• Email Address: forum@outsourcepath.com
English
  • English
Topics related to ad

APT Security: What Are Advanced Persistent Threats?

This article covers an overview about APTs. An advanced persistent threat (APT) is among the most dangerous cyber threats a company can face.

These attacks are hard to detect and allow an intruder to hide within a network for months. While hackers stay in the system, a company suffers regular data losses and outages without knowing the cause of problems.

While advanced persistent threats were once considered specifically dangerous to government institutions and large enterprises, the threat landscape is constantly shifting. Now, no organization is safe from these types of attacks. 

Because they are difficult to detect, and remain in systems for long periods of time and cause devastating losses to their targets, it's important to educate ourselves.

Knowing what APTs are, how to recognize common signs of their presence in a network, and of course, staying diligent and having a good detection and response plan are essential in protecting any organization from this silent threat. 


What is difference between APTs and malware?

Most malware executes a quick damaging attack, but APTs take a different, more strategic and stealthy approach. 

The attackers come in through traditional malware like Trojans or phishing, but then they cover their tracks as they secretly move around and plant their attack software throughout the network.


Phases of APT attack:

A successful APT attack can be broken down into three stages: 

1. Network infiltration.

2. The expansion of the attacker's presence.

3. The extraction of amassed data—all without being detected.

Install Docker On Ubuntu 18.04

This article will guide you on the process to successfully install the latest version of the #Docker engine and #Docker-Compose on an #Ubuntu server (version 18 and up).

Windows Error 0x8004230F

This article will guide you on the steps to fix Windows Error 0x8004230F when creating System Restore point in Windows 10.

Tips to fix "Error 633: The modem or other connecting device is already in use" in Windows 10?

This article will guide you on the different methods to resolve VPN Error 633 in your Windows 10 computer which occurs while trying to connect to the internet.

Pluggable.php File Errors in WordPress – Fix it Now ?

This article covers methods to fix Pluggable.php File Errors in WordPress. Basically, this WordPress error triggers when we add a code snippet on our site or activate a new plugin.

This means that Pluggable.php file errors takes place as a result of a poorly coded theme or plugin. It could also be a result of code errors in your WP files. 


The first option when troubleshooting the Warning: cannot modify header information pluggable.php error is to manually edit the faulty file. You are already supplied with the necessary information to locate the problem in the error message (remember, it's the first file in the message). 

All you need to do is open up this file, either through an FTP client like FileZilla, or through File Manager.

Make sure to pay special attention to the starting and ending PHP tags. 

There should not be spaces before or after the <?php tag, as well as the ?> tag. 

Also, the last line of code should not be followed with a blank line or extra space.

NRPE Command Plugin Not Defined - How to fix it ?

This article covers methods to resolve 'NRPE Command Plugin Not Defined' for our customers.

This error is very straight forward. Usually this is caused by a mismatch between the command name declared in Nagios XI to be check through NRPE and the actual command name of the command directive in the remote host's nrpe.cfg file.

This problem will occur in versions of check_nrpe before v3. 

What is happening here is that the initial -c check_users is being overwritten by the -a -w 5 -c 10, as check_nrpe thinks the -c 10 argument is the command argument, not one of the -a arguments.

Install PHP 8 on Ubuntu 20.04 or 18.04 - Step by Step Process ?

This article covers steps to install PHP 8 on Ubuntu. PHP is arguably one of the most widely used server-side programming languages. It's the language of choice when developing dynamic and responsive websites. Basically, popular CM platforms such as WordPress, Drupal, and Magento are based on PHP.


To Install PHP as Apache Module

Run the commands:

$ sudo apt update
$ sudo apt install php8.0 libapache2-mod-php8.0

Once the packages are installed, restart Apache for the PHP module to get loaded:

$ sudo systemctl restart apache2


To Configure Apache with PHP-FPM

Php-FPM is a FastCGI process manager for PHP. 

1. Run the following command to install the necessary packages:

$ sudo apt update
$ sudo apt install php8.0-fpm libapache2-mod-fcgid

2. By default PHP-FPM is not enabled in Apache. 

To enable it, run:

$ sudo a2enmod proxy_fcgi setenvif
$ sudo a2enconf php8.0-fpm

3. To activate the changes, restart Apache:

$ systemctl restart apache2 


To install PHP 8.0 with Nginx

Nginx doesn't have built-in support for processing PHP files. We'll use PHP-FPM ("fastCGI process manager") to handle the PHP files.

Run the following commands to install PHP and PHP FPM packages:

$ sudo apt update
$ sudo apt install php8.0-fpm

Once the installation is completed, the FPM service will start automatically. 

To check the status of the service, run

$ systemctl status php8.0-fpm

Do not forget to restart the Nginx service so that the new configuration takes effect:

$ sudo systemctl restart nginx

Install PHP 8 on Debian 10 / Debian 9 - Step by Step Process ?

This article covers how to install PHP 8 on any Linux distribution.


To install Apache with PHP 8 module:

$ sudo apt install apache2 libapache2-mod-php8.0 

After successful installation, restart Apache service to reload newly installed modules:

$ sudo systemctl restart apache2 


To check loaded PHP modules use the command:

$ php -m

Set-ADUser Modify Active Directory Users with PowerShell - Do it now ?

This article covers how to use Set-ADUser Modify Active Directory Users with PowerShell.

Basically, the Set-ADUser cmdlet is part of the Active Directory module for Windows PowerShell.


The Identity parameter specifies the Active Directory user to modify. 

You can identify a user by its distinguished name, GUID, security identifier (SID), or Security Account Manager (SAM) account name. 

You can also set the Identity parameter to an object variable such as $<localUserObject>, or you can pass an object through the pipeline to the Identity parameter.

WordPress error "Destination Folder Already Exists" – Fix it Now ?

This article covers methods to fix WordPress error "Destination Folder Already Exists".

Basically, this WordPress error triggers when a folder with the same name as that of the plugin or theme already exists. 


To resolve WordPress "Destination folder already exists" error:

Since the error is caused by a plugin or theme folder that already exists, the easiest way to solve the error is by deleting the folder. 

The process of deleting a theme via FTP is the same one you use for deleting a plugin. 

The only exception is that you need to navigate to wp-content/themes instead of wp-content/plugins. 

1. To delete the plugin folder, connect to your server using your FTP credentials and navigate to your root WordPress directory, often called public_html.

2. Then, go to the wp-content/plugins directory.

3. Within the plugins directory, find the plugin folder mentioned in the error message.

4. When you've located the folder you need, right-click on it and press the Delete option from the menu that appears.

5. After that, you will be prompted to confirm your choice. Press the Yes button to proceed.

6. Then, you will have to wait a bit until the plugin folder, as well as all directories and files within it, are deleted. 

Plesk error FPM initialization failed - Fix it Now ?

This article covers methods to fix Plesk error, FPM initialization failed.

Basically, the error "FPM initialization failed" triggers in Plesk mainly in different formats. The is as a result of Incorrect PHP configuration file was generated during subdomain creation via XML API.


To fix this Plesk error:

i. Log in to Plesk server via SSH.

ii. Remove the excessive configuration file:

rm -f  /etc/php-fpm.d/subdomain.example.com.conf

DirectAdmin PhpMyAdmin error 500 - Fix it Now ?

This article covers methods to resolve DirectAdmin PhpMyAdmin error 500. This error happens as a result of a number of reasons that include PHP settings, modsecurity rules and so on.


To resolve this error, In the library is /usr/share/phpmyadmin/libraries/sql.lib.php,

You need to modify the file:

From && ($analyzed_sql_results['select_expr'][0] == '*')))

to && ($analyzed_sql_results['select_expr'][0] == '*'))

PrestaShop back office error 500 or blank page - Fix it Now ?

This article covers methods to resolve PrestaShop back office error 500.

The error happens when the Back-office is accessed only from Debug mode activated or in production mode activated. The characteristic of this error is that it only occurs in one of the modes and not in both.

Also, this is an error that is occurring ONLY IN PRESTASHOP STORES VERSION 1.7, and that makes it impossible for us to enter the Back-office, showing an error 500 or the page goes blank. 

That's why we call it a critical mistake, for leaving the store inoperative.


To fix a HTTP 500 error on PrestaShop online store website:

You can activate your web host's FTP or CPanel error reports in your PrestaShop shop.

1.  From PrestaShop v1.4 to v1.5.2

i. Open config/config.inc.php

ii. On line 29, you will find this line: @ini_set('display_errors','off');

iii. Replace it with: @ini_set('display_errors','on');


2. PrestaShop v1.5.3 and later versions (including 1.6 and 1.7)

i. Open config/defines.inc.php

ii. On line 28, you will find this line: define('_PS_MODE_DEV_', false);

iii. Replace it with: define('_PS_MODE_DEV_', true);

Once error reports from the FTP or CPanel are activated, you can browse your store's front or back office to find out what the problem is.


More about Server error 500:

Error 500 means Internal server Error. Whenever a 500 error occurs, the task to return information by the server to the web browser will stop. 

Therefore, as we mentioned above, this is a critical error that would leave the website inoperative.

The 500 errors, as we noted above, are internal server errors and their origin may be in a programming code error on any item that is included and related to the request for information returned by the server to the web browser. 

Therefore, not all 500 errors come from the same source.

Prestashop parse error – How to fix the syntax error ?

This article covers ways to resolve Prestashop parse error.

Basically, Prestashop parse error happens when we install Prestashop 1.7 or above or accessing the admin panel of the store.


To fix this error:

1. You can start with emptying your cache by deleting the /var/cache directory.

If that doesn't work copy lines 28-30 from another shop and save it.

2. Also you can try to remove the following:

# php -- BEGIN cPanel-generated handler, do not edit
# Set the “ea-php72” package as the default “PHP” programming language.
<IfModule mime_module>
  AddHandler application/x-httpd-ea-php72 .php .php7 .phtml
</IfModule>
# php -- END cPanel-generated handler, do not edit

From end of .htaccess. 

Just to be sure if that is not source of issues.

Cloudflare 502 error - Fix it Now ?

This article covers methods to resolve Cloudflare 502 error. Basically, the Cloudflare 502 error triggers when the origin web server responds with a standard HTTP 502 bad gateway or 504 gateway timeout error. 

This happens due to firewall restrictions and server resource issues.


Cause of 502 Bad Gateway Errors:

1. Domain name not resolvable

The domain name is not pointing to the correct IP or it does not point to any IP this problem may happen. Also, DNS propagation could take some time to make changes in DNS setting. It may take 24 to 48 hours to make reflect which is dependent upon the TTL defined per record on the DNS.

2. server down

The origin server is not reachable, this may due to the server is down for some reason or there is no communication to the server given.

3. Firewall blocks

A firewall interrupts the communication between the edge servers and the origin server. This may be caused by security plugins of your CMS.

As a part of DDOS protection and mitigation process or due to some strict firewall rules servers can be blocked from accessing the original server.

Nginx upstream timed out error - Fix it Now ?

This article covers methods to resolve Nginx upstream timed out error. Basically, this error happens as a result of server resource usage and software timeouts.

A possible issue here could be that PHP is using too much RAM and the PHP FPM process gets killed. 


Therefore, do the following to fix this nginx error:

1. Make sure that there is enough RAM on the server, to check that you could use the top, htop or free -m commands.

2. Make sure that the PHP memory limit is not too high compared to the actual available memory on the Droplet. 

For example if you have 1GB of RAM available your PHP memory limit should not be more than 64MB otherwise only a few processes could consume all of your memory.

3. Optimize your website by installing a good caching plugin, that way you would reduce the overall resource usage on the server.

4. Delete any plugins that are not being used. Generally speaking, it is always recommended to try and keep the number of your plugins as low as possible.

5. Consider using a CDN like Cloudflare, that way it would offload some of the heavy liftings from your Droplet. 

Nagios error Unable To Login Using Two Factor Authentication

This article covers how to resolve Two Factor Authentication error in Nagios. 


To Reset nagiosadmin account Password:

1. Open an SSH or direct console session to your Nagios XI host and execute the following command:

/usr/local/nagiosxi/scripts/reset_nagiosadmin_password.php --password=newpassword

Note: If you would like to use special characters in your password, you should escape them with "\".

For example, if you want to set your new password to be "$new password#", then you can run:

/usr/local/nagiosxi/scripts/reset_nagiosadmin_password.php --password=\$new\ password\#

WordPress error "Sorry this file type is not permitted for security reasons" - Fix it Now ?

This article covers methods to resolve WordPress error "Sorry this file type is not permitted for security reasons". Basically, "Sorry this file type is not permitted for security reasons" in WordPress occurs when we try to upload a document to the WordPress library.

As we explained above, WordPress default configuration limits the types of files that you can upload to your site for security reasons.


To Fix "Sorry, This File Type Is Not Permitted for Security Reasons" Error in WordPress, Try to Use the Free WP Extra File Types Plugin:

1. If you'd prefer not to edit your wp-config.php file and/or you want more control over exactly which file types can be uploaded to your site, you can use the free WP Extra File Types plugin at WordPress.org

2. Once you install and activate the plugin, go to Settings → Extra File Types in your WordPress dashboard.

3. There, you'll see a lengthy list of file types. Check the box next to the file type(s) that you want to be able to upload and then click Save Changes at the bottom.

4. If you don't see the file type that you'd like to upload on the list, you can also add your own custom file types at the bottom of the plugin's settings list.

SNMP MIB Upload Problems in Nagios – Fix it Now ?

This article covers Nagios SNMP MIB Upload Problems.

This issue happens while uploading SNMP MIB files and it could be as a result of insufficient permissions on the SNMP MIB files.


Execute the following commands to reset the permissions and ownership on the Nagios SNMP MIB files:

# chmod -R ug+rw /usr/share/snmp/mibs
# chown -R root:nagios /usr/share/snmp/mibs

After executing those commands you should be able to upload the MIB file that previously did not work.

Reset Upgrade Status In Nagios Web Interface - How to Perform it ?

This article covers how to Reset Upgrade Status In Nagios Web Interface.

When upgrading Nagios XI using the web interface the upgrade progress may stall with the message "Upgrade in progress". 

Sometimes you will need to clear this message manually due to unforeseen circumstances, this guide explains how to clear the message.


To Reset Upgrade Status in Nagios:

The following command will reset the upgrade status on Nagios XI (using the default username and password listed above):

For MySQL/MariaDB:

mysql -u'nagiosxi' -p'n@gweb' nagiosxi -e "update xi_commands set status_code = '2' where command = '1120';"

Nagios mysql_error out of range value for column - Fix it now ?

This article covers Nagios error, mysql_error out of range value for column which is evident in the /var/log/messages file on the Nagios XI server.

To resolve this issue you will need to define the SQL Mode in the MySQL / MariaDB my.cnf configuration file:

1. Locate the [mysqld] section and check to see if there is an sql_mode already defined:

[mysqld]
# Recommended in standard MySQL setup
sql_mode=NO_ENGINE_SUBSTITUTION,STRICT_TRANS_TABLES

2. If the sql_mode= line already exists you will need to replace it with the following. 

If the line does not exist you will need to add the following line:

[mysqld]
sql_mode=""

Prestashop error "an error occurred while sending the message" - Fix it Now ?

This article covers methods to fix Prestashop error "an error occurred while sending the message".

This error happens when the theme that we use does not adapt to the latest version of Prestashop.

To resolve this error, you can try modifying the contact form file.

Add this before the submit button :

<style>
input[name=url] {
display: none !important;
}
</style>
<input type="text" name="url" value=""/>
<input type="hidden" name="token" value="{$token}" />

Plesk Webmail Server Not Found - Fix it Now ?

