How to configuring rotating IP in cPanel?

In some cases, we are interested in using a server or VPS for e-mailing and have some IPs in turnover may be feasible in some respects.

To set the rotary IP in cPanel, please follow these steps:

Step 1 – Enter via SFTP root, open the file /etc/ and after the last line enter the code below:


randinet sub { inet = ("xxx1" "XXX2" "xxx3," "xxx4"); return $ inet [int rand ($ # inet)]; }

Where there is xxx1, it should be replaced by IPs that want to turnover.

Step 2 – Next, open the /etc/exim.conf file and look for the line starting with ‘interface’. You will find the code below:


interface = $ {if exists {/ etc / mailips {} $ {lookup {$ sender_address_domain lsearch} * {/ etc / mailips} {$ value} {} {}}}}

Replace this line with:

interface = $ {perl {}} randinet

Step 3 – After making these changes, restart exim with the following command via SSH (or via WHM):

restart exim service

Done, exim will now send emails with rotating IPs.

Posted in Tutorials / Howtos? | Leave a comment

How to increase the upload limit to a MySQL server?

Through this simple tutorial, we will learn how you can increase the upload limit on a MySQL server.

Prerequisites for increasing the limits over MySQL server:

You must have root access to your server.

Customers using VPS, Dedicated or Cloud Servers, can change the default settings.

As a default setting, MySQL on a cPanel server imposes a 50MB upload limit for import. Any attempt to upload more than this would see the following error.

MySQL in cPanel uses the following php.ini file, which is located in



You can open the php.ini file using a text editor and change the values as shown below. Note that the value of post_max_size should be twice the upload_max_file size

Change the following lines in the php.ini file:

/upload_max_filesize = 250MB

post_max_size = 500MB

memory_limit = 512

max_execution_time = 3600

Having made these changes, you must save the file. It may also be necessary to restart the MySQL server for changes to take effect.

Posted in Tutorials / Howtos? | Leave a comment

Creating a New Account in WHM cPanel

To create a new account in WHM cPanel, just use this simple tutorial to guide you. We’ve put together a few steps that will allow you to get a new account up and running in just a few clicks.

Step 1 – Click on “Account Functions”.

Step 2 – Click on “Create New Account”.

Step 3 – Enter the desired domain. WHM will automatically create a username based on the first 8 characters of the domain. You can use the suggested username, or define one yourself. Note that usernames can’t begin with a number.

Step 4 – Create a 6-8 character password containing letters, numbers, and special characters. WHM also provides a Password Generator that can be used to create a random, unique password that is of a defined strength.

Step 5 – You have the option to set email notifications for the account. This option can be left blank if desired.

Step 6 – You can manually set the resource limits for the account by clicking on “Select Options Manually”, or you can select a predefined package that will automatically set these limits.

Step 7 – Other available options will include setting a dedicated IP address, providing Shell access, enabling FrontPage Extensions, and Digest Access Authentication for Web CGI Disk; it is recommend that you only set these if explicitly required.

Step 8 – When setting DNS options, it is recommended you only select “Enable DKIM” and “Enable SPF”.

Step 9 – Click “Create” and your account should be successfully created.

Tip: To confirm that the account has been created account, navigate to “Account Information”, and then click “List Accounts”.


Posted in Tutorials / Howtos? | Leave a comment

.UK Anniversary Promotional Offer!

We’re celebrating the first anniversary of the .uk domain with a great deal on all new .uk registrations.

From 10 June until 31 July, you can get your own .uk domain for just £1 + VAT! Here’s how it works:

– Register your .uk domain with us between 08:00 BST 10 Jun 2015 and 12:00 BST 31 Jul 2015 and pay just £1 + VAT. This great offer applies to new registrations and .uk domains that are reserved for owners of existing, or domains.

– When your domain needs to be renewed, you will simply be charged our standard rate for .uk domains if you decide to keep it.

– If you take up this offer on a .uk domain that was reserved for you (as part of the “first right of registration”) and you choose not to renew it, it will become available for anyone to register.

