.Smurf malware that enables it execution.
1. DoS is one of the oldest forms of cyber extortion attack.
2. As the term indicates, distributed denial of service (DDoS) means it denies its service to a legitimate user.
3. Ping of death and teardrop attacks are examples of such attacks. Flooding: Sending too much data to the victim can also slow it down.

Read More



Disable Password History in DNN websites

This guide will help to disable password history in #DNN by disabling Enable #Password #History option under the Membership Management tab.
To disable Disable Password History in DNN:
In Host > Host Settings > Advanced Settings > Membership Management, you can disable the history by unchecking "Enable password history".

Read More



Content Encoding Error content_encoding_error

This article will guide you on steps to resolve #Content #Encoding #Error (content_encoding_error) which makes the server returns a #gzip compressed object, but the content is actually text.
The  cause of this error message is a #web server whose #HTTP response headers indicate that it will be responding with one type of encoding, but instead responds with a different type of encoding. For example, what is commonly seen is that a web server returns a gzip compressed object, but the content is actually text.

Read More



Backup Active Directory Domain Controller

This article will guide you on how to #backup #active #directory domain controller.
A System State backup generally includes a copy of any installed device #drivers and related files, most of the Windows directory, the #Windows #Registry, the Active Directory configuration (where applicable) and system files under Windows File Protection.
In production it is best practice to have at least 2 domain controllers per domain. If you factor in each child domain and the other domains that could easily scale up fast if you have two in each one.
To Configure Windows Backup Users on a Domain Controller:
1. Expand Active Directory "Users > Computers > Users".
2. Right-click the appropriate user who will be performing backups and click Properties.
3. On the Member Of tab, click Add to add the Backup Operators group to the User.
4. Click OK.

Read More



Deploy Multiple WordPress Applications On Ubuntu

This article will guide you on how to deploy multiple #WordPress applications on #Ubuntu with #Docker.
Docker is a #tool designed to make it easier to create, deploy, and run applications by using #containers. Containers allow a developer to package up an application with all of the parts it needs, such as libraries and other #dependencies, and ship it all out as