This article covers methods to resolve the Plesk error "Webmail Server Not Found" which can happen while opening webmail/domain in a browser or when we issue Let's Encrypt on the domain. The main reason for this error is that the Webmail / domain does not resolve correctly in global DNS system because Plesk server is not set up to manage DNS.

To use DNS with a Plesk server:
1. DNS Server should be installed in Plesk Installer.
2. Log into Plesk and find your Name Servers in Plesk > Domains > example.com > DNS Settings, take the "value" for the record type "NS".
3. Then, it is required to change Name Server for your domain at your domain registrar's account.

503 bad sequence of commands - Fix it now ?

This article covers methods to fix the email error, "503 bad sequence of commands" which happens as a result of a number of reasons.

To resolve SMTP response: 503 Bad sequence of commands, consider the following and also read the complete guide here.
The IP that should be 10.0.0.0 - whatever that is, look at that box, this is where the problem is likely to be.
Your internal domain is domain.com or domain.net etc.
You may also add a test email account and check if it works as expected. If this works, then this could be an issue with the email account or with the service provider.

PiP is not recognized as an internal or external command - Fix it Now ?

This article covers different methods to resolve PiP is not recognized as an internal or external command.

Basically, the error, "PiP is not recognized as an internal or external command" happens when we try to install Python packages via a Command Prompt window.
PiP is a recursive acronym for "Pip Installs Packages".

It's essentially a package management system used to install and manage software packages written in Python. Most users make use of PiP to install and manage Python packages found in the Python Package Index.

To add PIP to the PATH environment variable using the Windows GUI:

1. Press Windows key + R to open up a Run dialog box. Then, type "sysdm.cpl" and press Enter to open up the System Properties screen.
2. Inside the System Properties screen, go to the Advanced tab, then click on Environment Variables.
3. In the Environment Variables screen, go to System variables and click on Path to select it. Then with the Path selected, click the Edit… button.
4. In the Edit environment variable screen, click on New and add the path where the PiP installation is located. For Python 3.4, the default location is C:\Python34\Scripts.
5. Once the path is added, open a fresh CMD window and try to install a python package that comes with PiP.

You should no longer see the "pip is not recognized as an internal or external command" error.

WordPress issue "Add Media button not working" - Fix it Now ?

This article covers how to Fix WordPress Add Media Button Not Working.
The main reason behind this error is usually custom scripts not working correctly, plugins, or themes.
You can pinpoint the cause of your woes using your browser's Inspect -> Console.
The console tool highlights script errors that can help you to identify where the problem lies.

To fix this WordPress error:

1. That aside, start by deactivating all of your plugins.
2. Then check if the Add Media button is working.
3. If the button is working, then it is obvious one of your plugin is causing the script conflict.
4. Next, reactivate the plugins one by one, and check the Add Media button after each activation.
5. When you find the responsible plugin, contact the developer for help or find a replacement.
6. If the problem persists after deactivating all plugins, you need to ensure you've cleared your caches first and then test if your theme is the cause of the WordPress Add Media button not working.
7. Just activate a default WordPress theme such as Twenty Seventeen and then check if the problem is gone.
If the button works, the issue here is your theme.

Undefined index notice in Joomla - Fix it now ?

This article covers how to resolve Undefined index notice in Joomla. A notice, in PHP terms (PHP is the scripting language that powers Joomla), is more or less a complaint. For example, if you're using a deprecated function such as ereg_replace (by the way, we have had quite a few sites with the ereg_replace() is deprecated notice that we needed to fix) then PHP will complain with a notice.
A notice may also be displayed if you're trying to use questionable casting that PHP thinks will not return the result that you want (for example, if you try to forcefully cast an array into a string).

To fix this Joomla warning:

Change PHP's error reporting in the .htaccess file to hide all errors.
You can do that by adding the following code to your .htaccess file:

php_flag display_startup_errors on
php_flag display_errors on
php_flag html_errors on

The above code will ensure that no error whatsoever will be displayed on your website.

Note that if you have an Error Reporting setting in your configuration settings other than "Default", then this setting will override the error reporting defined in your .htaccess.
For example, if your Error Reporting is set to "Maximum", then the above code in your .htaccess file has no effect.


WordPress error "This site ahead contains harmful programs" - Fix it Now ?

This article covers WordPress error "This site ahead contains harmful programs".

Basically, the error, This site ahead contains harmful programs happens when Google finds any suspicious code.


It's risky for Google users to visit hacked websites because they could become targets of the hacker:
1. Hackers could steal their data or redirect them to phishing sites.
2. Hackers could trick them into downloading malware onto their devices.
3. Visitors may be subjected to viewing inappropriate malicious content and ads.

Search engines like Google constantly crawl the web for new sites and new content to index.
They use bots and algorithms to check a website's content is original and relevant.
They can also check which websites are using deceitful tactics such as keyword stuffing.


During this process, they can also detect if there's malicious code on your website.
If they do, they proceed to:

1. Blacklist your website immediately.
2. Display "Site Ahead Contains Harmful Programs" or "This site contains malware" warnings to visitors.
3. Depending on the risk posed by your site, it gives users an option to bypass their security warning and proceed to your site by clicking on 'details'.
Or they can choose to leave the site and go 'back to safety'.

Can't read from the source file or disk - Fix it Now ?

This article covers how to fix "can't read from the source file or disk" error.
Basically, this error triggers when trying to copy certain files to or from an external hard disk.
Many users have reported that they got "Can't read from the source file or disk" error message while copying, deleting or moving files from one location to another.

To fix Error Message: Can't read from the source file or disk:
1. Restart the PC
If you can't read from the source file or disk while copying in Windows 10, and this happens for the first time, try restarting the computer (do not turn off and on, just restart).
Rebooting helps the computer deal with such errors on its own and returns it to an adequate working state.
2. Check the file name
Changing the file name is justified when the file was created in one OS, and its use occurs in another. You may not be able to read from the source file or disk while deleting after using this file on the command line. If this is your situation, be sure to rename the file properly and restart the computer after that.
3. Try to open the file on another PC
Try to do the same as in method 2, but on another PC. Better yet, if it will be a completely different OS (for example, you have Windows installed, then look for a computer with a Mac, etc.).
This will help get rid of any conflicts between the file and the computer, which can happen quite often.
4. Use chkdsk to fix bad sectors
The free chkdsk utility usually handles such errors with ease.

The source file names are larger than is supported by the file system

This article covers methods to resolve Windows error "The source file names are larger than is supported by the file system". Most Windows users encounter this issue when trying to copy or delete a file on the computer and they may receive an error message saying Source Path Too Long with the explanation of the source file name(s) are larger than is supported by the file system.


This Windows error error happens mainly because one or more files that are kept in a series of subfolders that have long names, but Windows only allows 258 characters at most in the folder path subfolder.
This will prevent you from moving the files or folders that are saved in this folder.

To fix this windows error, try the following:

Delete the File/Folder by Bypassing the Recycle Bin
You know that when you delete files from your computer, these files will be first moved to the Recycle Bin and they will stay there until you delete them permanently.
i. Click on the file or folder that is bothered by the Source Path Too Long error.
ii. Press the SHIFT and Delete buttons at the same time to permanently delete the file or folder.

"Are you sure you want to do this" error in WordPress - Fix it Now ?

This article covers methods to fix 'Are you sure you want to do this' error in WordPress for our customers.

One of the most common solutions is to revert your website to an older backup before the error occurred. If you update your backup regularly, it is one of the most powerful tools to use against errors.
If you do not update regularly, the backup is close to worthless because it is missing your regular content updates and website changes.

To fix "Are You Sure You Want to Do This" Error in WordPress:

1. You will not need any additional plugins to solve this issue and in fact, a plugin is likely causing the issue. The error is very simple to track but can become quite tedious if you have a lot of plugins and themes installed. The process includes disabling your themes and plugins while checking to see if the error is fixed. If you have a lot of plugins, this process may take a while. Deactivating the plugins will not be enough because they can still cause a problem. This is why it is recommended to uninstall a plugin if you are not using it.
2. Log into the cPanel and click on the File Manager. Click on the public-html directory and locate the wp-content folder. This folder contains all of the content on your website. Locate the plugins folder and right-click it.
Select the Rename option and rename it to "plugins off" or something similar.

WordPress error 'Another update currently in process' – Fix it Now ?

This article covers how to resolve WordPress error 'Another update currently in process'.
Basically, this issue usually occurs when a WordPress user, or multiple users, are simultaneously trying to perform a WordPress update while a WordPress core update is running.
During a core update, an additional row called core_updater.lock is placed within the wp_options table of the website’s database. It serves to prevent any other updates from being run while the core update is in progress.
After the WordPress core has been updated, the core_updater.lock row will be deleted, which will allow users to perform any other updates.
The error message will disappear then, or it will be gone automatically after 15 minutes.

To fix this WordPress error:

1. Log into the WordPress administration dashboard and select Plugins > Add New. Search for Fix Another Update, then install and activate the plugin.
2. Navigate to Settings > Fix Another Update In Progress and the database lock will be removed.
3. If you wish to remove the lock directly in the database, Select Databases > phpMyAdmin from the cPanel menu.
4. Select your WordPress database from the sidebar, then click the Browse button next to the wp_options database table (your database prefix may be different).
5. In the database rows that appear, look for an entry called ‘core_updater.lock’ and select the Delete button to remove. You can now proceed with your outstanding updates.

Install Bcrypt in Docker and resolve related errors

This article covers how to install Bcrypt in Docker and fix relating Docker errors.

To fix bcrypt error on Docker:

The error looks like this,

internal/modules/cjs/loader.js:807
app_1 | return process.dlopen(module, path.toNamespacedPath(filename));

To resolve, simply Add the following lines of code to the start.sh file,

#!/usr/bin/env bash

# install new dependencies if any
npm install
# uninstall the current bcrypt modules
npm uninstall bcrypt
# install the bcrypt modules for the machine
npm install bcrypt
echo "Starting API server"
npm start

Here,

i. npm uninstall bcrypt would remove bcrypt modules for the other operating system.
ii. npm install bcrypt would install for the current machine that the app would be running on.

WordPress error Failed to Load Resource - Fix it Now ?

This article covers how to resolve the WordPress error Failed to load resource in WordPress as a result of issues in WordPress URL settings.

To fix this WordPress error:

1. Replace The Missing Resource

The missing resource is an image in one of your blog posts or page, then try to look for it in the media library.

If you are able to see the media library, then try to add again by editing the post or page.

2. Replace theme or plugin files

In case, if the failed resource is a WordPress plugin or theme file, then the easiest way to replace it is by reinstalling the plugin or theme.

First, you need to deactivate your current WordPress theme.

All you have to do is visit the Appearance » Themes page.

NRPE: No Output Returned From Plugin - How to fix this Nagios error ?

This article covers how to resolve Nagios error, NRPE: No Output Returned From Plugin. This error happens as a result of Permissions or Missing plugin.

To fix this Nagios error:

1. The most common solution is to check the permissions on the check_nrpe binary on the Nagios XI server:

ls -la /usr/local/nagios/libexec/check_nrpe

The expected permissions should resemble:

-rwxrwxr-x. 1 nagios nagios  75444 Nov 21 01:38 check_nrpe

2. If not, change ownership to user/group "nagios" and fix up the permissions:

$ chown nagios:nagios /usr/local/nagios/libexec/check_nrpe
$ chmod u+rwx /usr/local/nagios/libexec/check_nrpe
$ chmod u+rx /usr/local/nagios/libexec/check_nrpe

Googlebot cannot access CSS and JS files – Resolve crawl errors ?

This guide covers website crawl errors, Googlebot cannot access CSS and JS files. Google bot and other search spiders will visit the robots.txt file of your website immediately after they hit the htaccess file.

Htaccess has rules to block ip addresses, redirect URLs, enable gzip compression, etc. The robots.txt will have a set of rules for the search engines too. 

They are the reason you received "Googlebot Cannot Access CSS and JS files". 

Robots.txt has few lines that will either block or allow crawling of files and directories. Google has started penalizing websites that block the crawling of js and css files.

The JavaScript and cascading style sheets are responsible for rendering your website and they handle forms, fire events, and so on.

If the JS is blocked, Google bot will not be able to crawl the code and it will consider the code as a spam or violation of link schemes. 

The same logic applies for the CSS files.


To resolve "Googlebot Cannot Access CSS And JS Files" Warning:

1. You need to remove following line: Disallow: /wp-includes/

Depending upon how you have configured your robots.txt file, it will fix most of the warnings. 

You will most likely see that your site has disallowed access to some WordPress directories like this:

User-agent: *

Disallow: /wp-admin/
Disallow: /wp-includes/
Disallow: /wp-content/plugins/
Disallow: /wp-content/themes/

2. You can override this in robots.txt by allowing access to blocked folders:

User-agent: *
Allow: /wp-includes/js/

Plesk error PHP has encountered an Access Violation - Fix it now

This article covers how to fix PHP has encountered an Access Violation which occurs in the Windows server with the Plesk control panel. 

Do a copy libmysql.dll from C:\Program Files (x86)\SWsoft\Plesk\Additional\PleskPHP5 to C:\WINDOWS\system32

Wait for few minutes and it should fix the issue.


To fix PHP has encountered an Access Violation at XXXXX in Plesk:

1. Connect to the server via SSH.

2. Create a backup of the psa database:

plesk db dump psa > /root/psa_backup.sql

3. Download the attached script:

$ wget https://plesk.zendesk.com/hc/article_attachments/115001860533/script_kb213376309

4. Make the script executable:

$ chmod +x script_kb213376309

5. Launch the script for the affected subscription:

Note: change the "example.com" website in the command below to the correct one.

$ ./script_kb213376309 example.com

6. If an error like below appears:

ERROR 1062 (23000) at line 5: Duplicate entry '123-789' for key 'PRIMARY' exit status 1

find the duplicate record in the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry.

plesk db "select * from IpAddressesCollections where ipCollectionId=123;"

7. Remove the duplicate record from the database:

Note: change the "123" ipCollectionId in the command below to the correct one based on the error message regarding the duplicate entry

Change the "456" ipAddressId in the command below to the correct one based on the output from the previous step.

$ plesk db "delete from IpAddressesCollections where ipCollectionId=123 and ipAddressId=456;"

Set Up Amazon WorkSpaces - Step by Step Process

This article covers how to set up Amazon WorkSpaces for our customers. Amazon WorkSpaces is a managed, secure Desktop-as-a-Service (DaaS) solution. With Amazon WorkSpaces, your users get a fast, responsive desktop of their choice that they can access anywhere, anytime, from any supported device.

With Amazon WorkSpaces, you can provision virtual, cloud-based Microsoft Windows or Amazon Linux desktops for your users, known as WorkSpaces.

Generally, Workspaces are meant to reduce clutter and make the desktop easier to navigate. Workspaces can be used to organize your work. For example, you could have all your communication windows, such as e-mail and your chat program, on one workspace, and the work you are doing on a different workspace.

The Amazon WorkSpaces Free Tier provides two Standard bundle WorkSpaces with 80 GB Root and 50 GB User volumes, running in AutoStop mode, for up to 40 hours of combined use per month, for two calendar months, from the time you create your first WorkSpace.


Key Features of Amazon WorkSpaces:

1. The end-users can access the documents, applications, and resources using devices of their choice such as laptops, iPad, Kindle.

2. Network Health Check-Up verifies if the network and Internet connections are working. Also, checks if  WorkSpaces and their associated registration services are accessible, and checks if port 4172 is open for UDP and TCP access or not.

3. Client Reconnect feature allows the users to access their WorkSpace without entering their credentials every time when they disconnect.

