Category : Dedicated Hosting

Introduction Denying access from a specific IP address will not allow to access the applications even if originating legitimate requests Prerequisite Implementation Step 1:  Login to cPanel Step 2: Click on IP Blocker from the security section Step 3: Enter the domain name or IP address that needs to be blocked Step 4: Click on ..

Read more

Introduction The disk space quota is the total hard drive space allocated on the server for an account Prerequisite Implementation Step 1: Log in to the WHM Step 2: Navigate Home >> Tools >> Server Configuration >> Tweak Settings Step 3: Under All >> Notifications, locate the option Disk quota usage warnings Step 4: Click on ..

Read more

Introduction  A CSR (Certificate Signing Request) is a specially formatted encrypted message sent from a Secure Sockets Layer (SSL) digital certificate applicant to a certificate authority (CA) Prerequisite Implementation Step 1:Login to the cPanel account. Step 2: Select “SSL/TLS” which is under the “Security” section of your panel Step 3: Click the Certificate signing requests ..

Read more

Introduction SMTP2GO is a fast and scalable email service provider, for sending transactional and marketing emails and viewing reports on email delivery Prerequisites 1. WHM logins2. Active account in SMTP2GO Implementation Step 1: Log in to WHM Step 2: Search for Exim in the search bar and click on Exim Configuration Manager Step 3: Click ..

Read more

Introduction WordPress is a content management system (CMS) that allows us to host and build websites. WordPress contains plugin architecture and a template system, so we can customize any website to fit our business, blog, portfolio, or online store Prerequisite 1. WordPress admin credentials 2. cPanel Logins  Implementation Step 1: Login the WordPress with the ..

Read more

Introduction SSL stands for Secure Sockets Layer and it’s the standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two systems, preventing criminals from reading and modifying any information transferred, including potential personal details. Prerequisite 1. cPanel logins Implementation Step 1: Log into your cPanel account ..

Read more