– Multi-year registrations are excluded from the promotion and will be charged at our standard rate for .uk domains.

Register your .uk domain now ›

Free Prize Draw

If you take advantage of this great offer, you will also be automatically entered into a prize draw with a chance to win a prize to the value of £1,000. Simply register your .uk domain during the promotional period and you’ll automatically be entered into the prize draw for that week. A total of £7,000 worth of prizes is up for grabs!

For full details, please see the free prize draw terms and conditions. Winners will be announced on and will be contacted directly to receive their prize.

Posted in Domain And DNS | Tagged , , , , | Leave a comment

Improving the Deliverability and Security of Emails on VPS

There are options to enable authentication of e-mail to increase the deliverability and security of your outgoing e-mails. In this tutorial we will explain how to enable this authentication to achieve the best results when sending emails in order to prevent your emails from being flagged as spam.

Email authentication is required because of the way the email system was originally developed. This makes it very easy to fake a message. An example is an e-mail claiming to be from your domain, when in fact it is a scam designed to steal money or spread malicious software.

Authentication technology prevents this from happening by giving internet servers an  identification check to ensure that the sender is legitimate. The emails that fail to pass the authentication checks can be blocked or put through additional filters, potentially preventing them from reaching the inbox.

How do I activate the authentication?

cPanel includes an easy way to enable authentication of sent emails. This option is available in cPanel in ‘E-mail Authentication’ where you will find at your disposal the DKIM and SPF. Ideally, both options are active, so that we get better results in terms of email delivery.

About DKIM

DKIM helps to verify the integrity of the sender of a message. It allows email system to prove that a message was not altered in transit (which means it is not forged), and that the message came from the specified domain.

About SPF

This function tries to prevent spammers from sending e-mails while forging the name of your domain as the sender (spoofing). This authentication function adds the IP address to a list specifying which computers are authorised to send email from your domain. It verifies that messages sent from your domain are from the listed servers, reducing the amount of backscatter you receive.


  • The full operation of DKIM and SPF after its activation, it may take up to 24 hours to really get better results with the delivery of e-mails.
  • If you have a VPS, it is important to remember that rDNS also needs to be properly set.
  • There are other issues that need to be evaluated when an email is delivered to the SPAM box. Among them, the type of title, the body text and the attachment.
Posted in Tutorials / Howtos? | Leave a comment

Changing The IP In cPanel For Sending Emails

Currently, anyone running a server, is probably used to dealing with constant problems with blacklisted IPs. In many cases, the problem is greater when a single IP is shared by many accounts, which means that all its customers on a server, are sending e-mail from the same IP. All we need is a security for one of the accounts that runs a DarkMailer script because of which all customers receive errors when trying to send some e-mail.

In cPanel, you can change the IP address of the Exim without interrupting service and very easily. If you run a dedicated server, VPS or Cloud, can have a second IP, you can follow these steps and instead use the second IP for sending e-mails.

Step 1:

Sign in to WHM root access and go to Service Configuration “Exim Configuration Manager”. In the ‘Find’ field, look for ‘Reference’. Should enable the Reference / etc / mailips for outgoing SMTP server connection.

See Image:

Step 2:

Sign in via SFTP and in the / etc / mailips, insert the following line:


Where is, you must enter the IP you want to use for sending e-mails.

It’s all done. You can save the change and will thus make submissions through the IP indicated.


Be sure to make an analysis to find out where your server SPAM were sent. If the problem is not corrected, it is very likely that your second IP may also get blocked as well.

Posted in Tutorials / Howtos? | Leave a comment

Add an email account on your Apple device

With evolution of smart devices, everyone has started using smartphones for all types of work whether it’s related to business or personal. Email is one of the most significant mediums of communication in business.