4. Auto Resume Session feature allows the client to resume a session that gets disconnected due to any reason in network connectivity within 20 minutes by default. This can be extended for 4 hours. However, the users can disable this feature any time in the group policy section.

5. Console Search feature allows Administrators to search for WorkSpaces by their user name, bundle type, or directory.


Some AWS Limitations:

1. AWS service limits. AWS service limits are set by the platform.

2. Technology limitations. An exceptional characteristic of this limiting factor is that it can be applied to all Cloud services, not just on AWS.

3. Lack of relevant knowledge by your team.

4. Technical support fee.

5. General Cloud Computing issues.

Setup and Configure tmpmail - Step by Step Process

This article covers method to Setup and Configure tmpmail.

Basically, tmpmail is a handy utility for CLI warriors within the command line. 

By default, email addresses are created at random unless a specific email address follows the --generate flag.

Currently, w3m renders the emails in an HTML format within the terminal. If preferred, a user can use a GUI or text-based browser to view the email by passing the --browser flag followed by the command needed to launch the web browser of your choice.

TEMP-MAIL does not store your IP-address. This means you are reliably protected from all unauthorized actions that may endanger your information and compromise your privacy. All emails and data temporarily stored on our service are permanently deleted after the time expired.


How to install tmpmail ?

1. To install tmpmail, we can use the wget command or curl command to download the script from GitHub. 

Next, open a terminal and then copy or type in the following command:

# wget https://raw.githubusercontent.com/sdushantha/tmpmail/master/tmpmail

2. Now, run the chmod command against the script to modify the permissions, so the file is executable.

[root@host2 ~]# chmod -v +x tmpmail

3. Next, we will move the file to a location somewhere in our $PATH. Use the following command to accomplish this.

# mv tmpmail /bin/
# which tmpmail
/usr/bin/tmpmail


To Generate a New tmpmail Address:

To create a new temporary email address, run the following command.

# tmpmail --generate

DirectAdmin Email page failed to load - Fix it Now

This article covers how to fix the issue regarding the email page not loading in the DirectAdmin panel.


To fix this DirectAdmin error:

1. Edit DirectAdmin.conf

$ vi /usr/local/directadmin/conf/directadmin.conf

2. Add below line into the file to enable disk usage cache:

pop_disk_usage_cache=1

3. Edit /etc/cron.d/directadmin_cron

$ vi /etc/cron.d/directadmin_cron

and add below line

*/15 * * * * root echo "action=cache&type=popquota" >> /usr/local/directadmin/data/task.queue

4. Restart crond service

$ service crond restart

Nagios No lock file found - Fix this error now

This article covers different methods to resolve the error, Nagios: No lock file found.  Basically, "No lock file found in /usr/local/nagios/var/nagios.lock" means that the service isn't running.

To fix this Nagios error:
Execute the command:

$ /usr/local/nagios/bin/nagios -d /usr/local/nagios/etc/nagios.cfg

Running the command above simply starts the nagios daemon and points it to a specific config file.
The advantage to running this command manually over systemd is that when you run "service nagios start" this typically calls the /etc/rc.d/init.d/nagios script which contains a line with parametrized environment variables:

$NagiosBin -d $NagiosCfgFile

Because every system is different, not specifying either the bin nor config directories could lead to nagios breaking (stopping) when it tries to start using the default installation directory paths

Clear Solaris Service Maintenance Status in Nagios - Troubleshoot and Resolve

This article covers how to fix Clear Solaris Service Maintenance Status Nagios issue. Basically, When the Nagios Core service finds an invalid configuration, the core service will not start. 

To fix the problem you must fix the problem Nagios Core is complaining about.

This is normal behavior of Nagios Core, it is not specific to Solaris.

However on Solaris, after a service has failed to start several times, Solaris will put the service into what is called a Maintenance State. This state prevents a small problem from becoming a bigger problem. 

Even after fixing the problem Nagios Core is complaining about, you must also clear the maintenance state on the service before Solaris allows a service to be started again.

This means that the service is in a maintenance state, however there is not a lot of detail as to the cause of the issue except that the Start method failed repeatedly. 

It does however provide the name of a log file /var/svc/log/application-nagios:default.log.

Execute the following command to perform further troubleshooting:

tail -20 /var/svc/log/application-nagios:default.log


To Clear Maintenance State on Nagios:

1. Run the following command to clear the maintenance state:

$ svcadm clear nagios

2. Execute the following command to start Nagios:

$ svcadm enable nagios

3. Now check the state of the service:

$ svcs -xv nagios

Updating Windows VM Templates on VMWare with PowerShell - How to do it

This article covers how to update Windows VM Templates on VMWare. 

The update process of a VM template on VMWare consists of the following stages:

1. A template from the Content Library is converted to a virtual machine.;

2. After starting it, an administrator logs on, installs approved Windows updates using WSUS, updates the required software;

3. After the updates have been installed, the VM is restarted, then turned of and converted back to the template.

DirectAdmin error Headers and client library minor version mismatch

This article covers how to resolve DirectAdmin: Headers and client library minor version mismatch error. Basically, this error can come up even after MySQL update and PHP rebuild via custombuild.

To resolve this error:

Perform a cleanup in custombuild and rebuild PHP

$ cd /usr/local/DirectAdmin/custombuild

$ ./build clean

$ ./build php n


Alternatively you can set it like this:

cd /usr/local/directadmin/custombuild

./build set php5_ver 5.3

./build set mysql 5.1

./build update

./build clean

./build apache d

./build php d

./build mysql d


To rebuild zend:

cd /usr/local/directadmin/custombuild

./build zend

WordPress error Class wp_theme not found - Fix it now

This article covers method to resolve 'WordPress: Class wp_theme not found' error for our customers.


To perform a manual WordPress upgrade:

1. Get the latest WordPress zip (or tar.gz) file.

2. Unpack the zip file that you downloaded.

3. Deactivate plugins.

4. Delete the old wp-includes and wp-admin directories on your web host (through your FTP or shell access).

5. Using FTP or your shell access, upload the new wp-includes and wp-admin directories to your web host, overwriting old files.

6. Upload the individual files from the new wp-content folder to your existing wp-content folder, overwriting existing files. Do NOT delete your existing wp-content folder. Do NOT delete any files or folders in your existing wp-content directory (except for the one being overwritten by new files).

7. Upload all new loose files from the root directory of the new version to your existing WordPress root directory.

However, if you did not perform step 7, you would see this error message when trying to complete your upgrade:

Class WP_Theme not found in theme.php on line 106


Hence, to avoid this issue, or to fix this issue, make sure you perform step 7 and continue on the remaining steps for the manual WordPress updating process.

DirectAdmin User too large delete on background - Methods to resolve this error

This article covers method to fix the error, DirectAdmin: User too large delete on background. Basically, this error occurs when the sum of the disk usage of any user exceeds a certain threshold.

To prevent time-outs in your browser when deleting excessively large accounts, DirectAdmin will execute the deletion by adding the command to the background’s task.queue, instead of performing the execution on the foreground.


To fix DirectAdmin: User too large delete on background error, you can connect to the server through SSH using root access, then go to DirectAdmin's installed directory as below:

cd /usr/local/directadmin/conf/

Then edit the directadmin.conf file in the directory by running

vi directadmin.conf

If the variable "get_background_delete_size" value exists in the directadmin.conf file, it will be set to 10 GB by default (get_background_delete_size=10240). 

If the variable cannot be found in the file, simply add it in. 

You can modify the value of 10240 to define the value that you wish to set.

Amazon Redshift - Its features and how to set it up

This article covers an effective method to set up Amazon Redshift. Amazon Redshift is a fully managed, petabyte-scale data warehouse service in the cloud. This enables you to use your data to acquire new insights for your business and customers. The first step to create a data warehouse is to launch a set of nodes, called an Amazon Redshift cluster.

Amazon Redshift is a relational database management system (RDBMS), so it is compatible with other RDBMS applications. Amazon Redshift and PostgreSQL have a number of very important differences that you need to take into account as you design and develop your data warehouse applications.

Amazon Redshift is based on PostgreSQL.

Amazon Redshift is specifically designed for online analytic processing (OLAP) and business intelligence (BI) applications, which require complex queries against large datasets.


What is the difference between Amazon Redshift and Amazon Redshift Spectrum and Amazon Aurora?

Amazon Simple Storage Service (Amazon S3) is a service for storing objects, and Amazon Redshift Spectrum enables you to run Amazon Redshift SQL queries against exabytes of data in Amazon S3.

Both Amazon Redshift and Amazon RDS enable you to run traditional relational databases in the cloud while offloading database administration. 

Customers use Amazon RDS databases primarily for online-transaction processing (OLTP) workload while Redshift is used primarily for reporting and analytics.

Interworx vs cPanel - Which is Better

This article covers InterWorx and cPanel  and gives an idea of how to choose the best control panel for customers. Basically, many factors depends to choose the right panel like InterWorx and cPanel. 


InterWorx includes two main sections:

1.  NodeWorx (similar to WHM)

2. SiteWorx (the analog of cPanel)

NodeWorx is a system administrator interface to configuring, managing and monitoring your server. 

From the NodeWorx amin, you can securely manage multiple SiteWorx accounts.

SiteWorx is a separate control management account and website owner interface that provides access to the tools for managing your websites, email, and databases.


Differences between InterWorx and cPanel:

1. Unlike cPanel, with InterWorx, you can create multiple administrator accounts and provide them with the desired permissions. 

This is especially convenient if your clients have web developers or people who need to manage email only, for example. 

cPanel has only one administrative account, and no more additional accounts can be created.

2. InterWorx doesn't have complicated licensing options like cPanel. 

cPanel recently implemented an account-based pricing model that may have resulted in a substantial price increase. 

Whereas InterWorx lets you host multiple accounts on the server without increasing your license cost as it is licensed per server.

3. cPanel supports PostgreSQL, Mailman mailing lists, NodeJS, server-side Java, Ruby on Rails, and the DNSSEC protocol. 

InterWorx does not support those things at this time. Also, InterWorx does not support CloudLinux, only Linux and CentOS are supported.

4. InterWorx supports all of the same languages for NodeWorx as for SiteWorx. 

In addition, both NodeWorx and SiteWorx share a wide variety of supported themes. WHM only supports US English and one theme for now. cPanel has two themes.

Core Configuration Manager Displaying Issues in Nagios XI

This article covers how to resolve the issue with Nagios XI that stops displaying the core configuration manager or the components inside the core configuration manager.

If this is the case, When using Core Configuration Manager (CCM), the interface does not work as expected, it does not appear to display correctly and generally it feels like there is a bug. This issues is related to the web browsers implementation of JavaScript. If possible, use a browser that more closely implements the ECMAScript Language Specification.

A quick way to see if this is the problem is to see if you experience the same issue using another web browser.


To fix this Nagios configuration Problem:

1. In the event of the the Core Config Manager not visible or components missing from the page, this generally relates to a proxy and the following steps may resolve this issue:

pear config-set http_proxy http://proxy:port

2. Make sure to change proxy:port to match your proxy server, example:

pear config-set http_proxy http://192.168.44.20:8080

3. Then execute the following:

pear install HTML_Template_IT

 After performing these steps go back to CCM and see if it works.

Enable Built-in Administrator Account on Windows 10 - How to implement this

This article covers an easy way to activate the administrator account is from the command prompt with elevated privileges. Windows 10 includes a built-in Administrator account that, by default, is hidden and disabled for security reasons. Sometimes, you need to perform a bit of Windows management or troubleshooting or make changes to your account that requires administrator access.

Windows 10 administrator default password will not be required, alternatively you can enter password for local account and sign in.


To know if I have the built-in Administrator account in Windows 10:

1. Right-click the name (or icon, depending on the version Windows 10) of the current account, located at the top left part of the Start Menu, then click on Change account settings. 

2. The Settings window will pop up and under the name of the account if you see the word "Administrator" then it is an Administrator account.


To reset the built-in Administrator account in Windows 10:

1. Boot from Windows 10 bootable CD/DVD or USB.

2. When the install now screen shows up click on Repair your computer > Advanced Options >Troubleshoot > Command Prompt.

3. Once you can boot into the command prompt, type "net user administrator /active:yes".


To enable hidden administrator:

1. Go to Security Settings > Local Policies > Security Options. 

2. The policy Accounts: Administrator account status determines whether the local Administrator account is enabled or not. 

3. Check the "Security Setting" to see if it is disabled or enabled. 

4. Double-click on the policy and select "Enabled" to enable the account.

This App Has Been Blocked for Your Protection on Windows - Fix it now

This article covers methods to fix the 'This App Has Been Blocked for Your Protection on Windows' error. Windows Defender SmartScreen acts as a sort of guard dog while you use Windows 10.

It will block you from opening some apps if they come from an unknown place or are created by an unknown publisher. 

Some apps really are harmful and really will get you in a mess. Only go around the Windows 10 app block if you know for sure that the file is safe.


To unblock an app that is blocked by the administrator:

1. Locate the file, right-click it, and select "Properties" from the contextual menu. 

2. Now, find the "Security" section in the General tab and check the checkbox next to "Unblock" - this should mark the file as safe and let you install it. 

3. Click "Apply" to save the changes and try to launch the installation file again.


To Unblock Programs In Windows Defender Firewall:

1. Select the “Start” button, then type “Firewall“.

2. Select the “Windows Defender Firewall” option.

3. Choose the "Allow an app or feature through Windows Defender Firewall" option in the left pane.


To install a program that is blocked by administrator:

1. Disable Windows SmartScreen.

2. Execute the file via Command Prompt.

3. Install the app using the hidden administrator account.

4. Temporarily disable your antivirus program.

Steps to Run Program without Admin Privileges and to Bypass UAC Prompt

This article covers how to run a program without admin privileges. The trick to bypass UAC is to create a scheduled task (with highest privileges) for each program that you want to run, and then invoke the scheduled task item manually using schtasks.exe .

UAC helps keep your computer secure. If you reflexively disable UAC when setting up a computer, you should give it another try – UAC and the Windows software ecosystem have come a long way from when UAC was introduced with Windows Vista.


To  Eliminate UAC Prompts for Specific Applications:

1. In Task Scheduler, right-click "Task Scheduler Library" and select "New Folder" Name it whatever you would like.

2. Select the new folder and click "Create Task" (not "Create Basic Task")

3. Name the task something descriptive. ...

4. Under the Actions tab, select "Start a program" in the Action dropdown if it isn't already.


To bypass UAC administrator password:

1. Right-click Start button at left lower corner of PC, select Control Panel.

2. Click User Accounts and family Safety.

3. Click User Accounts.

4. Click Change your account type.

5. Enter Admin password and click Yes to continue.

6. Select Administrator as your new account type, and click Change Account Type.

Vital Command Line commands for Linux Admins with examples

This article covers a few Vital Command Line for Linux Admins. The Linux command line is a text interface to your computer. Allows users to execute commands by manually typing at the terminal, or has the ability to automatically execute commands which were programmed in “Shell Scripts”.


Common commands in Linux:

1. su command

The su command exists on most unix-like systems. It lets you run a command as another user, provided you know that user's password. When run with no user specified, su will default to the root account. The command to run must be passed using the -c option.


2. which command

which command in Linux is a command which is used to locate the executable file associated with the given command by searching it in the path environment variable. It has 3 return status as follows: 0 : If all specified commands are found and executable.


3. Who am I command line?

whoami command is used both in Unix Operating System and as well as in Windows Operating System. It is basically the concatenation of the strings “who”,”am”,”i” as whoami. It displays the username of the current user when this command is invoked. It is similar as running the id command with the options -un.


