Similar Posts
How to Implement Security HTTP Headers to Prevent Vulnerabilities?
Do you know most of the security vulnerabilities can be fixed by implementing necessary headers in the response header? Security is as essential as content and SEO of your website, and thousands of websites get hacked due to misconfiguration or lack of protection. If you are a website owner or security engineer and looking to protect your…
Protected: How to Configure Cpanel/WHM to Backup to Amazon S3 (Step by Step of Enabling Permissions in AWS)
There is no excerpt because this is a protected post.
Guide to Install Node.js on CentOS 6/7
Have a website which needs Node.js to work and have no idea how to install it on your Server? No Problem, this guide will how you how you can install Node.js on your Server with CentOS Machine. Requirements Server with CentOS 6/7 Root Access to Server Procedure Login to Server using SSH Add Node.js repo…
Add a WordPress Admin User to the Database via PHP
As a developer, you will occasionally need to create a new administrative user in the database to gain access to the site. Typically, this is necessary when you are provided with an export of a WordPress database, but you aren’t provided with the login credentials for the admin user. Sure, you can gain access via…
OpenVZ useful commands
OpenVZ useful commands Here is the list of some useful OpenVZ commands which should be run from the main node : 1. To fetch the consumption of disk for each container in the node along its it’s hostname and ctid vzlist -H -o veid,hostname,diskspace | awk ‘{ printf(“%d\t%s\t%.2f GB\n”, $1, $2, $3/(1024*1024))}’ 2. To…
Redirect IP address accesses to domain name with Nginx
Making the following update to your Nginx .conf file will prevent your website from being accessed directly by it’s IP address You’ll need to create a new server block and configure it such that any requests to the servers IP address will instead be redirected to the domain name. Now, when a request is made…