Introduction: cPanel is a widely used control panel that allows users to manage their hosting accounts. Changing the account password regularly is an important security practice to protect websites, emails, and sensitive data from unauthorized access. Prerequisites: Before changing the password, ensure the following: Implementation: STEP 1:  In cPanel Home, click username written over the right corner ..

Read more

Introduction: SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. Prerequisites Before proceeding, ensure ..

Read more

Introduction: WHM (Web Host Manager) allows administrators to manage hosting servers efficiently. One common requirement is adding additional IP addresses, which can be used for hosting multiple websites, assigning dedicated IPs, or configuring SSL certificates. Prerequisites: Before adding an IP address, ensure the following: Implementation: Step -1: Log in to the WHM portal. Step -2: ..

Read more

Introduction: Webmail in cPanel allows you to access your email accounts directly from a web browser without needing external email clients like Outlook or Thunderbird. It provides a convenient way to send, receive, and manage emails from anywhere. This guide explains how to quickly access your webmail account through cPanel. Prerequisites: Before proceeding, ensure you ..

Read more

Introduction File permissions control who can read, write, and execute files on your server. In web hosting environments like cPanel, setting the correct permissions is important for both security and proper functioning of your website. This guide will help you easily modify file or folder permissions using cPanel’s File Manager. Prerequisites Before you begin, make ..

Read more

Introduction Rkhunter (Rootkit Hunter) is an open-source security tool used to scan Linux systems for rootkits, backdoors, and other potential security threats. It works by comparing file hashes, checking for suspicious strings in kernel modules, and verifying system binaries against known good values. Installing Rkhunter on your Linux server helps enhance system security by providing ..

Read more

Introduction: Vesta Control Panel (VestaCP) is a lightweight hosting control panel used to manage websites, email, DNS, and databases. However, there may be situations where you need to completely remove VestaCP from your server—such as migrating to another control panel or cleaning up unused services. This guide provides step-by-step instructions to safely uninstall VestaCP from ..

Read more

Introduction: Remote MySQL allows external servers or applications to connect to your database hosted on cPanel. This is useful when your application is hosted on a different server than your database or when you need external access for development, reporting, or integration purposes. This guide explains how to securely configure remote MySQL access using cPanel. ..

Read more

Introduction: Sometimes, while working with web applications, you may encounter errors that require modifying PHP configuration values (such as memory_limit, upload_max_filesize, or max_execution_time). Instead of manually editing the php.ini file via SSH and restarting services, WHM (Web Host Manager) provides a simple and user-friendly way to update these values directly from the interface. Prerequisites: Before ..

Read more

Introduction Creating a website is now easier than ever, thanks to user-friendly tools like cPanel and Softaculous. WordPress is one of the most widely used content management systems (CMS) in the world, powering millions of websites due to its flexibility and ease of use. In this guide, you will learn how to install WordPress on ..

Read more