4. What does W command do in Linux?

w is a command-line utility that displays information about currently logged in users and what each user is doing. It also gives information about how long the system has been running, the current time, and the system load average.



Facts about the demand in Linux admins?

1. The job prospects for Linux System Administrator are favorable. 

2. According to the US Bureau of Labor Statistics (BLS), there is expected to be a growth of 6 percent from 2016 to 2026. 

3. Candidates who have a firm hold on cloud computing and other latest technologies have bright chances.

Configure software RAID on Linux using MDADM - Do it now

This article covers how to Configure software RAID on Linux using MDADM.


To Install a Software Raid Management Tool:

To install mdadm, run the installation command:

1. For CentOS/Red Hat (yum/dnf is used): $ yum install mdadm

2. For Ubuntu/Debian: $ apt-get install mdadm

3. SUSE: $ sudo zypper install mdadm

4. Arch Linux: $ sudo pacman -S mdadm


Terms related to Integrity of a RAID Array:

1. Version – the metadata version

2. Creation Time – the date and time of RAID creation

3. Raid Level – the level of a RAID array

4. Array Size – the size of the RAID disk space

5. Used Dev Size – the space size used by devices

6. Raid Device – the number of disks in the RAID

7. Total Devices – is the number of disks added to the RAID

8. State – is the current state (clean — it is OK)

9. Active Devices – number of active disks in the RAID

10. Working Devises – number of working disks in the RAID

11. Failed Devices – number of failed devices in the RAID

12. Spare Devices – number of spare disks in the RAID

13. Consistency Policy – is the parameter that sets the synchronization type after a failure, rsync is a full synchronization after RAID array recovery (bitmap, journal, ppl modes are available)

14. UUID – raid array identifier


To Recovering from a Disk Failure in RAID, Disk Replacement:

If one of the disks in a RAID failed or damaged, you may replace it with another one. First of all, find out if the disc is damaged and needs to be replaced.

# cat /proc/mdstat


To Add or Remove Disks to Software RAID on Linux:

1. If you need to remove the previously created mdadm RAID device, unmount it:

# umount /backup

2. Then run this command:

# mdadm -S /dev/md0

mdadm: stopped /dev/md0

3. After destroying the RAID array, it won’t detected as a separate disk device:

# mdadm -S /dev/md0

mdadm: error opening /dev/md0: No such file or directory

4. You can scan all connected drives and re-create a previously removed (failed) RAID device according to the metadata on physical drives. Run the following command:

# mdadm --assemble —scan


About Mdmonitor: RAID State Monitoring & Email Notifications:

The mdmonitor daemon can be used to monitor the status of the RAID. 

1. First, you must create the /etc/mdadm.conf file containing the current array configuration:

# mdadm –detail –scan > /etc/mdadm.conf

The mdadm.conf file is not created automatically. You must create and update it manually.

2. Add to the end of /etc/mdadm.conf the administrator email address to which you want to send notifications in case of any RAID problems:

MAILADDR raidadmin@woshub.com

3. Then restart mdmonitor service using systemctl:

# systemctl restart mdmonitor

Then the system will notify you by e-mail if there are any mdadm errors or faulty disks.

Create custom php ini in Litespeed Webserver - How to do it

This article covers how to Create custom php.ini in Litespeed Webserver. Basically, compared to the Apache web server, the Litespeed web server configuration may feel a bit complicated. In hosting environment with cPanel servers, it is necessary to edit the PHP variables for each domain or customer and this can be done using by creating a custom php.ini for each user's home directory. So the clients can change the PHP values according to their requirements.  

There should some steps need to be done on Litespeed admin panel on cPanel/WHM to enable custom php.ini and you can follow the below steps to enable it.


To Create Custom Php.Ini In A Litespeed Webserver:

1. Login into WHM.

2. Select Litespeed Web Server

3. Litespeed Configuration > Admin Console > Configuration > Server > External App > lsphp5

4. Under Environment section >> add “PHPRC=$VH_ROOT”

5. Under “suEXEC User ” section >> add the account username for which custom php.ini has to be enabled.

6. Under “suEXEC Group ” section >> add the group name of the same account.

7. Click save and return to Main >> Litespeed Web server

8. Under Quick Configuration of PHP suEXEC settings,>> Set Enable PHP suExec to yes.

9. After that put custom php.ini in the user’s home directory and check it using a phpinfo page.

SSH Servers Clients and Keys - More about it now

This article covers important information about SSH Servers, Clients and Keys. Use SSH keys for authentication when you are connecting to your server, or even between your servers.

They can greatly simplify and increase the security of your login process. 

When keys are implemented correctly they provide a secure, fast, and easy way of accessing your cloud server.


Turn off password authentication Linux:

With SSH key authentication configured and tested, you can disable password authentication for SSH all together to prevent brute-forcing. When logged in to your cloud server.

1. Open the SSH configuration file with the following command.

$ sudo nano /etc/ssh/sshd_config

2. Set the password authentication to no to disable clear text passwords.

PasswordAuthentication no

3. Check that public key authentication is enabled, just to be safe and not get locked out from your server. If you do find yourself unable to log in with SSH, you can always use the Web terminal control panel.

PubkeyAuthentication yes

Then save and exit the editor.

4. Restart the SSH service to apply the changes by using the command below.

$ sudo systemctl restart sshd

With that done your cloud server is now another step along towards security. 

Malicious attempts to connect to your server will results in authentication rejection, as plain passwords are not allowed, and brute-forcing an RSA key is practically impossible.

dhclient to persistently look for an IP address lease - Configure it Now

This article covers how to use dhclient command. Basically, Linux dhclient command can provide an IP lease until DHCP Server/Router grants one.

With this guide, you can easily configure Linux dhclient command to continuously requests an IP lease until one is granted by DHCP Server / Router.

Icons images and javascript files missing from frontend in Magento - Fix it now

This article covers methods to resolve Magento error related to with icons, images, and javascript files missing from frontend. Basically, icons, images, and javascript files might not appear if we use the wrong Magento update command to upgrade the version.


If you are in production mode, and are running setup:upgrade and you don't want regenerate static content because there is no need to, then you can use the following:

php bin/magento setup:upgrade --keep-generated

--keep-generated is an optional argument that does not update static view files. 

It should be used only in production mode. 

It should not be used in developer mode.


Solutions for the issue where stylesheets and images do not load after installing Magento ?

The following are possible solutions depending on the software you use and the cause of the problem:

If you are using the Apache web server, verify your server rewrites setting and your Magento server's base URL and try again. If you set up the Apache AllowOverride directive incorrectly, the static files are not served from the correct location.

If you are using the nginx web server, be sure to configure a virtual host file. The nginx virtual host file must meet the following criteria:

The include directive must point to the sample nginx configuration file in your Magento installation directory. For example:

include /var/www/html/magento2/nginx.conf.sample;

The server_name directive must match the base URL you specified when installing Magento. For example:

server_name ip_address;

If the Magento application is in production mode, try deploying static view files using the command magento setup:static-content:deploy.

Force DHCP Client to Renew IP Address - Perform it now

This article covers how to force DHCP client to renew IP address. You need to use Dynamic Host Configuration Protocol Client i.e., dhclient command. 

The client normally doesn't release the current lease as it is not required by the DHCP protocol. Some cable ISPs require their clients to notify the server if they wish to release an assigned IP address. 

The dhclient command, provides a means for configuring one or more network interfaces using the Dynamic Host Configuration Protocol, BOOTP protocol, or if these protocols fail, by statically assigning an address.


Linux renew ip command using dhcp:

The -r flag explicitly releases the current lease, and once the lease has been released, the client exits. 

For example, open terminal application and type the command:

$ sudo dhclient -r

Now obtain fresh IP address using DHCP on Linux:

$ sudo dhclient


To start DHCP client in Linux:

1. To start the DHCP service, type the following command: # /etc/init.d/dhcp start.

2. To stop the DHCP service, type the following command: # /etc/init.d/dhcp stop. 

The DHCP daemon stops until it is manually started again, or the system reboots.


How can I renew or release an IP in Linux for eth0?

To renew or release an IP address for the eth0 interface, enter:

$ sudo dhclient -r eth0

$ sudo dhclient eth0

In this example, I am renewing an IP address for my wireless interface:

sudo dhclient -v -r eth0

sudo dhclient -v eth0


Command to release/renew a DHCP IP address in Linux:

1. ip a - Get ip address and interface information on Linux

2. ip a s eth0 - Find the current ip address for the eth0 interface in Linux

3. dhclient -v -r eth0 - Force Linux to renew IP address using a DHCP for eth0 interface

4. systemctl restart network.service - Restart networking service and obtain a new IP address via DHCP on Ubuntu/Debian Linux

5. systemctl restart networking.service - Restart networking service and obtain a new IP address via DHCP on a CentOS/RHEL/Fedora Linux

6. nmcli con - Use NetworkManager to obtain info about Linux IP address and interfaces

7. nmcli con down id 'enp6s0' - Take down Linux interface enp6s0 and release IP address in Linux

8. nmcli con up id 'enp6s0' - Obtian a new IP address for Linux interface enp6s0 and release IP address using DHCP

Unable to add MySQL database in Plesk Customer Panel - Fix it now

This article covers how to fix issues that make it unable to add MySQL database in Plesk customer panel.


To resolve Cannot add MySQL database in Plesk Customer Panel:

1. Log in to Plesk and apply one of the following:

2. Enable Database server selection directive in Service Plans > Default > Permissions > Show more available permissions and press Update & Sync.

3. Switch MySQL default database server from None to localhost:3306 in Service Plans > Default > Hosting Parameters > Default Database Server and press Update & Sync.


Note:  it is also applicable to cases when Amazon RDS extension is installed. 

If it is needed to provide customer with the ability to select Amazon server, enable "database server selection" option.


How do I add a database to my Plesk Panel?

How to Create a New Database or Database User in the Plesk Control Panel

1. Log into your Control Panel.

2. Click on Databases.

3. Click on the Add New Database icon.

4. Next to Database Name enter the name you want to use.

For Type, choose either Microsoft SQL Server or MySQL (DNN uses the Microsoft SQL Server.).

Unable to add MS SQL database in Plesk - Fix it now

This article covers how to fix the error, Unable to add MS SQL database in Plesk.

Basically, the number of MS SQL databases is limited for the webspace, subscriptions, or reseller's plan.


In Web Admin Edition:

1. Log in to Plesk.

2. Go to Tools & Settings > License Management and check if Microsoft SQL Server support enabled or not:

a. If no, then it is required to purchase the MSSQL support first for the subscription.

MSSQL support is included in the Power Pack and Developer Pack.

b. If yes, then proceed to step 3.

3. Run the command below to get the current limit of MSSQL databases for the required webspace:

C:\> plesk bin subscription_settings --info example.com | findstr max_mssql_db

max_mssql_db 30 MS SQL databases

4. Increase the number of MSSQL databases for the required webspace (use the "-1" to set to the Unlimited value):

C:\> plesk bin subscription_settings -u example.com -max_mssql_db 100

plesk bin subscription_settings -u example.com -max_mssql_db -1


In Web Pro and Web Host Editions:

1. Log in to Plesk.

2. Go to Subscriptions > example.com > Account > Resources.

3. Find the MS SQL databases number.

a. If it reached its limit, increase it of the following ways:

Go to Subscriptions > example.com > Customize > Resources page and increase the MS SQL databases limit (changes will affect only this subscription).

Go to Subscriptions > example.com > Service Plan: Default > Resources page and increase the MS SQL databases limit (changes will affect all subscriptions assigned to this service plan).

b. If it is not reached the limit, then this limit is set on the reseller's level as also. Follow to the next step.

4. Go to Subscriptions > example.com > Subscriber: John Doe > Provider: Jane Doe.

5. Click the Change Plan button to increase the MS SQL databases number for all resellers assigned to this service plan.

Click the Customize button to increase the MS SQL databases number only for this reseller.

6. Find the MS SQL databases number and increase it to the required value.

Add MySQL database in Websitepanel and fix common errors

This article covers add MySQL database in Websitepanel and fix a common errors related to this task.

A database interface allows you to create and manage the existing MySQL databases. If you are creating a PHP based application or any application that uses a database, then you will need to create a database and a database user to access this database.


To create a MySQL database in WebsitePanel:

1. Click on the plan you want to add a MySQL database to.

2. Then click Databases.

3. Click MySQL.

4. Click Create Database.

5. Enter a name for your database.

6. Click Save.

7. You can click on the database you just added to edit it.

8. You can view existing users or delete or backup the database.

9. Click Save when you are finished


Success! You can view your added databases and see how many allowed databases you've used.

Code 9c57 Windows Update Error - Fix it now

This article covers fix the Code 9c57 Windows Update Error. Error Code 9c57 generally corresponds to a failed installation of Internet Explorer 11. In addition to that, the KB 2882822 update requires validation of genuine Windows installed on the system, so you may visit the link referred in the third question and check if your Windows requires activation.


What is 'Error code 9c57' in Windows Update?

Windows Update error 9c57 is an error that may occur when you are trying to install “Windows IE9 in Windows 7 for x64 Based System” update.


How can you fix ‘Error code 9c57’ in Windows Update?

Some of the common fixes include:

1. Manually installing Internet Explorer

2. Deleting SoftwareDistribution and running DISM command and sfc/ scannow command


Causes of Windows Update Error 9C57 - Error 9C57:

During software design, programmers code anticipating the occurrence of errors.

However, there are no perfect designs, as errors can be expected even with the best program design. Glitches can happen during runtime if a certain error is not experienced and addressed during design and testing.


To fix Windows Update Error 9C57 - Error 9C57:

1. When you get a runtime error, keep in mind that it is happening due to programs that are conflicting with each other. 

The first thing you can do to resolve the problem is to stop these conflicting programs.

2. Update / Reinstall Conflicting Programs

3. Virus infection causing runtime error on your computer must immediately be prevented, quarantined or deleted. Make sure you update your virus program and run a thorough scan of the computer or, run Windows update so you can get the latest virus definition and fix.

4. You might be getting the error because of an update, like the MS Visual C++ package which might not be installed properly or completely. What you can do then is to uninstall the current package and install a fresh copy.

5. You might also be experiencing runtime error because of a very low free space on your computer.

6. If the error is related to a bad graphics driver, then you may do the following:

Open your Device Manager, locate the graphics driver

Right click the video card driver then click uninstall, then restart your computer

Encrypt email messages in Outlook - Follow this guide now

This article covers the different methods to encrypt email messages in Outlook: using certificates (S/Mime), Office 365 Message Encryption (OME), and using encryption add-ins.


To Encrypt a single message:

1. In message that you are composing, click File > Properties. 

2. Click Security Settings, and then select the Encrypt message contents and attachments check box. 

3. Compose your message, and then click Send.


In Outlook, All attachments are encrypted.

Recipients who access the encrypted email via the Office Message Encryption portal can view attachments in the browser.

Note that if the recipient of the file is using an Outlook.com account, they can open encrypted Office attachments on the Office apps for Windows.


To view an encrypted email in Outlook:

1. Select Read the message.

2. You'll be redirected to a page where you can sign in and receive a single-use code.

3. Check your email for the single-use code. Enter the code in the browser window, then select Continue to read your message.


To encrypt a message in Office 365:

1. Sign in with Global Admin credentials.

2. Click on Admin.

3. Click on Settings.

4. Click on Services & add-ins.

5. Click on Microsoft Azure Information Protection.

WordPress 401 error - Fix it now

This article covers easy to follow methods to resolve WordPress 401 error. 

The 401 error has multiple names including Error 401 and 401 unauthorized error. 

These errors are sometimes accompanied by a message ‘Access is denied due to invalid credentials’ or ‘Authorization required’.


