Search Our Database

Allocate IP Address in WebsitePanel

Introduction This guide explains how to allocate an IP address to a website using WebsitePanel. It is designed for system administrators and users who manage hosting services and need to assign a dedicated IP address to a specific website. The guide outlines the steps to allocate an IP address in WebsitePanel to ensure the proper

Windows Server 2008 setup task scheduler

Important Note: Windows Server 2008 is end of life and no longer supported by Microsoft. This is a knowledge base for legacy version support for window server 2008. For information on the latest version of windows server, you can refer to this link: Windows Server 2022 setup task scheduler Introduction This guide explains how to

How to setup SpamAssassin in legacy version cPanel

Important Note: This guide is meant for users of legacy versions of cPanel. Refer to this guide if your version of cPanel is up to date. Introduction SpamAssassin is a robust, open-source mail filter designed to detect and block spam before it reaches your inbox. It uses a combination of techniques like header and text analysis, Bayesian

How to install WordPress in CentOS

Warning: CentOS 7 reached its end-of-life (EOL) on June 30, 2024. This means it no longer receives security updates or support from the developers. It is strongly recommended to upgrade to a supported operating system version, such as CentOS Stream 9 or an alternative Linux distribution, to maintain security and stability.   Introduction This guide

How to install WordPress in Ubuntu Noble (24.04)

Introduction This guide explains how to install WordPress on a Ubuntu server. It is intended for users who need to set up a WordPress website on a Ubuntu environment, ensuring that the correct steps are followed for a successful installation. The process covers the installation of necessary software like Apache, MySQL, and PHP (LAMP stack),

SPF record example

Introduction This guide will walk you through the process of creating an SPF (Sender Policy Framework) TXT record for your domain. SPF records play a crucial role in email authentication by specifying which mail servers are authorized to send emails on behalf of your domain. This helps protect your domain from email spoofing and ensures

How to generate your SSH Public key

Introduction Secure communication between your local machine and a remote server is crucial, especially when dealing with sensitive data. One of the most widely used methods to establish a secure connection is through SSH (Secure Shell) keys. SSH keys consist of a key pair — a public key and a private key. The private key

How to enforce SSL for website by editing `.htaccess` via SSH

Introduction This guide explains how to enforce SSL (HTTPS) on your website by editing the .htaccess file via SSH. The .htaccess file is a powerful configuration file used by the Apache web server to control various settings, such as URL redirects, access restrictions, and enabling or disabling certain server features. By leveraging .htaccess in combination

How to backup/restore MySQL database with mysqldump command

Introduction The mysqldump utility is a powerful tool designed to back up MySQL databases and transfer data to another MySQL server. This utility generates a set of SQL statements that can be used to recreate the original database on a different server or after a failure. Whether you’re migrating a database or performing regular backups, this