How to Set Up Local Port Forwarding Using Terminal

Introduction Local port forwarding is a method of securely tunneling network traffic from your local machine to a remote server over an encrypted SSH connection. It allows you to access services, databases, or applications that are hosted on private networks or behind firewalls, without directly exposing them to the public internet. By forwarding a local

How to Set Up SSH Port Forwarding Using PuTTY

Introduction Remote port forwarding is a powerful feature of SSH that allows external devices to securely access services hosted on your local machine by routing connections through an SSH server. This can be extremely useful for accessing internal web servers, development environments, or other applications that are otherwise unreachable from outside your network. By setting

How to Disable/Enable cPanel Login Notifications

Introduction Protecting your cPanel account is critical to safeguarding sensitive information and maintaining the overall security of your hosting environment. Unauthorized access can lead to data breaches, website defacement, or service disruptions, making proactive security measures essential. One simple but effective way to strengthen your account’s security is by enabling login notifications. These alerts will

How to Check RDP Windows Server Connection Logs

Introduction This guide explains how to check Remote Desktop Protocol (RDP) connection logs on a Windows Server. It focuses on identifying incoming RDP session activity using the built-in Event Viewer. Prerequisites Before you begin, ensure you have: Remote Desktop (RDP) access to the Windows Server Administrator privileges Step-by-Step Guide Method 1: Check Incoming RDP Logs

Blocking IP Addresses Using Windows Firewall

Introduction This guide explains how to block a specific IP address on your Windows Server using the built-in Windows Defender Firewall with Advanced Security. Blocking suspicious or malicious IPs helps enhance server security. Prerequisite Remote Desktop (RDP) access to the Windows Server Administrator privileges Step-by-Step Guide Step 1: Log in to the Server Use Remote

How to Resolve “Cannot Assign Requested Address” Error in WHM

Introduction When managing domains in WHM, you may encounter the following error message: Error: (XID wyyvcs) This domain points to an IP address that does not use the DNS servers associated with this server. Transfer the domain to this server’s nameservers at the domain’s registrar or update your system to recognize the current DNS servers.

How to Resolve ‘Domain Limit Reached’ Error in cPanel

Introduction When managing a website through cPanel, you may need to add multiple domains to your hosting account. However, while attempting to add a new domain, you might encounter the following error message: Prerequisites Access to WHM: You need administrative access to Web Host Manager (WHM) on your server. Basic Knowledge of WHM: Familiarity with

How to Increase disk quota in DirectAdmin (Enhanced Skin)

Introduction This article explains how to update the total disk space in DirectAdmin. It is designed for administrators or users with access to the DirectAdmin control panel who need to modify the disk space allocated to a domain or user. Keeping the disk space updated ensures that your hosting environment reflects accurate storage allocations, preventing

How to Install SpamAssassin in DirectAdmin (Evolution Skin)

Introduction SpamAssassin is a robust email filtering tool designed to reduce spam by analyzing incoming emails and applying advanced filtering rules. If your DirectAdmin server does not have SpamAssassin installed, follow this guide to install and enable it seamlessly. Prerequisites Access to DirectAdmin with administrator privileges. Basic familiarity with DirectAdmin’s interface. Step-by-Step Installation Guide Step

Why Suspended Emails Are Still Sending and How to Prevent It

Introduction When an email account is suspended, it should not have the ability to send emails. However, in some cases, suspended accounts may still send emails due to pending messages in the mail queue. This guide provides a step-by-step approach to identifying and resolving this issue, ensuring no further unauthorized emails are sent.   Prerequisites