To fix the 401 error in WordPress:

1. Temporarily Remove Password Protection on WordPress Admin

2. Clear Firewall Cache to Solve 401 Error in WordPress

3. Deactivate All WordPress Plugins

4. Switch to a Default WordPress Theme

5. Reset WordPress Password

Unable to add bridge port vnet0 No such device - Fix it now ?

This article covers how to resolve the error, Unable to add bridge port vnet0: No such device which happens when the bridge device specified in the guest's (or domain’s) <interface> definition does not exist.

Theerror messages reveal that the bridge device specified in the guest's (or domain's) <interface> definition does not exist.

To verify the bridge device listed in the error message does not exist, use the shell command ifconfig br0.

A message similar to this confirms the host has no bridge by that name:

br0: error fetching interface information: Device not found

If this is the case, continue to the solution.


To fix the error, Unable to add bridge port vnet0: No such device :

1. Edit the existing bridge or create a new bridge with virsh

Use virsh to either edit the settings of an existing bridge or network, or to add the bridge device to the host system configuration.

2. Edit the existing bridge settings using virsh

Use virsh edit name_of_guest to change the <interface> definition to use a bridge or network that already exists.

For example, change type='bridge' to type='network', and <source bridge='br0'/> to <source network='default'/>.

Install PowerDNS and PowerAdmin on CentOS 7 - How to do it

This article covers the step by step procedure to install PowerDNS on CentOS 7. PowerDNS (pdns) is an open source DNS server written in C++ and released under GPL License. It has become a good alternative for the traditional DNS server Bind, designed with better performance and low memory requirements. 

PowerDNS provides two products, the Authoritative server, and the Recursor. 

The PowerDNS Authoritative server can be configured through the different backend, including the plain Bind zone files, RDBMS such as MySQL, PostgreSQL, SQLite3 or LDAP.


To Install PowerDNS on CentOS 7:

1. First let's start by ensuring your system is up-to-date:

$ yum clean all

$ yum -y update

2. Install PowerDNS and backend.

First, you need to enable EPEL repository and all required packages on your system:

$ yum install epel-release

$ yum install bind-utils pdns pdns-recursor pdns-backend-mysql mariadb mariadb-server

Enable PowerDNS on boot and start PowerDNS server:

$ systemctl enable mariadb

$ systemctl enable pdns

$ systemctl enable pdns-recursor

3. Configure MariaDB.

By default, MariaDB is not hardened. You can secure MariaDB using the mysql_secure_installation script. you should read and below each steps carefully which will set root password, remove anonymous users, disallow remote root login, and remove the test database and access to secure MariaDB:

mysql_secure_installation

4. Create PowerDNS Database and User in MariaDB.

Login as a MariaDB root and create a new database and tables:

### mysql -uroot -p

5. Configure PowerDNS.

Open the /etc/pdns/pdns.conf file.

Finally, restart the Power DNS service:

$ systemctl restart pdns.service

$systemctl enable pdns.service

6. Configure Recursor.

Open the /etc/pdns-recursor/recursor.conf file.

Install Drupal with Docker Compose

This article covers how to install Drupal with Docker Compose. Basically, installation process of Drupal can be simplified with the use of tools like Docker and Docker Compose. Docker Compose can be used to create a Drupal installation with an Nginx web server. 


Drupal and Docker needs the following to work:

1. HTTP Server with PHP: We can either use Apache with PHP or Nginx with PHP. I'm going to demonstrate building the Docker using Apache with PHP. A Drupal docker can also have services like SSH (for drush alias to work) and some important utilities like vim

2. SQL Server: Choose your favourite SQL Service (MySQL or PostGRESQL or SQLite). I'm going to be using a MySQL docker. The idea behind using a separate docker for SQL is so that you have a freedom to choose an internal SQL service or an external SQL Services like Amazon RDS without affecting your Drupal environment.


The need to Use Docker to Run Drupal:

Using the Drupal and PostgreSQL images from Docker Hub offers the following benefits:

1. The configuration of the software has been done for you, which means that you don’t need to follow a step-by-step process for each application to get them running on your system.

2. Updating your software is as simple as downloading the latest images from Docker Hub.

3. Images and containers are self-contained, which means that they are easy to clean up if you decide to remove them.


How to Set Up Drupal ?

1. Create a new directory in your home folder called my_drupal and cd into it:

mkdir ~/my_drupal/

cd ~/my_drupal/

2. Create a file named docker-compose.yml in this folder and add the following contents. Set your own password for the POSTGRES_PASSWORD option.

3. From the my_drupal directory, start your Docker containers:

docker-compose up -d

4. The Docker containers will take a minute or two to start up Drupal and PostgreSQL. Afterwards, you can visit your Linode’s IP address in your web browser .

5. On the Set up database page, select PostgreSQL as the Database type and enter the following values:

Database name: postgres

Database username: postgres

Database password: The password you set in the docker-compose.yml file

Host (under Advanced Options): postgres

6. When creating your Drupal user, be sure to enter a password that is different from your PostgreSQL password.

ModSecurity File Upload Error With SecRequestBodyNoFilesLimit

This article covers ModSecurity File Upload Error With SecRequestBodyNoFilesLimit error which happens when the ModSecurity parameter SecRequestBodyNoFilesLimit has reached the limit.

When this issue occurs, you will be Unable to upload file to the website: Request body no files data length is larger than the configured limit.

This error can occur when WAF_SECREQUESTBODYNOFILESLIMIT parameter value reached its limit.


Symptoms of ModSecurity File Upload Error:

1. Unable to upload a file to the website hosted in Plesk with the error:

413 Request entity too large

Request Entity Too Large

The requested resource

/upload-a-file/

does not allow request data with POST requests, or the amount of data provided in the request exceeds the capacity limit.

2. ModSecurity component is installed on the server.

3. The following error can be found in /var/www/vhosts/example.com/logs/error_log file:

[:error] [pid 21701] [client 203.0.112.2] ModSecurity: Request body no files data length is larger than the configured limit (1048576).. 

Deny with code (413) [hostname "www.example.com"] [uri "/wp-admin/admin-ajax.php"] [unique_id "Wakfj-fvNMmcLKLp-n8PjQAAAAE"]


Steps to resolve ModSecurity File Upload Error:

1. Log into the server via SSH.

2. Open /etc/asl/config file using the vi text editor.

3. Increase the value for the WAF_SECREQUESTBODYNOFILESLIMIT directive, for example to the value as below:

WAF_SECREQUESTBODYNOFILESLIMIT "10000000"

Note: it is specified in Bytes.

4. Execute the command below to update the rulesets:

for i in daily weekly monthly; do /usr/local/psa/bin/sw-engine-pleskrun /usr/local/psa/admin/plib/DailyMaintainance/script.php -f UpdateModSecurityRuleSet --period "${i}"; done

This way the change will remain persistent after any updates/rulesets changes.

Date Time in Laravel and PHP with Carbon

This article covers how to manage date/time easily in Laravel and PHP with Carbon. Basically, Carbon is a package that helps us to deal with date/time in Laravel and PHP in a much easier and systematic manner.

Working with date and time in PHP is not the easiest or most clear of tasks. We have to deal with strtotime, formatting issues, lots of calculations, and more.


Carbon provides some nice functionality to deal with dates in PHP such as:

1. Dealing with timezones

2. Getting current time easily

3. Converting a datetime into something readable

4. Parse an English phrase into datetime (first day of January 2016)

5. Add and Subtract dates (+ 2 weeks, -6 months)

6. Semantic way of dealing with dates


Carbon is already included in Laravel so there's no need to go and add it with Composer.

Whenever we need to use Carbon, we can import it like so:

<?php

use Carbon\Carbon;

After importing you can do a lot with this great package.

Install Monit monitoring system on CentOS 8 - How to do it

This article covers how to #install Monit on #Centos 8 system. Also, we dealt with how to configure Monit on Centos, adjusting the configuration and setting up alerts to notify the users.

#Monit is a free, open-source process supervision tool for Unix and Linux. With Monit, system status can be viewed directly from the command line, or via the native HTTP(S) web server. Monit is able to do automatic maintenance, repair, and run meaningful causal actions in error situations.


To enable web interface you need to make changes in monit configuration file. 

The main configuration file of monit located at /etc/monit. conf under (RedHat/CentOS/Fedora) and /etc/monit/monitrc file for (Ubuntu/Debian/Linux Mint). 

Monit is very easy to use nearly out of the box. By default, it is set up to check that services are running every 2 minutes and stores its log file in “/var/log/monit.


To Install Monit to monitor your server running CentOS:

1. Install EPEL repository: yum install epel-release yum update.

2. Install Monit: yum install monit.

3. Activate Monit to start automatically during the system boot and start it: systemctl enable monit systemctl start monit.


To #Install #Monit Package on #Ubuntu:

Run the commands given below;

sudo apt update

sudo apt install monit


After installing Monit, the commands below can be used to stop, start and enable Monit service;

sudo systemctl stop monit.service

sudo systemctl start monit.service

sudo systemctl enable monit.service

Adding users to the local admin group in PowerShell

This article covers how to add users to local admin group either via Group Policy Objective or directly via command line. 


To add a user to the local group in PowerShell:

You can add AD groups or users to the local admin group using the below Powershell command.

Add-LocalGroupMember -Group "Administrators" -Member "domain\user or group," "additional users or groups."


To add a user to the local admin group:

1. Right-click the newly created Group, select Properties, navigate to the Members tab, click Add… and enter designated users to the group, e.g. domain\administrator, domain\domain admins, domain\syskitmonitorservice. 

2. Add other users that also need administrative privileges, if necessary. 

3. Click OK to proceed.


To get local admin group members in PowerShell:

To get the local Administrators group members using PowerShell, you need to use the GetLocalGroupMember command. 

This command is available in PowerShell version 5.1 onwards and the module for it is Microsoft. PowerShell. LocalAccounts.


To Create a User Account in Windows 10 with PowerShell:

1. Open PowerShell as Administrator.

2. To create a new user account without a password, type New-LocalUser -Name "user_name" -Description "Description of your new account." -NoPassword .

3. To create a user account that has a password, firstly execute the following line: $Password = Read-Host -AsSecureString .

Advantages of NoSQL Databases - Get to know them now

This article covers the advantages of NoSQL Databases. #SQL databases are vertically scalable, NoSQL databases are horizontally scalable. SQL databases are table based, while NoSQL databases are document, key-value, graph or wide-column stores. 

SQL #databases are better for multi-row transactions, #NoSQL are better for unstructured data like documents or JSON.

#MongoDB, CouchDB, CouchBase, Cassandra, HBase, Redis, Riak, Neo4J are the popular NoSQL databases examples.

The structure of many different forms of data is more easily handled and evolved with a NoSQL database. 

NoSQL databases are often better suited to storing and modeling structured, semi-structured, and unstructured data in one database.


Main purpose of NoSQL?

NoSQL Database is a non-relational Data Management System, that does not require a fixed schema. 

It avoids joins, and is easy to scale. 

The major purpose of using a NoSQL database is for distributed data stores with humongous data storage needs. 

NoSQL is used for Big data and real-time web apps.


Reasons to Use a NoSQL Database includes:

1. Storing large volumes of data without structure. A NoSQL database doesn't limit storable data types.

2. Using cloud computing and storage. Cloud-based storage is a great solution, but it requires data to be easily spread across multiple servers for scaling.

3. Rapid development.


Main types of NoSQL databases?

There are four big NoSQL types: 

1. Key-value store

2. Document store, 

3. Column-oriented database,

4. Graph database. 

Each type solves a problem that can't be solved with relational databases. 

Actual implementations are often combinations of these. 

OrientDB, for example, is a multi-model database, combining NoSQL types.

Benefits of Data Warehouse in Business Organization

This article covers the Advantages of Data Warehouse. 

#Data #warehousing improves the speed and efficiency of accessing different data sets and makes it easier for corporate decision-makers to derive insights that will guide the business and marketing strategies that set them apart from their competitors. Improve their bottom line.

Unlike a database, which is focused on users inputting data, a data warehouse is architected for decision-making, ad hoc queries and analytics. Thus, enabling queries to be performed without any impact to your company's operational database.


A data warehouse is a type of data management system that is designed to enable and support business intelligence (BI) activities, especially analytics. Data warehouses are solely intended to perform queries and analysis and often contain large amounts of historical data.


A data warehouse can help support business needs, such as the ability to consolidate financial results within a complex company that uses different software for different divisions.


Benefits of a Data Warehouse:

1. Delivers enhanced business intelligence.

2. Saves times.

3. Enhances data quality and consistency.

4. Generates a high Return on Investment (ROI).

5. Provides competitive advantage.

6. Improves the decision-making process.

7. Enables organizations to forecast with confidence.

8. Streamlines the flow of information.


The key characteristics of a data warehouse are as follows:

1. Some data is denormalized for simplification and to improve performance.

2. Large amounts of historical data are used.

3. Queries often retrieve large amounts of data.

4. Both planned and ad hoc queries are common.

5. The data load is controlled.


A data warehouse is subject oriented because it provides information around a subject rather than the organization's ongoing operations.


Data warehouses will help you make better, more informed decisions for many reasons, including: 

1. Improved business intelligence

2. When you integrate multiple sources, you make decisions based on ALL of your data. 

3. Timely access to data: Quickly access critical data in one centralized location.

How to set up phpBB Forum on a website through cPanel

This article covers phpBB which is a completely free open-source Forum Software. It has lots of features while maintaining efficiency and ease of use. 

#phpBB, which is an abbreviation for PHP Bulletin Board, is one of the best free and open-source forum scripts for creating a forum. 


There are two ways to install phpBB on a website:

1. You can #install phpBB manually

2. Install phpBB via #cPanel Softaculous Apps Installer


To create a forum in phpBB:

1. Click Forums.

2. Enter the name of the new forum here.

3. Click Create new forum.

4. Enter a description for the new forum here.

5. Click Submit. 

That's it! The forum has been successfully created.


To Create a phpBB Forum:

1. Download and Install phpBB. The first thing you'll need to do is download the phpBB software.

2. Register Your phpBB Forum Administrator Account.

3. Set Up Your phpBB Forum.

4. Start Creating Content.


phpBB’s best features that you can use to help launch your first online forum:

1. Responsive design — supports the latest version of HTML5 and CSS3, thus providing you with a responsive and cross-browser compatible design.

2. Search engine crawler handling — comes with configurations and access control for over 100 crawlers for board optimization.

3. Unread message tracking — notifies users whether or not they have seen new published posts and topics.

4. Private message system — allows users to send direct messages to each other via the forum.

5. COPPA registration — prevents underage users from registering to the forum.

6. OAuth login — allows users to register using Google, Bit.ly, or Facebook accounts.

7. Data management — supports various popular database management tools like MySQL, Oracle Database, and SQLite.


Reasons why you should consider creating an online forum:

1. Encourage discussion and feedback — users can use the available space to exchange ideas and give you insights into the quality of your content for further improvement.

2. Support audience research — lets you observe visitor preferences and browsing habits in a closed environment.

3. Build a community — having great communication and sharing similar interests with other people will give your users a sense of belonging to a community.

Methods to reduce server load

This article covers tips to reduce server load. The load speed of websites mainly depends on the constant load that the server is maintained. 

Load expresses how many processes are waiting in the queue to access the computer processor. This is calculated for a certain period of time, and the smaller the number the better. 


Tips To optimize and speed up your server:

1. Enable caching.

2. Setup a fast reverse proxy.

3. Choose the right application server.

4. Fine tune your web server.

5. Turn on HTTP/2.

6. Defragment your database tables & optimize server settings.

7. Fix your DNS query speed.

8. Trim down your site's critical rendering path.


Why is your Website server slow?

