This article illustrates how to modify the CSF/LFD email address through SSH. It guarantees that important security warnings are sent to the right email, preserving server security and enabling timely…
Category: Security and Backups
Resolving Yum Issues with Imunify360 “Hardened” PHP repository on CloudLinux
August 14, 2024 / Imunify 360This tutorial will illustrate how to resolve Yum issues with the Imunify360 “Hardened” PHP repository on CloudLinux. Symptoms: The system package management, yum or dnf, cannot update RPMs and inhibit…
How to control spam mails by enabling RBL in reseller accounts
August 12, 2024 / Security and BackupsIn this article, we will discuss how to control spam mail by enabling RBL (Real-time Blackhole List) in reseller accounts. It helps control spam by blocking emails from known sources…
How to Increase the PHP Memory limit
July 19, 2024 / R1 Soft BackupThis guide explains how to increase the PHP memory limit. The ‘memory_limit’ is a PHP setting that determines the maximum amount of memory a script can use. It should be…
How to run AutoSSL in SSL/TLS
July 18, 2024 / SSLThis way, you can increase the PHP memory limit. If you require additional assistance, feel free to contact our support staff. In this article, you will learn how to run…
How to Use Imunify360 for Directory Malware Scanning
July 12, 2024 / Imunify 360The tool’s Linux Malware Scanner automatically cleans infected files, while its dashboard integrates incident tracking. Learn how to scan directories for malware using Immunify360. Follow these steps: Log in to…
How to Install ImageMagick PHP extension via SSH
July 1, 2024 / Security and BackupsThis article explains how to install ImageMagick PHP extension via SSH. After creating your website, you may require the ImageMagick PHP extension for advanced image processing, particularly if you are…
How to maintain regular website backups using R1Soft and Acronis
June 12, 2024 / Security and BackupsThis guide explains how to maintain regular website backups as it is one of the crucial tasks for guaranteeing data security and recovery in case of data loss or website…
How to mount remote file systems over SSH
May 6, 2024 / Security and BackupsThis article explains how to mount remote file systems over SSH. It covers installing the SSHFS client on Linux and the process of mounting remote directories over SSH. SSHFS (SSH…
How to Manage Network traffic in Veeam
January 5, 2024 / Veeam BackupThis guide explains how to manage network traffic in Veeam. By default, Veeam Backup & Replication uses five connections to transfer data, but if the network gets overwhelmed, you can…
How to change the PHP version used in CLI through SSH
January 4, 2024 / Security and BackupsThis article provides instructions for changing the PHP version used in command line interface through SSH. Follow the steps- Connect through SSH. If the file does not exit, create a…
How to schedule configuration backups using Veeam
January 3, 2024 / Veeam BackupIn this article, we have explained how to schedule configuration backups using Veeam Backup & Replication. Salient notes- If you wish to migrate configuration data to the database used by…
How to Generate an SSH key pair
September 27, 2023 / Security and BackupsIn this article, we will explain how to generate an SSH key pair using the SSH – keygen. Execute the following procedure to generate an SSH key pair on UNIX…
How to view your SSH public key on Linux
September 12, 2023 / Security and BackupsIn this article, we will explain how to view your SSH public key on Linux. There are two methods for viewing your SSH public key in Linux- The first method…