Search our database

Archive | Dedicated Server RSS feed for this section
Viewing 1 to 10 of 140 items

Linux Malware Scanner – AI-Bolit

There are many great tools to scan for malware within you web directory. The other alternative available other than Maldet is AI-Bolit. It is a neat tool built using PHP. Requirement: PHP5.3 and above SSH into your server and go to public_html directory Download AI-Bolit scanner by using links. If you don’t have it installed, you can install […]

All About SPF Records and How to Manage it

Sender Policy Framework, also abbreviated as SPF. SPF is a framework designed to prevent email phishing/forgery. With SPF, if a spammer attempts to send emails with a faked “from” address, the message will be rejected by mail servers that use SPF verification. An SPF record is a single TXT entry in the DNS for each domain. […]

Replace HDD for Software RAID in Windows Server

When detecting a disk status as “Unhealthy”, it is wise to perform replacement and sync the data to the new HDD to prevent loss of data in the future. Step 1: Open Windows Power Shell, type “diskmgmt.msc” (without quote marks) and press Enter to open up Disk Management Tools window. Step 2: Right click on the RAID partition […]

Monitor HDD Health on Windows Server

HDD health is very important for a server as failure could happen at anytime, causing loss of precious data, thus monitoring HDD health is a very important step for server management. Step 1: Open Windows Power Shell, type “diskmgmt.msc” (without quote marks) and press Enter to open up Disk Management Tools window. Step 2: Wait until the […]

Windows Server Installation with Software RAID

Software RAID configuration on Windows Server is performed after the installation of the operating system using Disk Management Tools, so finish installing Windows Server before continuing with this guide.Note: To perform RAID1 (Mirroring) requires 2 empty HDD, not including the HDD that already has the Windows OS installed on it. Step 1: Open Windows Power Shell, type “diskmgmt.msc” […]

Allow Cloudflare IPs in Firewall

This guide will show you how to only allow Cloudflare IPs to access port 80 using IPTables. Please make sure that all domains is already pointed to Cloudflare, or this guide will make your domains inaccessible. Cloudflare IPs 1 – Create a new file to be your new firewall :- #vi /root/firewall 2 – Paste […]

How to install Linux Malware Detect on CentOS

Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for detection.In addition, threat data […]

How to generate your SSH public key

1st step to generate the public key :- Step 1 : SSH to the server under root privilege :- # cd ~/.ssh # ls known_hosts After done, generate the key using command below : # ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/Users/schacon/.ssh/id_rsa): Enter passphrase (empty for no […]

Restore backup under R1soft

You can restore whole Devices or selected files and folders from any ‘Recovery Point’. You can extract files from a Recovery Point to an off-site server or local hard disk. To restore data in R1soft, follow the instructions below. 1. Click on “Recovery Points” in the Main Menu to open the “Recovery Points” :- 2. In […]