The cause of slow servers usually lays with the web host. 

You could be having a slow site because you are hosted on a free web hosting. 

You are on a low quality hosting service with poor support. 

Or your site needs a higher spec hosting account with more resources eg a VPS.

A large volume of unoptimized images is usually the most common reason behind website slowness. 

High-resolution images can consume lots of bandwidth while loading. 

Uploading larger sized images and then scaling them down can unnecessarily increase the size of your web page – causing your website to load slowly.

MongoDB failed to load list of databases - Fix it now

This article covers how to resolve the error 'MongoDB failed to load the list of databases' can occur due to various reasons that include failed database user/password authentication, outdated Robo 3T version, and so on.

The error 'MongoDB failed to load the list of databases' means that you can't connect if there are no databases to list. 


To fix the error 'MongoDB failed to load the list of databases':

1. You can fix this issue with 1.2 connecting to a new mongo 4.2.

It's fixed when using robo3t version 1.3, which supports newer version of mongo.

2. You can create a database and a collection for it. 

Once you create a database and a collection, it works.

3. You will need to upgrade mongodb to the last version, so you can to connect in your local database.

Advantages of SAN over NAS

This article covers more insight about the advantages of SAN over NAS.

A storage area network (#SAN) is a dedicated, independent high-speed network that interconnects and delivers shared pools of storage devices to multiple servers. Each server can access shared storage as if it were a drive directly attached to the server.

Network Attached Storage (#NAS) is a device that allows users to access files through a network. It allows users to access and share files from their individual stations through a central server. NFS (Network File System) is a protocol that is used to serve and share files on a network.


Some advantages of a SAN:

1. Reduces LAN bandwidth problems. A key benefit of SANs is bandwidth improvement. 2. Improved data security. Data security is paramount for every business.

3. Responsive backup.

4. Increased scalability.

5. Reliable disaster recovery.


What is the purpose of a SAN?

SANs are primarily used to access data storage devices, such as disk arrays and tape libraries from servers so that the devices appear to the operating system as direct-attached storage. 

A SAN typically is a dedicated network of storage devices not accessible through the local area network (LAN).

MongoDB error network is unreachable - Fix it now

This article covers methods to resolve the error 'MongoDB error network is unreachable' which can occur due to many reasons that include network issues, if the mongo server is not started, and so on.

To resolve this #MongoDB #error:
1. On Ubuntu server, to open mongo shell run:

$ mongo

2. Inside mongo shell, type following command to create new a admin user.

> use admin;
> db.createUser({user:"admin", pwd:"password", roles:[{ role: "root", db: "admin" }]});

3. By default mongodb is configured to allow connections only from localhost(IP 127.0.0.1).
We need to allow remote connections from any ip address. The following change should only be done in your development server. Open up etc/mongod.conf file and do the following change.

# network interfaces
net:
port: 27017
bindIp: 0.0.0.0   #default value is 127.0.0.1


Also in the same mongod.conf file uncomment security option and add authorization option as shown below:

security:
authorization: enabled    


4. Save and exit the mongod.conf file and restart mongodb server:

$ sudo servcie mongod restart

Use Nmap to Scan Open Ports - How to

This article covers how to use Nmap to Scan Open Ports. Nmap is the world's leading port security network scanner. The Nmap hosted security tool can help you determine how well your firewall and security configuration is working.

How would you tell Nmap to scan all ports?
By default, Nmap scans the 1,000 most popular ports of each protocol it is asked to scan.
Alternatively, you can specify the -F (fast) option to scan only the 100 most common ports in each protocol or --top-ports to specify an arbitrary number of ports to scan.

The OS and Service scanning options are helpful for scanning a particular port or service to get more information.
If a service is running on a non-default port, it might be by design – or it might suggest there is a security breach.
Ports often have a default usage. Most ports under 1000 are dedicated and assigned to a specific service.

What file does Nmap use to determine which ports to scan?
Nmap needs an nmap-services file with frequency information in order to know which ports are the most common.

Malicious ("black hat") hackers (or crackers) commonly use port scanning software to find which ports are "open" (unfiltered) in a given computer, and whether or not an actual service is listening on that port. They can then attempt to exploit potential vulnerabilities in any services they find.

Website Iframe malware injection

This article covers methods to secure websites from iframe attacks. Iframes Bring Security Risks. If you create an iframe, your site becomes vulnerable to cross-site attacks. You may get a submittable malicious web form, phishing your users' personal data.
One of the most popular online attacks that happens all the time has to do with thousands of legitimate websites being hacked with the “Iframe code injection” attack resulting in Cross Site Scripting (XSS) or silent redirections to malicious websites.
This means that unsuspicious visitors get infected with a malware virus when they visit that legitimate websites.

What happens is that an “Iframe html code” is injected at the end (usually) of “index.php” or “index.html” files of the legitimate websites.
This “iframe” code embeds into the legitimate site a malicious code which installs a virus to the visitor’s PC or tries to steal sensitive information.

Some tips to clean the infection of your site:
1. First of all scan and clean your own computer which you use to connect to your site. The Trojan might be undetectable by some antivirus, so you better format the windows OS and install a fresh copy.
2. Change ALL your passwords and most importantly the FTP passwords and the website control panel passwords.
3. Download all files from your website and store them in a safe place on your PC to further analyze the infection.
4. If you have a recent clean backup of your website, upload the backup files and replace all current files.
5. If you don’t have a backup (shame on you!!) then edit all source code (html or PHP files) and search for <iframe> html commands inside the code. Delete the suspicious <iframe> and re-upload all html, php files to your website.
6. Download an antivirus tool which scans the website for <iframe> content.
If you use WordPress there are some great security plugins which scan your website's source code for infections and also protect the site with a firewall.

Perform Monitoring with PRTG

This article covers how to use #monitoring with PRTG. With PRTG. Today, nearly every business relies on a computer and network infrastructure for internet, internal management, telephone, and email.
Here comes the role of PRTG to ensure that business data flows seamlessly between employees, offices, and customers.


Monitoring availability, bandwidth, and usage of your network is easy when you have PRTG. As a versatile solution, PRTG adapts to your needs and supports you with monitoring your application servers and services as whole and not only separate single aspects of these.
To set up your network monitoring, download the PRTG installer from the Paessler website and follow the steps in the installation wizard, or set up a PRTG Hosted Monitor instance on https://www.paessler.com/prtg-hosted-monitor and install a remote probe in your LAN.
PRTG Network Monitor is Paessler's powerful network monitoring solution.

In #PRTG, you can view Toplists for all xFlow sensors. xFlows are monitoring data pushed from network devices to PRTG.
You can use them to monitor where and how much data is traveling to and from.
This way, they determine which machine, protocol, or user is consuming bandwidth.

Remote probes allow you to monitor different sub-networks that are separated from your PRTG on premises core server by a firewall and to keep an eye on remote locations. You can install one or more remote probes.

The best network monitoring tools:
1. SolarWinds Network Performance Monitor (FREE TRIAL).
2. Datadog Network Performance Monitoring (FREE TRIAL).
3. ManageEngine OpManager (FREE TRIAL).
4. Progress WhatsUp Gold (FREE TRIAL).
5. Site24x7 Network Monitoring (FREE TRIAL).
6. Paessler PRTG Network Monitor (FREE TRIAL).
7. Nagios Core.
8. Zabbix.

Plesk Panel Database issues

This article covers the different #Plesk database errors. The main reason for database issues in Plesk is the misconfiguration of the PSA database.
Plesk employs the native functionality of database management tools for checking and repairing databases.
For example, for #MySQL databases it uses the mysqlcheck utility.

To check and repair a #database:
1. Go to Websites & Domains > Databases > Check and Repair in a database tools pane.
2. If problems are found, click the link See Details and Resolve.
3. The list of tables and corresponding problems will open.
For MySQL databases, you can choose the tables that you would like to repair.
For Microsoft SQL databases, you can repair an entire database only.
Click Repair Selected (for MySQL) or Repair (for Microsoft SQL).

Nginx ingress on DigitalOcean kubernetes using Helm

This article covers how to set up Nginx ingress on DigitalOcean Kubernetes using Helm. To implement this successfully, an Ingress Controller must be present; its role is to implement the rules by accepting traffic (most likely via a Load Balancer) and routing it to the appropriate Services.
Most Ingress Controllers use only one global Load Balancer for all Ingresses, which is more efficient than creating a Load Balancer per every Service you wish to expose.

To install the Nginx Ingress Controller to your cluster, run the following command:
$ helm install nginx-ingress stable/nginx-ingress --set controller.publishService.enabled=true
This command installs the Nginx Ingress Controller from the stable charts repository, names the Helm release nginx-ingress, and sets the publishService parameter to true.

Limit cPanel bandwidth using mod_cband

This article covers how to limit cPanel bandwidth using mod_cband. In order to compile mod_cband, we must have apxs2 installed.
We can achieve that by doing this:
$ apt-get install apache2-prefork-dev

Next we download and install mod_cband like this:
cd /tmp
wget http://cband.linux.pl/download/mod-cband-0.9.7.4.tgz
tar xzvf mod-cband-0.9.7.4.tgz
cd mod-cband-0.9.7.4
./configure
make
make install

The make install command should have added the mod_cband module to /etc/apache2/httpd.conf. Run:
$ vi /etc/apache2/httpd.conf
and check if you find a line like this:
LoadModule cband_module       /usr/lib/apache2/modules/mod_cband.so

Finally restart Apache:
/etc/init.d/apache2 restart
The mod_cband installation is now finished.

Ubuntu error Some index files failed to download

This article covers methods to fix #Ubuntu #error "Some index files failed to download". You can resolve this error by copying the contents of the sources list file from another functional Ubuntu system and paste them into your system's sources list file.

To install community-supported #software packages, proprietary packages, and packages not available under a completely free license, you might consider enabling the following repositories:
1. Universe – Community-maintained free and open-source software.
2. Restricted – Proprietary drivers for devices.
3. Multiverse – Software restricted by copyright or legal issues.

To enable these #repositories, invoke the commands below:
$ sudo add-apt-repository restricted
$ sudo add-apt-repository multiverse
$ sudo add-apt-repository universe

Then update your package lists:
$ sudo apt update

Migrate database from MySQL to PostgreSQL using pgLoader

This article covers how to migrate a database using pgLoader with a single #command.
PostgreSQL, also known as “Postgres,” is an open-source relational database management system (RDBMS).
It has seen a drastic growth in popularity in recent years, with many developers and companies migrating their data to Postgres from other database solutions.
The prospect of migrating a database can be intimidating, especially when migrating from one database management system to another.

Facts about pgLoader:
1. pgLoader is an open-source #database migration tool that aims to simplify the process of migrating to #PostgreSQL.
2. It supports #migrations from several file types and RBDMSs — including #MySQL and SQLite — to PostgreSQL.
3. #pgLoader is a flexible tool that can perform a database migration in a single command.
4. With a few configuration tweaks, it can migrate an entire database from one physical machine to another using a secure SSL/TLS connection.

DirectAdmin error is not a valid username

This article covers tips to resolve DirectAdmin error: is not a valid username which happens if the username length of the account is larger than the value set in the DirectAdmin configuration file.
To fix DirectAdmin Admin Backup/Transfer restore error with no details,  try to restore to a number than 10 characters.
You have to edit directadmin configuration and set this variable.
[root@mx ~]# vi /usr/local/directadmin/conf/directadmin.conf
then edit max_username_length to larger value. I my example 20.
max_username_length=20

DirectAdmin invalid characters in mail autoresponder

This article covers tips to resolve invalid character error in mail-in DirectAdmin.
The reason for this error is that Oracle sees a character that it considers invalid.
If you use a special character in a table or column name, then try putting double quotation-marks around the name.
If you use a special character in a value, put quotation marks around it.
If you look closely, you'll notice a punctuation mark of some sort between "Character" and "Invalid."
This means you have included punctuation marks in the information you typed into that field.
Remove all punctuation marks, symbols, or other special characters and you will be able to proceed.

To fix #DirectAdmin #error: Invalid characters in mail autoresponder:
1. You have to set correct encoding for Directadmin theme that is used. In this case, default “enhanced” theme was used so I edited accordingly:
vi /usr/local/directadmin/data/skins/enhanced/lang/en/lf_standard.html
2. Then find variable “LANG_ENCODING” and correct it to your needs. In my case:
LANG_ENCODING=UTF-8

Docker error while loading shared libraries

This article covers how to fix docker #error while loading shared libraries which happens in the process of building a docker image.
The docker run command creates a container from a given image and starts the container using a given command. It is one of the first commands you should become familiar with when starting to work with #Docker.
Docker containers make it easy to put new versions of software, with new business features, into production quickly—and to quickly roll back to a previous version if you need to.
They also make it easier to implement strategies like blue/green deployments.

To stop all running containers:
1. kill all running #containers with docker kill $(docker ps -q)
2. delete all stopped containers with docker rm $(docker ps -a -q)
3. delete all images with docker rmi $(docker images -q)
4. update and stop a container that is in a crash-loop with docker update --restart=no && docker stop.

Configure AWS load balancer with Cloudformation

This article will guide you on how to create an Application Load balancer and its dependencies using CloudFormation. 

Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. 

Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.

Software load balancers is that hardware load balancers require proprietary, rack-and-stack hardware appliances, while software load balancers are simply installed on standard x86 servers or virtual machines.

Another critical difference between hardware and software load balancers lies in the ability to scale.


Elastic Load Balancing supports the following types of load balancers: 

1. Application Load Balancers, Network Load Balancers, and Classic Load Balancers. 

2. Amazon ECS services can use either type of load balancer. 

3. Application Load Balancers are used to route HTTP/HTTPS (or Layer 7) traffic.

Shadow Redundancy Exchange Server 2016

This article will guide you on the features of Shadow Redundancy #Exchange Server 2016. 

To remove all messages from a particular queue, click the Queues tab. 

Select a queue, right-click, and then select Remove #Messages (with NDR) or Remove Messages (without NDR).

Submission queue. #Mailbox servers and Edge Transport servers. Holds messages that have been accepted by the Transport service, but haven't been processed. Messages in the Submission queue are either waiting to be processed, or are actively being processed.


Advantages and Features of Exchange Server 2016:

1. Improved search experience. Thanks to the asynchronous and decentralized architecture.

2. New cloud-focused architecture that supports mobility.

3. Easier collaboration on SharePoint and OneDrive.

4. Faster failover and failure isolation.

5. Outlook on the web and Outlook app feature enhancement.

Install Linux Software Via Command line

This article will guide you on methods to install #Linux #Software via command line. #Debian, Ubuntu, Mint, and other Debian-based distributions all use . deb files and the dpkg package management system. There are two ways to install apps via this system. You can use the apt application to install from a repository, or you can use the dpkg app to install apps from .


To compile a program from a source in Linux:

i. Open a console.

ii. Use the #command cd to navigate to the correct folder. If there is a README file with installation instructions, use that instead.

iii. Extract the files with one of the commands.

iv. ./configure.

v. make.

vi. sudo make install (or with checkinstall ).


To Check os version in Linux:

1. Open the #terminal application (bash shell)

2. For remote server login using the ssh: ssh user@server-name.

3. Type any one of the following command to find os name and version in Linux: cat /etc/os-release. lsb_release -a. hostnamectl.

4. Type the following command to find Linux kernel version: uname -r.

Docker error initializing network controller

This article will guide you on tips to resolve the error 'Docker error initializing network controller'. This docker error happens in the process of trying to start the docker service. 

