Tag Archives: Dedicated Website Hosting

Plesk Control Panel > Desktop Customization

To add or remove items from the desktop follow these steps:

1)First Go to Desktop > Customize Desktop.

2) In the Tools group specify what tasks you would like to accomplish through the control panel. The appropriate shortcuts will be placed to the desktop. The Selected tasks list shows the tasks for which shortcuts are already placed on the desktop. The Available tasks list shows the tasks for which you do not yet have shortcuts on your desktop.
a)To add a shortcut to the desktop select the required tasks in the Available tasks list and click Add >>.
b)To remove a shortcut from the desktop select the task that you do not need in the Selected tasks list and click Remove. read more

What does IMAP Refer to and it’s relation to server hosting ?

What does IMAP refer to and it’s relation to server hosting ?

IMAP Stands for Internet Message Access Protocol.It was originally developed in 1986 at Stanford.IMAP is gradually replacing POP as the main protocol used by email clients in communicating with email servers.IMAP includes more functions than the similar and popular POP mail protocol.It can be used by customers who need to keep their mail on a remote server.By using IMAP an email client program can not only retrieve email but can also manipulate message stored on the server, without having to actually retrieve the messages. So messages can be deleted, have their status changed, multiple mail boxes can be managed, etc.The latest version of IMAP that is IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your email messages for keywords while the messages are still on the mail server. read more

Windows-based Firewall Installation (Juniper Netscreen 5-GT)

Windows-based Firewall Installation (Juniper Netscreen 5-GT)

Bodhost.com provides windows-based firewall protection with servers in tie-up with Juniper Networks which are known for their security services. We offer firewall which are not only cost-effective but provide the best service when it comes to security.

They are all-in-one security firewall provider which include IPs / Anti-viruses / Anti-spams and network filtering. We also provide regular updates for anti-viruses to tackle day-to-day scenario.

Juniper Netsceen 5GT Ethernet has 5 ethernet interfaces which can be assigned to different configurations. read more

Security Issues – Linux – APF Firewall (IP-Tables / Netfilter)

APF Firewall (Advanced Policy Firewall)

Linux-based Firewall (Netfilter / IPtables)

Firewalls are known to secure networks to a major extent. Bodhost.com has always aimed to provide better security to all our customers. Our support team works day and night to provide even better service in security of all our clients.

Advanced Policy Firewall is a linux-based firewall which aims to fulfil today’s needs to security. It is provided in the form of IPtables or netfilter. ‘apf’ is a common command used which provides stats and information to us. read more

Drupal Versions

What is Drupal ?

Explaining Drupal is a little bit tricky but we’ll explain you enough to gain a basic grasp of what it does. Drupal is a web-based content management system (CMS) and more. Drupal is an open-source content management system for building dynamic web sites offering a wide range of features and services including user administration, publishing workflow, discussion capabilities, news aggregation, metadata functionalities using controlled vocabularies and XML publishing for content sharing purposes.It is used to build web sites. Drupal is a highly modular, open source web content management framework with an emphasis on collaboration. read more

How to SSH a server or SSH Server Access

What is SSH ?

The Internet has developed the need for some secure methods of communication. One such method is Secure Shell (SSH) encryption.It is developed by SSH Communications Security Ltd., “Secure Shell” is a program to log into another computer on a network, to execute commands in a remote machine, and to move files from one machine to other. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled.This SSH uses one open and one secret key. In contrast to Kerberos, SSH does not use a central server for security. SSH uses port 22. read more

How to edit php.ini file ?

What is php.ini file?

Php.ini file is an important configuration file of your PHP server.

How a php.ini File is read ?

When the php interpreter starts , it acts according to settings specified in any availabe php.ini file. The Web server will look for this file in the following locations and in the following order:

a) The directory from which the PHP script was called
b) The root of your Web directory (typically public_html)
c) The Web server’s default php.ini

To able to work with php you need to be master in that . If you are developing scripts on your own PHP is enabled computer or if you have administrator level control over your server, you can globally change how your PHP installation runs. read more

Internet Information Services 6.0(IIS 6.0) Features

Internet Information Services 6.0(IIS 6.0)

1) Fault-tolerance :

With its fault-tolerance process, it has increased its platform in reliability of websites and applications. It has units names application pools which    divides the applications from one another. In this regard, if one application fails, it does not affect the other processes.

2) Application pools :

This consist of various URL’s that are eventually routed to main process. These can can admin every site consistently and maintain separation from other    processes.

3) Monitoring : read more

HTTP Error Codes

What is HTTP status code ?

HTTP stand for Hypertext Transfer Protocol.It is the method by which clients and servers communicate. When someone clicks a link, types in a URL or submits out a form, their browser sends a request to a server for information. It might be asking for a page, or sending data, but either way, that is called an HTTP Request. When a server receives that request, it sends back an HTTP Response, with information for the client. Usually, this is invisible, though you have seen one of the very common Response codes which are as follows: read more

How much Bandwidth do i require on my Web Server ?

When choosing any web hosting package, you will find that one of the major factors of a web hosting service that you will want to consider is the amount of bandwidth that is provided along with the web hosting package that you are interested in. The amount of bandwidth that your website requires depends mainly on two different factors – the average size of each web page and the number of visitors that your website receives in a given time period, with most web hosting providers this period normally being a month. read more