It may not be always possible for entrepreneurs and decision makers to sit before the desktop or carry a laptop to check your business email address accounts. Rather, it’s more feasible to get your business email account configured on the smart devices. Since most entrepreneurs in the UK use iOS devices, we are sharing you a guide for setting up an email account on the iOS devices –

Step 1 » Go to Settings and move down to Mail, Contacts, Calendars.
Step 2 » Click on Add Account.
Step 3 » Tap Other.
Step 4 » Select Add Mail Account.
Step 5 » Name – Enter your name.

Email – Enter your email, for e.g., suppose that is being your domain hosted by WHUK.
Password – Enter the one that you selected for email account in the Control Panel.
Description – Enter a description, for e.g.

Step 6 » Tap Next.
Step 7 » Highlight the IMAP

Incoming Mail Server
Host Name – Enter
User Name – Enter your full email address e.g.
Password – Enter the one that you selected for email account in Control Panel.

Outgoing Mail Server
Host Name – Enter your host name, for e.g.
User Name – Enter your full email address e.g.
Password – Enter the one that you created in Control Panel.

Step 8 » Tap Next.
Step 9 » There is an Optional field but it is essential to fill it out.
Step 10 » Tap Save
Step 11 » Click on the mail you created now.
Step 12 » Click on the Account
Step 13 » Tap SMTP in the Outgoing Mail Server
Step 14 » Tap in the Primary Server

Host Name – Enter your host name, for e.g.
User Name – Enter your full email address e.g.
Password – Enter your password.

Step 15 » Set the Use SSL ON.
Step 16 » Set the Authentication to Password.
Step 17 » Enter 587 (or as defined in our configuration email sent to you) in the Server Port. To verify the information, tap Done and then Account.
Step 18 » Move down to Use SSL for Incoming Settings and slide it to ON.
To ensure that your mails are saved both on device as well as on the server, synchronize Mailbox Behaviors with the server.
Step 19 » Tap Drafts Mailbox.
Step 20 » Go to On the Server field and tap Drafts. Click on Advanced to go back and follow the same for other mailboxes. Set the Sent Mailbox to Sent in the On the Server field, and set the Deleted Trash Box to Trash in the On the Server
Step 21 » To complete the setup, tap Account and Done.

Congratulations! You have successfully configured an email account on your iOS device.

If you find any difficulty with this, please feel free to get in touch with us via. Live chat or email.

Posted in Sales FAQ | Tagged , , | Leave a comment

How to Transfer a Domain Name with least downtime?


» Sign up with your new webhost and do not cancel you existing old hosting account. Make sure that you don’t let them know that you will be cancelling.
» After you have the details for the new existing account and your website is working from the old host server. Now you can start the migration of your website data from old host to the new host via old host FTP and then download all the files. After this connect to the new host FTP and upload all the files.
» Make sure to backup any databases on the old webhost and then upload the backup files via FTP to new webhost. The databases restoration can be done via phpMyAdmin of cPanel or SSH. The emails from the old host can be archived by making connection of each email address with POP3 by doing so all the old email will be downloaded to your local machine/computer. The new host will be able to receive the new emails but the old emails as already downloaded to your local computer would be available only locally.
» If you are having cPanel as hosting control panel in both old and the new host, then if provided by the new host your old emails may also be transferred.
» When on both the hosting account you have a copy of your website, it is now time to change the DNS of your domain.
» After you have confirmed the files on both of the hosting account. You may then update the Nameservers that are provided by the new host in your domain control panel.
» After the change to the DNS has been made, it will take around 48 hours approximately for your website to load from the new hosting server. In the meantime there will be a global DNS propagation of your website and it would be loading randomly from the old or the new host servers.
» Once the 48 hours is over and the DNS you updated is fully functional, your website is loading from the new host. You may contact your old host and cancel your old hosting plan.

Note: to reduce the time taken for propagation, after the website content is transferred, create an A record in the existing DNS. This will redirect all the visitors to the new web server, it is much quicker than time required for the propagation of the nameservers. For delivery of emails to the new servers make a MX record by doing so we avoid the waiting time for email delivery during propagation. It is wise to have MX records and A records pointing to the new hosting servers. After this is done the Nameservers can be changed according to you anytime.