To fix docker failed to start daemon: Error initializing network controller no network available:

Add a docker0 bridge interface;

# ip link add name docker0 type bridge

# ip addr add dev docker0 172.17.0.1/16


Docker originally used Linux Containers (LXC) and was designed for Linux kernel only.

In the case of Windows, Docker uses Hyper-V which is in-built virtualization technology provided by Windows. Docker uses Hypervisor framework in the case of MacOs for virtualization.

Docker is a platform and tool for building, distributing, and running Docker containers.

Kubernetes is a container orchestration system for Docker containers that is more extensive than Docker Swarm and is meant to coordinate clusters of nodes at scale in production in an efficient manner.

Install Azure PowerShell module

This article will guide you on how to install the Azure PowerShell module using the cmdlets method and through offline.

Azure CLI is available on #Windows, Mac, Linux, etc. Azure cloud shell is another option that can be browser-accessible and authenticated. 

Azure cloud shell gives you options to choose from either bash or Powershell. 

The Get-Command cmdlet gets all #commands that are installed on the computer, including cmdlets, aliases, functions, filters, scripts, and applications. 

Get-Command gets the commands from #PowerShell modules and commands that were imported from other sessions.

We can use Windows Powershell for managing Azure resources by installing az module.

To install the Azure PowerShell #module, run the following command. Make sure that the Windows PowerShell ISE is opened in "run as administrator” mode. 

By default, the PowerShell gallery is not configured as a Trusted repository for PowerShellGet. 

Click on “Yes to All” to continue with the installation.


Modules included in Azure PowerShell:

1. Azure PowerShell Az. Automation.

2. Azure PowerShell AzureRM. Automation.

3. Other PowerShell modules.

4. Internal Orchestrator. AssetManagement. Cmdlets module.

5. Python 2 modules.

6. Custom modules that you create.

Phpmyadmin keeps asking for password

This article will guide you on tips to resolve phpMyAdmin error when it keeps asking for a password to login.

This #phpMyAdmin problem can arise due to many different reasons that include browser cache issues, using an incorrect password, drive being full, and so on. 

To fix this problem, you need to reset the cPanel password as follows:

1. Login to WHM at https://<your vps ip>:20871) as user root, using the server's root password.

2. Go to 'Home >> Account Information >> List Accounts'.

3. Click on the + sign near the domain for which you want to change the cPanel password. 4. You can see an option there to change the password.

5. Select the option "Sync #Mysql password with account password" and change password.

KVM hypervisor How it Works

This article will guide you on how the KVM #hypervisor works. Basically, KVM is a type-2 hypervisor (installed on top of another OS, in this case some flavor of #Linux). 

It runs, however, like a type-1 hypervisor and can provide the power and functionality of even the most complex and powerful type-1 hypervisors, depending on the tools that are used with the KVM package itself.

KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V).

Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images.

1. The main difference between Type 1 vs. Type 2 hypervisors is that Type 1 runs on bare metal and Type 2 runs on top of an operating system. 

2. Each hypervisor type also has its own pros and cons and specific use cases.

3. Xen is better than #KVM in terms of virtual storage support, high availability, enhanced security, virtual network support, power management, fault tolerance, real-time support, and virtual CPU scalability.

4. A Type 1 hypervisor takes the place of the host operating system. 

5. Type 1 hypervisors are highly efficient because they have direct access to physical hardware. 

6. This also increases their security, because there is nothing in between them and the CPU that an attacker could compromise.

Build serverless web application with AWS lambda

This article will guide you on how to build serverless Web Application AWS #Lambda. 

1. The application architecture uses #AWS Lambda, Amazon API Gateway, Amazon DynamoDB, Amazon Cognito, and AWS Amplify Console. 

2. Amplify Console provides continuous deployment and hosting of the static web resources including HTML, CSS, JavaScript, and image files which are loaded in the user's browser. 

3. JavaScript executed in the browser sends and receives data from a public backend API built using Lambda and API Gateway. 

4. Amazon Cognito provides user management and authentication functions to secure the backend API. 

5. Finally, #DynamoDB provides a persistence layer where data can be stored by the API's Lambda function.

NTFS partition failed to mount

This article will guide you on methods to resolve NTFS partition failed to mount error. 

Causes of NTFS partition failed to mount error:

1. File system errors

After using #NTFS drive in #Windows you have detached it without removing it safely. Therefore NTFS journal has not been emptied from temporary streams.

To fix the problem:

i. Open Disk Utility under #Mac OS X. 

ii. You will find it in Applications – Utilities.

iii. Choose NTFS partition on the left and find First Aid tab on the right. 

iv. Under this tab you will find Verify Disk option. 

v. Run Verify and then Repair.

Email address rejected by server error in iPhone

This article will guide you on methods to resolve "Email address rejected by server" error which happens in iPhone devices mainly due to wrong mail settings. 

The recipient was rejected by the server because it does not allow relaying. Chances are you need to check your outgoing mail server settings. Go to Settings - Mail, Contacts, Calendar and tap on your email account. Tap on "Account, then go down to the "Outgoing Mail Server" section and tap on "SMTP."

If you can't send email try the following: On your iPhone or iPod Touch screen tap Settings and then Mail, Contacts, Calendars. 

Select your email account from the list, and then select it again on the next screen. 

Scroll down to the bottom and tap on the SMTP field under Outgoing Mail Server.


To fix email rejected by server:

1. Go to Settings > Mail > Accounts and select the account you are having difficulty with.

2. Click on your email address at the top of the screen.

3. Go down to the bottom of the screen where it says SMTP and click on it.

4. Select the Primary Server at the top of the screen.

InnoDB vs MyISAM Performance

This article will guide you on the performance of InnoDB and MyISAM. MyISAM will out-perform InnoDB on large #tables that require vastly more read activity versus write activity. MyISAM's readabilities outshine InnoDB because locking the entire table is quicker than figuring out which rows are locked in the table.

InnoDB is better option while you are dealing with larger #database because it supports transactions, volume while MyISAM is suitable for small project. 

InnoDB and MYISAM , are storage engines for MySQL . 


InnoDB and #MYISAM differ on their locking implementation: 

i. #InnoDB locks the particular row in the table, and MyISAM locks the entire MySQL table.

ii. As InnoDB supports row-level locking which means inserting and updating is much faster as compared with MyISAM.


Which storage engine is best in #MySQL:

1. InnoDB: The default option in MySQL 5.7, InnoDB is a robust storage engine that offers:

2. MyISAM: The functionality that sets MyISAM apart is its capability for:

3. NDB (or NDBCLUSTER): If a clustered environment is where your database will be working, NDB is the storage engine of choice.

Customer Service Strategy Best Methods

This article will guide you on the customer service strategies that we follow to refresh the existing one based on some aspects.

The Purpose of the Service Strategy is to define the perspective, position, plans, and patterns that a service provider needs to be able to execute to meet an organization's #business Outcomes.

There are five major aspects of service design. These are service solutions, management information systems and tools, technology and management architectures and tools, processes and measurement systems.

Winning #Customer #Service #Strategies:

1. Optimize Agent Training. Invest in an agent training program to ensure your agents are empowered and prepared to meet customer needs.

2. Choose the Right Tools..

3. Improve Call Center KPIs..

4. Personalize the Experience..

5. Make Data-Drive Decisions..

6. Optimize Quality Assurance (QA).

7. Offer Omnichannel Support.

WordPress error This site ahead contains harmful programs

This article will guide you on how to tackle this site ahead contains harmful programs error in #WordPress. 

To remove the #deceptive #site notice, you'll have to first remove the malware on your site. 

Then, submit a review request at Google Search Console to delete the notice. In 1-3 days, Google will update the status and remove the deceptive site warning.

You can check Google's Transparency Report to see if a website is blacklisted due to a Copyright or DMCA claim. 

You can also use Google's #Safe #Browsing Site Status tool.

To fix website that is NOT safe for browsing:

1. Scan your own computer with antivirus and malware detection software and remove all threats.

2. Change passwords to your hosting account (cPanel , plesk, webmin etc.)

3. Change FTP passwords.

4. Verify that your website is infected and remove malicious code.

WordPress Upload Failed to Write File to Disk error

This article will guide you on how to resolve 'Upload: Failed to Write File to Disk' Error in WordPress. 

The Upload: Failed to Write File to #Disk WordPress error can occur due to a number of reasons. 

The most typical cause of the error is incorrect folder permissions. 

But besides incorrect permissions, this error can also ocurr due to your website exceeding the quota limit of the hosting service.

To fix this #WordPress #error:

1. Try changing the permissions on the wp-content directory to 766. 

2. If you still have problems, try 767, 775 or 777. 

3. Once your uploads are working, change the permissions on wp-content back to 755 again and check that everything still works OK.

IMAP server wants to alert you to the following error

This article will guide you the different causes for the error 'your IMAP server wants to alert you to the following'.

IMAP #Error code #0x800cccdd appears alongside the message "Your IMAP server closed the connection", which signifies that the "Send/Receive" feature—a setting that retrieves your #Outlook mail whenever connected to the Internet in order to keep your mail synced—has failed.

The error message "Your account temporarily blocked for #IMAP use. This may be happen if you exceed the maximum number of simultaneous IMAP connections allowed. Kindly try after some time" occurs when the mail client or different mail clients are trying to establish too many connections to IMAP server.

A server connection timeout means that a server is taking too long to reply to a data request made from another device. Timeouts are not a reply message: they show up when there isn't a reply and a server request is not fulfilled in a predetermined length of time.

To fix the mail server is not responding:

1. Check your internet connection.

2. Check your #SMTP server details.

3. Verify all usernames and passwords.

4. Check your SMTP server connection.

5. Change your SMTP port.

6. Control your #antivirus or #firewall settings.

OpenLDAP and phpLDAPadmin on Linux

This article will guide you on how to install #OpenLDAP and phpLDAPadmin on #Ubuntu. Also, we covered the prospective error affacting OpenLDAP and phpLDAPadmin and its solution as well.

#LDAP (Lightweight Directory Access Protocol) is an open and cross platform protocol used for directory services authentication. LDAP provides the communication language that applications use to communicate with other directory services servers.

#Kerberos is used to manage credentials securely (authentication) while LDAP is used for holding authoritative information about the accounts, such as what they're allowed to access (authorization), the user's full name and uid.

To access #phpLDAPadmin:

Point your browser to http://IP_OF_SERVER/phpldapadmin (IP_OF_SERVER is the actual IP address of your LDAP server). 

From the main window, click the login button in the left pane. 

When prompted, you will log into your DN and enter the password for the admin user created during the slapd reconfiguration.

Setup OpenVPN on Windows Server

This article will guide you on how to setup OpenVPN on windows.

OpenVPN is a virtual private #network (#VPN) system that implements techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. 

To Configure OpenVPN client as service on Windows:

1. Editing your OpenVPN client configuration.

2. Storing your PrivateVPN.com credentials in a file.

3. Import edited .ovpn file and user.auth file to OpenVPN #config folder.

4. Configuring OpenVPN service to start automatically on boot.

To connect to OpenVPN from Windows Server:

i. Navigate to your #OpenVPN Access Server client web interface.

ii. Login with your credentials.

iii. Select 'OpenVPN Connect for #Windows'.

iv. Wait until the download completes, and then open it (specifics vary depending on your browser).

Reporting services configuration manager

This article will guide you on how to setup reporting services configuration manager. Report Manager is Web based interface that can be used to perform different tasks such as. Administer the Report Server,View the Reports and Manager the Report, and so on. You need to have the URL to access the Report Server by using Report Manager interface.

SQL Server Reporting Services (#SSRS) is a reporting #software that allows you to produce formatted reports with tables in the form of data, #graph, images, and charts. These reports are hosted on a server that can be executed any time using parameters defined by the users.

Report server items are always stored in libraries or in a folder within a library. 

When you access the SharePoint site, you see the Browse page and the Library Tools tab.

In #Reporting Services, URLs are used to access the Report Server Web service and the web portal. A test link of the URL appears on page when you define the URL so that you can immediately confirm that the settings you specified result in a valid connection.

To connect to Reporting Services Configuration Manager:

1. Click Start, then click #Programs, then click #Microsoft #SQL Server, then click Configuration Tools, and then click Report Server Configuration Manager. 

2. The Report Server Installation Instance Selection dialog box appears so that you can select the report server instance you want to configure.

WordPress 403 Forbidden Error

This article will guide you on different methods to fix the 403 #forbidden error in WordPress.

The 403 Forbidden #error means that your server is working, but you no longer have permission to view all or some of your site for some reason.

The two most likely causes of this error are issues with your WordPress site's file permissions or .htaccess file. 

Also, some plugin issues might also cause the #403 Forbidden error.

To Fix 403 Forbidden WordPress Error:

1. Create a Backup. Most of the time, you are not responsible for the errors that occur on your WordPress website hosting server.

2. Check . htaccess File.

3. Deactivate All Plugins. Login to your WordPress admin dashboard and navigate to #Plugins - Installed Plugins.

Memcached DDOS attack

This article will guide you on methods to mitigate Memcached DDOS attacks which occur mostly by accident. To mitigate this attack, you can Disable #UDP, #Firewall #Memcached servers, and so on.

 DoS attack is a denial of service attack where a computer is used to flood a server with TCP and UDP packets. A DDoS attack is where multiple systems target a single system with a DoS attack. The targeted network is then bombarded with packets from multiple locations.

DDoS attacks are illegal under the Computer Fraud and Abuse Act. Starting a DDoS attack against a network without permission is going to cost you up to 10 years in prison and up to a $500,000 fine.

There are three essential security measures that all small businesses should take to protect themselves from #DDoS #attacks: Use a web application firewall (#WAF): The absolute best way to prevent a DDoS attack is through the use of a WAF that blocks bad traffic and prevents DDoS attacks from accessing your web server.

A Denial-of-Service (#DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that triggers a crash.

Different DDoS attack method:

1. UDP flood.

2. ICMP (Ping) flood.

3. SYN flood.

4. Ping of Death.

5. Slowloris.

6. NTP Amplification.

7. HTTP flood.

Install SQL Server 2019 on Linux

This article will guide you the process to install #MSSQL Server 2019 on #CentOS 7 and Ubuntu 16.04.

SQL Server 2019 #Developer is a full-featured free edition, licensed for use as a development and test database in a non-production environment.

SQL Server 2019 allows us to integrate data from structured and unstructured data sources. 

We can now process diverse big data and relational data sources using Transact-SQL from SQL Server using PolyBase. 

We can see below PolyBase support external databases.

SQL Server Express can be used in production (beware of the limitations, like the 10GB cap), but according to this link Express is available for Linux. SQL Server Express is available to use in Production.

Starting with SQL Server 2017, SQL Server runs on Linux. It's the same SQL Server database engine, with many similar features and services regardless of your operating system. It's the same SQL Server database engine, with many similar features and services regardless of your operating system.

To run a SQL script in #Linux terminal:

1. Open Terminal and type mysql -u to Open the MySQL command line.

2. Type the path of your #mysql bin directory and press Enter.

3. Paste your #SQL file inside the bin folder of mysql server.

4. Create a #database in MySQL.

5. Use that particular database where you want to import the SQL file.

Prestashop 404 error on homepage

This article will guide you on how to resolve Prestashop 404 error on homepage which mainly occurs due to many reasons which include bad permissions, memory limit, a problem with .htaccess file, and many more. 

The HTTP error 404, or more commonly called "404 error", means that the page you are trying to open could not be found on the server.

This is a client-side incident which means either the page has been deleted or moved, and the URL has not been modified accordingly, or that you have misspelled the URL.

In other words, this means that there is no web page corresponding to the entered URL.

