Separate names with a comma.
Although the learning curve is not the smoothest, I warmly recommend you Drupal (drupal.org), due to the features, stability and security of the...
A quick and dirty solution would be to place a .htaccess file in the root of each subdomain and put the condition
in the file.
You may check in WHM > Packages section > Features option.
In the long list for each feature list (usually is only the default one), verify that [...
Although using the same .htaccess, my approach is a little bit different:
# Redirect all users to a SSL port
You can find a good watch-and-optimize script can at http://www.day32.com/MySQL/
Hello back, Drake
what I wanted to highlight was the solution, not the provider.
Maybe if you take a deeper look at 3tera's website, you will...
Drake, you may have a look at thegridlayer.com grid hosting.
It is a different approach and gives you both redundancy AND scalability.
You need full root access (usually as for a dedicated server or a VPS) in order to recompile Apache.
A second option would be for you to buy a...
The IP could have been used before by a spamming or infected server.
In most cases, you do not get 'fresh, new IPs';
either you get clean IPs...
Just check de dedicated IP at http://www.spamhaus.org/sbl/index.lasso
(enter the IP into the Lookup IP Address form and see if is listed)
for a specific account you should run:
and for all accounts you should run:
you should run (as root) the command:
This should do the job
chmod -R 755 /home/*/public_html/
chmod -R 644 /home/*/public_html/*.*
however, double check on a few specific users
Exim is a 3rd party script floating around the net, how comes that you trust it ?
csf is open; you can always re-create the desired scripts,...
well, csf is (imho) just a good iptables wrapper.
- csf closes all ports but needed ones (yet you do not have to monitor connections to unused...
so, how do you protect your server?
what firewall do you use ?
what firewall do you use to protect your server ?
you can use chirpy's excellent firewall and block IPs at connection time.
Install csf and read the instruction, you will find how to keep a list...
All you have to do is provide your client SSH access.
SFTP is a secure file transfer protocol wrapped into SSH.
More details on wikipedia:...
Execute the following commands in SSH
chnod +x tuning-primer.sh