Similar Posts
How to move OpenCart website from one domain to another?
OpenCart is one of the simplest e-commerce platforms to build an online store. OpenCart offers you an ‘easy-to-work-with’ code-base with which you can get an e-Commerce site online, quickly. If you are looking for a safe way to move OpenCart website from one domain to another, follow the process below. Here are the steps to…
How to Fix the XAMPP Error “Apache Shutdown Unexpectedly”
XAMPP is a helpful development tool. However, you may run into problems at some point, such as receiving the notification: “Apache shutdown unexpectedly”. This error might seem to come out of nowhere, so identifying the cause – let alone the solution – can be puzzling. See how Kinsta stacks up against the competition. Fortunately, there is a…
Exim mail server Useful Commands
While the mailserver generally requires little interaction for those sending or receiving average volumes of email, there may be times when you wish to manage Exim’s settings. To do so, first log in to your server in a terminal client using secure shell (SSH). Use the following commands to work with Exim. Display the number…
How to configure the passive ports range for ProFTPd on a Plesk server behind a firewall
Question How to configure the passive ports range for ProFTPd on a server behind a firewall? Answer Note: When configuring the passive port range, a selected port range must be in the non-privileged range (e.g., greater than or equal to 1024). It is strongly recommended that the chosen range should be large enough to handle…
Enable root Access for Linux Instances
AWS doesn’t grant root access by default to EC2 instances. This is an important security best practise. Users are supposed to open a ssh connection using the secure key/pair to login as ec2-user. Users are supposed to use the sudo command as ec2-user to obtain elevated privileges. Problems arise with a number of software packages…
How to Implement Security HTTP Headers to Prevent Vulnerabilities?
Do you know most of the security vulnerabilities can be fixed by implementing necessary headers in the response header? Security is as essential as content and SEO of your website, and thousands of websites get hacked due to misconfiguration or lack of protection. If you are a website owner or security engineer and looking to protect your…
