Install cPanel on a Virtual Server Running CentOS 6 with 7 Simple Steps

An easy application, cPanel enables monitoring of servers through a GUI interface instead of the command line. It’s a fact that the cPanel installation is moderately straightforward but the script takes only a few hours to run.

Extra Details About cPanel –

After the installation of cPanel, it’s not possible to expel from the server if it isn’t completely restored. There’s no uninstaller offered by cPanel.

Setup Steps –

Prior to cPanel installation, it’s essential to take two additional steps – read more

Clear Your System Cache in Ubuntu with These Quick Steps

When your browse something your web browser, a cache of the websites you visit is saved by the browser in order to load the subsequent visits quickly. Similarly, Linux too keeps a system cache – apt-cache, application cache, etc. – so subsequent loading of the application will be very fast.

Cache is a good concept when viewed from a user’s point but do you know it keeps utilizing your system’s memory. Also, at some point, you need to ensure that all the unnecessary data or junk files are deleted which are usually in the form of the cache so that your system remains fresh and less loaded. read more

Install MariaDB on CentOS 7 with these Simple Steps

An open-source database management system, MariaDB is commonly installed as part of the popular LEMP (Linux, Nginx, MySQL/MariaDB, PHP/Python/Perl) stack. The data is managed by MariaDB by using a relational database and SQL (Structured Query Language). It acts as a fork of MySQL that is managed by the original MySQL developers. Since it’s designed as a replacement for MySQL, it uses commands that reference mysql and is the default package on CentOS 7.

This tutorial explains the installation of the latest version of MariaDB on a CentOS 7 server. read more

What is an A Record?

What is an A Record? The A in A record stands for Address. An A record is used to find the address of a computer that is connected to the internet from a name. If you are visiting a website, send an email or connect to Facebook or do anything on the internet, the address you enter is a word that is connected with dots.

What are A records?

A record will map a fully qualified domain name to an IP address and that are most often used record type in any DNS configuration. Address records can be configured in a domain for a specific host like or sometimes it will represent with an @ symbol. read more

Smartermail vs. Mailenable – What does it hold for you?

Smartermail vs. Mailenable

With communication being essential in today’s day and age, choosing the right email server is vital. When it comes to the best servers like Smartermail and Mailenable, we strive to deeply evaluate features in order to see which is the most exclusive, down to the tee.

SmarterMail, an award-winning service, is currently benefiting small businesses and large corporate organizations with the most flexible and reliable email server available, giving administrators and users more control over the accounts. read more

Common Issues with Website Migration

Website Migration

When migrating a website from a previous provider, it is important to test out the site while in development to ensure a smooth transition. If a website is incorrectly migrated, you can run the risk of losing not only functionality but also traffic and search visibility. Common issues that can persist following the move of all data, databases and emails are:

  1. Contact/Enquiry Forms – Commonly, these forms use customized parameters and components that most likely won’t exist within your new server. Furthermore, mail scripts can present a problem by specifying an SMTP mail server that is not compatible with the new host.
  2. PHP and Module Version Differences – Identify the prerequisites of your site by using a simple PHP info script. You can then deploy a system that will be qualified to run your existing service.
  3. Permissions – All custom permissions must be present to ensure no loss of functionality during an FTP migration. Plesk migrations can be used to guarantee all permissions and setting are transferred. Free migration services are offered by certain providers.

Following a sound migration process will give you the best chance at identifying issues quickly to relieve a lot of pressure and frustration. read more

Tips to Evade Spamming

Online security tips to avoid spamming

Email spamming is an ever present issue that can cost you or your business time and money. It is surprisingly easy for email addresses and computers to be hijacked for spamming purposes. Here are steps you can take to increase security and ensure you stay off the blacklist.

  • Make sure your computer is free of viruses. Many free anti-virus programs are on the market. Find one, make sure it is updated and scan your computer.
  • Starting fresh is important if you believe your computer or accounts have been compromised. Reset your passwords – this includes email passwords.
  • Use strong passwords as preventative measures. Strong passwords usually contain a combination of the following: Uppercase and lowercase letters, numbers, and punctuation.
  • Don’t store passwords. This includes storing on your browser, FTP client or email client.
  • Keep your passwords secret. Passwords are important and should not be shared with anyone.
  • Test your computer for keystroke loggers or spyware to ensure passwords stay secret.
  • Third party applications and plugins that aren’t updated are vulnerable to penetration
  • Protect servers and websites by regularly scanning with maldet (linux) or clamwin (windows).
  • read more

    Dirty Cow Vulnerability – Check How Dirty It Is?

    dirty-cow-vulnerabilityDirty cow vulnerability mainly affects major Linux Operating Systems. Below is the impact of this vulnerability –

    Existing since nine years, the Dirty Cow vulnerability is found in Linux kernel and is privilege escalation vulnerability.  A security expert Phil Oester found this vulnerability that can be present in about every available Linux distribution.

    A race condition was found in the way the memory subsystem of Linux kernel handled the copy-on-write (COW) breakage of private read-only-memory mappings. This flaw can be misused by an unprivileged local user to gain write access to other read-only memory mappings and further increase their privileges on the system. read more

    It’s Time to Update Your Server


    You might be getting for software updates several times. Though knowing it’s important, you might be ignoring it always.

    Surely there are reasons behind ignorance – “Sending an email to the client is important right now”; “It’s my presentation day today so I need to finish the presentation”; “What if something breaks?”

    But, when something goes wrong with your software, you hear the nagging voice at the back of our head saying we made a bad decision.

    You need to hear it clearly that software updates can’t wait – significantly when it comes to your servers or business systems. Software updates contain critical bug fixes which if left unpatched; your system is a fish in the barrel for the hackers. read more

    How to Change the Listening Port for Remote Desktop?


    Remote Desktop features in Microsoft Windows XP Professional can be used to connect to your computer from another remote computer.

    Here’s an article on steps to change the port that Remote Desktop listens on.

    Note: The Remote Desktop Connection Client for the Mac is supportive to only port 3389 which is the default port.

    Warning: If the listening port is changed, the Remote Assistance feature in Microsoft Windows XP may not work correctly.

    To change the port that Remote Desktop listens on, follow the below steps – read more