Search our database

Viewing 1 to 10 of 668 items

Track Email Delivery in cPanel

You can track the progress of email sent to and from your cPanel email accounts. Mail log data is usually available for up to 10 days. To see these logs via a user friendly interface, please follow the below steps.1. Login to your cPanel2. Under the Email heading, click the Track Delivery iconOn the next […]

Generating a CSR with Direct Admin Control Panel

Follow the instructions below and copy and paste your CSR in the enrollment form at Networking4all. 1. First logon as user  ‘admin’ 2. Modify the  ‘Access Level’ from ‘Admin Level’ to ‘User Level’, by clicking in the Access Level menu on the right onUser Level . Click underneath  Advanced Features on SSL Certificates.3. Select the option ‘Create a Certificate Request‘ […]

WordPress Attacks Prevention and Content Protection

ATTACKS PREVENTIONIt is strongly recommended to have a comprehensive security plugin to be installed in your WordPress. There are many plugins out there, but one of the most preferred plugins is the iThemes Security, which can be downloaded from here: https://wordpress.org/plugins/better-wp-security/iThemes Security is one of the most user-friendly security plugins in the market. It does more than most […]

CentOS (and other Linux machines) to Act as a Router

By default, if you have two or more network interfaces in CentOS, they do not know each other until you introduce and connect them together. To connect two network interfaces to forward packets back and forth, here are the two commands to use: Step 1:Open up the Linux terminal. Step 2:If you have a STATIC IP address on the […]

Disable Mod Security cPanel for a domain

1 – Create directory at :- [root ~]# mkdir -p /usr/local/apache/conf/userdata/std/2_4/username*/domain.com* 2 – Then create a file in it :- [root ~]# touch /usr/local/apache/conf/userdata/std/2_4/username*/domain.com*/mod_security.conf 3 – Edit the file and add below line :- [root ~]# vi /usr/local/apache/conf/userdata/std/2_4/username*/domain.com*/mod_security.conf ===cut=== SecRuleEngine Off ===cut=== 4 – Then run this command to allow httpd.conf to include the file. […]

Block IP address at Directadmin using block_ip.sh

This tutorial will show you how to block IP address from DirectAdmin control panel. This guide is only for Centos 6 Please be informed that DirectAdmin do not support this implementation, you will need to at your own risk. It is better to backup anything first. 1 – Replace IPTables script as follow [root ~]# […]

Directadmin hostname is setup improperly on your system

This is e-mail notification to warn you that your hostname is setup improperly on your system . If you are getting this email from Directadmin everyday, it means that the hostname is not properly setup. Here are the steps to fix the issue so you wont receive the email again. 1 – Login Directadmin as […]

Why I keep getting a notifications for brute force attacks from Directadmin

What is brute force attack? Brute force attack is a method to discover a password by systematically trying every possible combination of letters, symbols and numbers until it found the correct combination that works. Brute force is not something that can be stop completely, but with some counter measures taken such as enabling captcha, brute […]