Categories
Articles
ASSP is free to use under GPL license, you can install and use it in your cPanel server.The...
BackupsAllnet4u Enterprise shared, and reseller web hosting accounts are automatically backed up each...
Beware of Misleading Domain Renewals scamThere are a number of companies out there that will contact you and lead you to think your domain...
Brute ForceIntroduction to Brute Force Attacks Today we published a new Learning Center article focused on...
Change a server's hostname in CentOSThis command let you change the hostname on the server that the command line remembers, but it...
Check disk space on your serverOpen a ssh session Type df -h or df -k to list free disk space: $ df -h or $ df -k
China Scam WatchBeware of the china scams.
Chrome 68On July 24th, Google officially launched Chrome 68.With new features and security...
Computer VirusesWhat is a computer virus. A computer virus is a malware program that replicates by making copies...
Dedicated Server Info manualThis manual is to be used to make all administrators more sensitive regarding few topics related...
Denied orderIf you order was not accepted by one of our merchant payments such as PayPal or our Official...
Disable XML RPCXML-RPC service was disabled by default for the longest time mainly due to security reasons.In...
Domain name propagationDomain propagation can take up to 72 hours to fully go though but this is not always the case and...
Editing files using VIVI is a Linux text editor that can edit most of the files under a Linux architecture (text files,...
Error Page CodesThis tutorial will show you a few of the most common error codes a server may return. There are...
Fix SitemapIf your website pages are not showing up in Google, you may have a problem with your sitemaps....
Fork BombA fork bomb is the equivalent of a DOS attack on your own system. DOS is short for Denial of...
Geolocated IP addresseYou have created sites with an international focus and are keen to work on SEO for your target...
Google 68From the beginning, security has been one of Chromes core principles and one of the biggest...
Google rank better with SSL certificateSecurity is a top priority for Google. We invest a lot in making sure that our services use...
HTTPSHTTPS secures the connection to the website you are visiting. I’m sure you have seen this in...
How Search Engines WorkSearch Engine A search engine operates, in the following order: 1) Crawling; 2) Deep Crawling...
How to do a PingThe purpose of this tutorial is to teach you how to do a ping. Pinging is a command which tells...
How to do a TELNET on a PC (Windows) OSFrom time to time you may need to perform an operation called "TELNET".You can use TELNET to...
How to do a TracertThis tutorial will show you how to run a trace route on a Window operating system. If you are...
IP FailoverAll IP4 are Failover (except the main one).We advice to set your server and sites with IP...
IP classFor dedicated server owners.Each IP you order is class 4 Failover and are switchable between your...
IRS ScamWhat is an IRS Scam CallAn IRS Scam Call is when scammers make unsolicited calls. These scammers...
Install MinecraftIn this tutorial, we will be guiding you through the set up of a Minecraft Server on our...
Installing TELNETBy default, Vista doesn't install the Telnet client.The client is for text-based communication...
KVM Rescue modeAllnet4u enterprise dedicated server provide servers with default configuration. 1- OS stable 2-...
KVM VS OpenVZA KVM (do not confuse with KVM rescue for server fix) VPS is like a dedicated server within a...
KVM modeWith your server in KVM rescue mode, you can now carry out the maintenance required to the repair...
Locky Ransomware?What is Locky Ransomware?Another ransomware seems to spreading like wildfire, taking a hold of...
Minify CSS and JS files HTTP/2To work properly, websites contain multiple CSS and JavaScript files. These must be fetched...
OS re-installationHere is How to re-install your operating system or install a new one on your VPS or dedicated...
PharmingPharming is a cyber attack intended to redirect a websites traffic to another, fake site. This is...
PhishingThis is the attempt to acquire sensitive information such as user name, password, and credit card...
Puty SSH terminalPuTTY is a free and open-source terminal emulator, serial console and network file transfer...
Resource Limit CloudLinuxIf you are seeing the following when visiting your website, it means that CloudLinux has stopped...
Rkhunter install guiderkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible...
SAS Hard DriveSAS stands for Serial Attached SCSI (SCSI Stands for Small Computer System Interface, typically...
SATA DriveSATA stands for Serial Advanced Technology Attachment and it is a type of interface for a hard...
SSD DriveA solid-state drive (SSD) is a nonvolatile storage device that stores persistent data on...
SSH session runningScreen is like a window manager for your console. It will allow you to keep multiple terminal...
SSL Vendor StatusWhen waiting for your SSL to process you will be provided with status updates straight from the...
SSL validationNowadays, SSL Certificate becomes a crucial part of the internet and business. SSL Certificate...
Server common mistakesAlthough a dedicated server affords you a great deal more power and freedom than other hosting...
The keyword cannibalizationKeyword cannibalization means that you have various blog posts or articles on your site that can...
Web Hosting GlossaryThe following is a glossary of popular words associated with web hosting. ActiveXA loosely...
XML sitemapWhat is an XML Sitemap and why is having one important for SEO?. Good question!. Think of your...
httpd configurationThe httpd.conf directory differs across Linux & Unix variants like CentOS, Mac OS X, Red Hat,...