- Install cPanel on a Virtual Server Running CentOS 6 with 7 Simple Steps
- Clear Your System Cache in Ubuntu with These Quick Steps
- Install MariaDB on CentOS 7 with these Simple Steps
- What is an A Record?
- Smartermail vs. Mailenable – What does it hold for you?
- Common Issues with Website Migration
- Tips to Evade Spamming
- Dirty Cow Vulnerability – Check How Dirty It Is?
- It’s Time to Update Your Server
- How to Change the Listening Port for Remote Desktop?
Tag Archives: Dedicated Website Hosting
To add or remove items from the desktop follow these steps:
1)First Go to Desktop > Customize Desktop.
2) In the Tools group specify what tasks you would like to accomplish through the control panel. The appropriate shortcuts will be placed to the desktop. The Selected tasks list shows the tasks for which shortcuts are already placed on the desktop. The Available tasks list shows the tasks for which you do not yet have shortcuts on your desktop.
a)To add a shortcut to the desktop select the required tasks in the Available tasks list and click Add >>.
b)To remove a shortcut from the desktop select the task that you do not need in the Selected tasks list and click Remove.
What does IMAP refer to and it’s relation to server hosting ?
IMAP Stands for Internet Message Access Protocol.It was originally developed in 1986 at Stanford.IMAP is gradually replacing POP as the main protocol used by email clients in communicating with email servers.IMAP includes more functions than the similar and popular POP mail protocol.It can be used by customers who need to keep their mail on a remote server.By using IMAP an email client program can not only retrieve email but can also manipulate message stored on the server, without having to actually retrieve the messages. So messages can be deleted, have their status changed, multiple mail boxes can be managed, etc.The latest version of IMAP that is IMAP4, is similar to POP3 but supports some additional features. For example, with IMAP4, you can search through your email messages for keywords while the messages are still on the mail server.
Windows-based Firewall Installation (Juniper Netscreen 5-GT)
Bodhost.com provides windows-based firewall protection with servers in tie-up with Juniper Networks which are known for their security services. We offer firewall which are not only cost-effective but provide the best service when it comes to security.
They are all-in-one security firewall provider which include IPs / Anti-viruses / Anti-spams and network filtering. We also provide regular updates for anti-viruses to tackle day-to-day scenario.
Juniper Netsceen 5GT Ethernet has 5 ethernet interfaces which can be assigned to different configurations.
APF Firewall (Advanced Policy Firewall)
Linux-based Firewall (Netfilter / IPtables)
Firewalls are known to secure networks to a major extent. Bodhost.com has always aimed to provide better security to all our customers. Our support team works day and night to provide even better service in security of all our clients.
Advanced Policy Firewall is a linux-based firewall which aims to fulfil today’s needs to security. It is provided in the form of IPtables or netfilter. ‘apf’ is a common command used which provides stats and information to us.
What is Drupal ?
Explaining Drupal is a little bit tricky but we’ll explain you enough to gain a basic grasp of what it does. Drupal is a web-based content management system (CMS) and more. Drupal is an open-source content management system for building dynamic web sites offering a wide range of features and services including user administration, publishing workflow, discussion capabilities, news aggregation, metadata functionalities using controlled vocabularies and XML publishing for content sharing purposes.It is used to build web sites. Drupal is a highly modular, open source web content management framework with an emphasis on collaboration.
What is SSH ?
The Internet has developed the need for some secure methods of communication. One such method is Secure Shell (SSH) encryption.It is developed by SSH Communications Security Ltd., “Secure Shell” is a program to log into another computer on a network, to execute commands in a remote machine, and to move files from one machine to other. It provides strong authentication and secure communications over insecure channels. It is a replacement for rlogin, rsh, rcp, and rdist. SSH protects a network from attacks such as IP spoofing, IP source routing, and DNS spoofing. An attacker who has managed to take over a network can only force ssh to disconnect. He or she cannot play back the traffic or hijack the connection when encryption is enabled.This SSH uses one open and one secret key. In contrast to Kerberos, SSH does not use a central server for security. SSH uses port 22.
What is php.ini file?
Php.ini file is an important configuration file of your PHP server.
How a php.ini File is read ?
When the php interpreter starts , it acts according to settings specified in any availabe php.ini file. The Web server will look for this file in the following locations and in the following order:
a) The directory from which the PHP script was called
b) The root of your Web directory (typically public_html)
c) The Web server’s default php.ini
To able to work with php you need to be master in that . If you are developing scripts on your own PHP is enabled computer or if you have administrator level control over your server, you can globally change how your PHP installation runs.
Internet Information Services 6.0(IIS 6.0)
1) Fault-tolerance :
With its fault-tolerance process, it has increased its platform in reliability of websites and applications. It has units names application pools which divides the applications from one another. In this regard, if one application fails, it does not affect the other processes.
2) Application pools :
This consist of various URL’s that are eventually routed to main process. These can can admin every site consistently and maintain separation from other processes.
3) Monitoring :
What is HTTP status code ?
HTTP stand for Hypertext Transfer Protocol.It is the method by which clients and servers communicate. When someone clicks a link, types in a URL or submits out a form, their browser sends a request to a server for information. It might be asking for a page, or sending data, but either way, that is called an HTTP Request. When a server receives that request, it sends back an HTTP Response, with information for the client. Usually, this is invisible, though you have seen one of the very common Response codes which are as follows:
When choosing any web hosting package, you will find that one of the major factors of a web hosting service that you will want to consider is the amount of bandwidth that is provided along with the web hosting package that you are interested in. The amount of bandwidth that your website requires depends mainly on two different factors – the average size of each web page and the number of visitors that your website receives in a given time period, with most web hosting providers this period normally being a month.