Posted in Domain And DNS | Tagged , , | Leave a comment

Error Installing Modules Such As “json” “phpize\” failed

One of the customers recently faced difficulties with installing json in WHM under Software > Module Installer > PHP Pecl, where he encountered an error:

ERROR: `phpize\’ failed

The object is not in /usr/local/lib/php/extensions/no-debug-non-zts-20060


ERROR: `/root/tmp/pear/cache/json-1.2.1/configure’ failed

Hence with a view to helping everyone who may encounter such as issue, we are posting this post to our knowledgebase.


The error is mainly due to /tmp mounted as nonexec, hence inorder to troubleshoot it, you must follow the below procedure:

Step 1: Login to SSH

Step 2: Make tmp and var/tmp exec

mount -v -o remount,exec /tmp
mount -v -o remount,exec /var/tmp

Step 3: Install JSON using the command:

pecl install json

Step 4: Revert the changes you did in Step 2 by firing the commands:

mount -v -o remount,noexec /tmp
mount -v -o remount,noexec /var/tmp

Posted in Tutorials / Howtos? | Tagged , | Leave a comment

Information on Shellshock Unix Bug

Shellshock is a bug in the Bash system that is used to exert commands on Unix-based operating systems and relates to the processing of environmental variables. It is believed that the bug has existed for around 25 years, but has only just been discovered by Linux expert Stéphane Chazelas and poses a threat to any system that uses the Bash command line interface; this means that any servers running a Linux distribution could be vulnerable and require patching, as well as any Linux distributions used on the desktop, including Mac OSX as this is a Unix-based OS.

The threat lies in the ability for hackers to create specially crafted environmental variables, with potential for the scope of the attack to be extended to include commands, which if achieved would allow hackers to run or install applications on a victim’s machine. Apache also stands to be vulnerable as CGI scripts are executed using shell commands and so it wouldn’t take much for a hacker to call a CGI script using some malicious code. A lot of this is just hypothetical for now since no attacks have been officially recorded thus far.

How does this compare to Heartbleed?

These two bugs focus on different targets. Heartbleed was a bug that lay at the heart of the OpenSSL, an application that is used to encrypt and secure a majority of Internet traffic. With Heartbleed, the security of Internet communications using the application was put at risk as it made it possible for hackers to decrypt what were thought to be secure connections, therefore giving them access to sensitive information. Shellshock on the other hand could prove to be more toxic as it targets Unix-based servers and their command-line interface (CLI) through which the systems are controlled. With much of the Internet running on Apache and with the chances of these Apache web servers running on a Linux base being high, Shellshock has the potential to be more damaging and widespread than Heartbleed.

How can I check if my Linux server or desktop machine is vulnerable?

By running the following Bash command, you will be able to identify if your Linux server is vulnerable:

 env VAR='() { :;}; echo Bash is vulnerable!' bash -c "echo Bash Test"

In the event that you see the following output, your system is vulnerable:

Bash is vulnerable!
Bash Test

You should then take the necessary steps to protect your server by applying the latest Bash patch. Our 24×7 support team is available to assist you with the process at all times.

What impact will Shellshock have on my Linux server?

Shellshock could leave your Linux server (cloud or dedicated) open to remote attack. It is important to ensure that your server is patched as quickly as possible in order to protect your information and so that a hacker doesn’t have the chance to attack. Particular attention should be paid to servers that are running Apache, specifically with the mod_cgi and mod_cgid modules included; particular installations of OpenSSH and some DHCP clients are also vulnerable. A patch has already been released and in order to take advantage of this, you should use the package manager that is included with your Linux distribution; this should be available for major distributions such as Ubuntu, CentOS, Redhat and Fedora. If you are unsure of how to do this then simply contact our 24×7 support team who will be able to patch your server for you.

Posted in Web Hosting Security | Leave a comment