To resolve a #Prestashop HTTP 404 error:

1. The first thing to do is to refresh the page. Press F5 to refresh the URL.

An error may have occurred if the page wasn't loaded correctly.

2. Clear the browser cache and delete cookies. If you are able to connect to the site via another device such as your mobile phone, clearing the cache and clearing cookies should easily solve the problem.

3. Check the #URL and make sure it is spelled correctly.

Check spelling, hyphens, page extension, etc.

4. Remove malware: some malware can cause a 404 error to occur. It is imperative to make sure that your computer is protected and that it does not contain viruses.

5. Contact the site owner to report the 404 error. If you are the website owner, contact your web host and request further information.

Zabbix Postgres vs MySQL

This article will help you give you more informations about #Zabbix Postgres vs MySQL and the criteria to choose between them. 

PostgreSQL is an Object Relational #Database Management System (#ORDBMS) whereas MySQL is a community driven DBMS system. PostgreSQL support modern applications feature like #JSON, XML etc. while MySQL only supports JSON.

PostgreSQL supports Materialized Views whereas #MySQL doesn't supports Materialized Views.

#PostgreSQL is known to be faster while handling massive data sets, complicated queries, and read-write operations. 

Meanwhile, MySQL is known to be faster with read-only commands.

Advantages Of Using MySQL:

1. It's Easy To Use.

2. Support Is Readily Available Whenever Necessary.

3. It's Open-Source.

4. It's Incredibly Inexpensive.

5. It's An Industry Standard.

6. It's Got A Few Stability Issues.

7. It Suffers From Relatively Poor Performance Scaling.

Cloudflare 404 Not Found error

This article will guide you on differerent methods to fix Cloudflare 404 Not Found #error which occurs when website content has been removed or moved to another URL. 

There are also other reasons why an error message could appear. 

The URL or its content (such as files or images) was either deleted or moved (without adjusting any internal links accordingly).

To fix #Cloudflare #404 error:

1. Retry the web page by pressing F5, clicking/tapping the refresh/reload button, or trying the URL from the address bar again.

2. Check for errors in the URL.

3. Move up one directory level at a time in the URL until you find something.

4. Search for the page from a popular search engine.

Important factors relating to 404 error:

i. A 404 not found error is an HTTP status code that means that the page you wanted to access a website couldn't be found on their server. 

ii. Did you know that search engines, such as Google and Yahoo, will get a negative impression of a website if it has too many HTTP 404 errors?

iii. A 404 is an HTTP status code that means you're able to communicate with the server but the server can't find the specific page.

Drupal Unexpected Error

This article will guide you on how to fix #drupal unexpected error. Drupal error occurs due to many reasons that include corrupt #database, non-compatible modules installation, cache, #PHP configuration, custom codes, and so on. 

1. An "Internal Server Error" is an #error on the web server that you're trying to access. 2. That server is misconfigured in some way that is preventing it from responding properly to what you're asking for. 

3. An "Internal Server Error" often occurs due to: Misconfigured Drupal core file or folder read and write permissions.

To clear cache in #Drupal:

i. In the Manage administrative menu, navigate to Configuration > Development > Performance (admin/config/development/performance).

ii. Click Clear all caches.

iii. A message saying the cache has been cleared appears at the top of the page.

Benefits of Push notification

This article is about the different benefits of push notifications. Basically, the push #notifications benefits the #website in improving the traffic. 

Push notifications can considerably enhance your customer experience. They're less intrusive than other forms of user engagement and can effectively drive traffic and help users by providing useful information. They allow your users to keep up with the latest updates, promotions, and offers.

Improve sales with customer service

In summary, we saw how to improve sales with reliable customer service. Along with some of the reasons to invest on customer service.

Basically, good customer service will always increase the likelihood of making a sale. It's not always guaranteed, and pressuring customers to buy won't get you anywhere. 

But keeping the human-to-human sentiment in mind will help people feel like they're not just there to make you money.

Providing excellent customer service means going the extra mile in making sure a customer is happy and satisfied with a company's products or services. 

It also involves providing service to a customer in a timely, pleasant manner.

To to deliver great customer service:

1. Know your product.

2. Maintain a positive attitude.

3. Creatively problem-solve.

4. Respond quickly.

5. Personalize your service.

6. Help customers help themselves.

7. Focus support on the customer.

8. Actively listen.

Django 400 bad request

This article will guide you on methods to resolve the #Django 400 bad request which is caused due to many reasons which include incorrect syntax, corrupt extensions, incorrect URL, and so on.

The 400 Bad Request #error is an #HTTP status code that means that the request you sent to the website server, often something simple like a request to load a web page, was somehow incorrect or corrupted and the server couldn't understand it.

To resolve 400 Bad Request:

1. Check for errors in the URL.

2. Clear Browser Cache and cookies.

3. Clear DNS Cache.

4. Check your File upload Size.

5. Deactivate Browser Extensions.


Default PHP settings in OpenLiteSpeed webserver

This article will guide you on the default settings for LSAPI. Basically, by default #OpenLiteSpeed support #PHP with external application and script handler. 

CyberPanel is a web hosting control panel powered by OpenLiteSpeed, which helps you set up sites on your DigitalOcean droplets easily and automatically back them up to DigitalOcean Spaces. Features. Different Level Of users.

To Configure #CyberPanel:

1. Enter admin for the username and 1234567 for the password.

2. Click on the user-menu arrow, next to the name "Cyber Pan".

3. Choose Edit Profile.

4. Select admin in the dropdown menu on the Modify User page.

5. You may now change the first name, last name, email address and password accordingly.

Galera cluster asynchronous replication

This article will guide you on steps to perform Galera cluster asynchronous replication for #MySQL.  Galera Cluster for MySQL is a true Multi-Master Cluster based on synchronous replication. It's an easy-to-use, high-availability solution, which provides high system up-time, no data loss and scalability for future growth.

To do you get a Galera Cluster:

1. Create a #Cloud Server. First, log in to your Cloud Server via an SSH tool such as putty.

2. Install #MariaDB Server on All Servers.

3. Configure Each Server in the #Cluster.

4. Initialize the Galera Cluster.

5. Test Galera Cluster #Replication.

301 redirect dns record

This article will guide you on how to set up 301 redirect DNS record. Basically, we must create the redirects carefully, so that we don't lose the traffic. 

301 redirect #DNS records are the best method that we can implement for achieving a good redirect.

Redirects are not bad for #SEO, but — as with so many things — only if you put them in place correctly. 

1. A bad implementation might cause all kinds of trouble, from loss of PageRank to loss of traffic. 

2. Redirecting pages is a must if you make any changes to your URLs.

3. A 301 redirect is a permanent #redirect that passes full link equity (ranking power) to the redirected page. 301 refers to the HTTP status code for this type of redirect. 

4. In most instances, the 301 redirect is the best method for implementing redirects on a website.

Remote Desktop on Debian Using X2Go

This article will guide you on the steps to set up remote desktop on #Debian. X2Go can be used to access Windows systems through a #proxy. Client packages can be run on #FreeBSD, Linux, #OS X, or #Windows. 

With the desktop sharing function of X2go you can gain full-access to the desktop of another computer, similar to programs such as Remote Desktop, TeamViewer, and LogMeIn. You can see an #X2go session from somebody else, but you can also see a normal desktop. Desktop Sharing functionality requires access to port 22.

To Connect to Linux Remotely Using #SSH in #PuTTY:

1. Select Session > Host Name.

2. Input the #Linux computer's network name, or enter the IP address you noted earlier.

3. Select SSH, then Open.

4. When prompted to accept the certificate for the connection, do so.

5. Enter the username and password to sign into your Linux device.

OpenVPN on Linux

This article will guide you on steps to set up OpenVPN on Linux.

OpenVPN config files (. ovpn) offer an easy way to configure #OpenVPN on your computer to work with our servers. These files contain the correct cipher types, #Certificate Authority, Certificate, and Private Keys. You can use these files on Mac, Linux, #Windows, Android, and iOS.

By default the OpenVPN Access Server comes configured with OpenVPN daemons that listen on port 1194 UDP, and OpenVPN daemons that listen on port 443 TCP. While the best connection for an OpenVPN #tunnel is via the #UDP port, we implement TCP 443 as a fallback method.

To Set up OpenVPN Server on Ubuntu #Linux:

1. Find and note down your public IP address.

2. Download openvpn-install.sh script.

3. Run openvpn-install.sh to install OpenVPN server.

4. Connect an OpenVPN server using iOS/Android/Linux/Windows client.

5. Verify your connectivity.

Install Microsoft PowerShell on Ubuntu

This article will guide you on steps to install PowerShell on #Ubuntu. #PowerShell is a configuration management tool that brings the capabilities of Linux command-line interface (#CLI) control into the historically point-and-click Windows environment to manage Windows servers efficiently in virtual deployments.

With PowerShell and WSL, we can integrate Linux commands into #Windows just as if they were native applications. 

No need to hunt around for Win32 builds of #Linux utilities or be forced to interrupt your workflow to drop into a Linux shell.

To check the PowerShell version installed in your system, you can use either $PSVersionTable or $host command.

To get a list of PowerShell commands:

1. Get-Command gets the commands from #PowerShell modules and commands that were imported from other sessions. 

2. To get only commands that have been imported into the current session, use the ListImported parameter. 

3. Without parameters, Get-Command gets all of the #cmdlets, functions, and aliases installed on the #computer.

Configure and Use Microsoft SQL Server Management Studio

This article will guide you on how to setup SQL server management studio. SQL Server Management Studio is a free #Windows #application to configure, manage, and administer Microsoft SQL Server (#MSSQL). 

SSMS is available only as a 32-bit application for Windows.

To get SQL Server Management Studio:

1. Go To Start Menu>Programs>Microsoft SQL Server Tools 18> Microsoft #SSMS 18. 

2. Below 'Connect to Server' screen will appear. 

3. Server Name defaults to the name selected while installing MS SQL server. 

4. Server type: This is an option to select one out of four available MS SQL services option.

To Enable remote connections to your SQL Server:

i. Open #SQL Server Management Studio.

ii. Right-click your server's name and select Properties.

iii. Tick the checkbox Allow remote connections to this server.

iv. Select OK.

Logging in Apache More about it

The Apache access logs stores information about events that occurred on your #Apache web #server. Apache web servers also provide administrators with another type of log file called error logs. 

The Apache error log has a logging level that filters the messages sent to the log. Apache #logs nothing for a single page request in warn level.

This log file is used to provide more information regarding a particular error that has occurred on the web server.

By default, you can find the Apache #access log file at the following path:

i. /var/log/apache/access. log.

ii. /var/log/apache2/access. log.

iii. /etc/httpd/logs/access_log.

To enable the Apache #HTTP access logs:

1. Open the Apache HTTP configuration at /Applications/MAMP/conf/apache/httpd.conf.

2. Find this line.

3. Change the line.

4. Restart Apache using the MAMP widgit.

5. Now, view your new logfiles!

Directadmin ioncube How to install and fix related errors

This article will guide you on how to set up the Ioncube loader and fix DirectAdmin Ioncube #errors. Incorrect timezone and misconfiguration in the php.ini file cause errors after installing the Ioncube loader in #DirectAdmin.

ionCube and Zend are fine for code protection, and even if some decompilation service produced usable code from an encoded file, this would typically do little if anything to diminish the benefits from encoding and license enforcement, and may even result in increased revenue in the longer term for the software.

To use ionCube #PHP encoder?

To use this PHP function to output the required data complete the following steps:

1. Connect to your server via #SSH.

2. Create a PHP file.

3. Add the phpinfo() function.

4. Save the file inside the root website folder.

5. Display in a browser.

6. Search the document for ionCube references.

7. Delete the file when done.


To enable Ioncube #loader in #cPanel:

1. Login to #WHM (root)

2. Go to Server Configuration -> Tweak Settings -> PHP.

3. Select #ioncube check box for cPanel PHP loader.

4. Click on Save button.

That's it. 

This will enable Ioncube for you in 3rd party PHP binary.

Create user in DirectAdmin

This article will guide you on how we can create a #user in DirectAdmin and fix errors related to it. DirectAdmin provides an easy way to create a user as a reseller. And the errors during its creation are mainly due to home directory unavailability or improper permissions or due to the disk being full. 

#DirectAdmin can be accessed at http://server.ip.address:2222. 

Use the Admin username/password from the output information provided by setup.sh (the same information is specified in the /usr/local/directadmin/scripts/setup.

To install Direct Admin:

1. Set a main #domain name. By default, no web #site is associated with your server.

2. Create nameservers (optional) Add at least one additional IP address to your sever.

3. Set your e-mail address in the control panel.

Create a virtual machine using lightsail in AWS

This article will guide you on how to create a virtual #machine using Lightsail in #AWS.

#Lightsail is an easy-to-use virtual private server (#VPS) that offers you everything needed to build an application or website, plus a cost-effective, monthly plan.

To create a virtual machine in #cloud:

1. Using the left-hand navigation bar, click Compute Engine and then select #VM instances from the item list. 

2. If this is your first #VM on the platform. 

3. If you have a VM template you can import it to GCP, but in this case we will create a VM from scratch.

Common Image Issues in WordPress

This article will help you #fix some of the most common #image issues in #WordPress. 

If your Media Library is loading but not showing images, there are two primary causes: an incompatible plugin, and improper file permissions. 

Testing #plugins follows the same advice as above, and if they're not the cause, file permissions may be.

To fix image size in WordPress:

1. Navigate to your WordPress admin dashboard.

2. Go to Settings - Media.

3. In Media Settings, edit the width and height dimensions to suit your values.

4. Click Save Changes to confirm.

Image Upload Issue in WordPress

This article will guide you on resolve Image Upload #Issue in WordPress. You will also learn its causes and how you can prevent this error in the future.

If your Media Library is loading but not showing images, there are two primary causes: an incompatible plugin, and improper file permissions. Testing plugins follows the same advice as above, and if they're not the cause, file permissions may be.

To Fix Common Image #SEO Issues in #WordPress:

1. #Upload an image in png or JPG format.

2. Align Image to the Left or Right.

3. Caption uploaded images.

4. Display Photos in Columns and Rows.

5. Create Responsive Gallery.

6. Set Features Image.

7. Add Cover Image for WordPress Pages and Posts.

8. Fix Twice Appearing Featured Image.

SPF record cPanel

This article will guide you on how to enable SPF record in #cPanel to reduce the chances of spoofing and thus saves the confidential information from being corrupted.

An #SPF (Sender Policy Framework) record is a type of TXT record in your #DNS zone file.

SPF allows email senders to define which #IP addresses are allowed to send mail for a particular domain.

To enable SPF record in cPanel:

1. Go to Add a record (or edit your #record if you already have one).

2. Name: enter the name of your #domain or subdomain used in your sender e-mail address.

3. TTL: enter 14400.

4. Type: select #TXT.

5. TXT Data: Enter your SPF record (e.g. v=spf1 a mx ~all)

6. Save your modifications.

Install a module in DNN

This article will guide you on how to #install a module in #DNN.

To Install / Update a #DotNetNuke #Module:

1. Log into your site as either HOST or another supersuser level account.

2. Open Settings -> Extensions.

3. Click "install extension".

4. Drag and drop the package into the window, or browse to the desired file to upload it.

5. Click Next, accept the license, continue through the install. When finished click on the Return button.

Disable Password Expiration with PowerShell

This article will guide you on the method to disable password expiration in the #Windows server with PowerShell.

#PowerShell is the shell #framework developed by Microsoft for administration tasks such as configuration management and automation of repetitive jobs. 

The term 'PowerShell' refers to both – the shell used to execute commands and the scripting language that goes along with the framework.

Why did #Microsoft make me change my password?

This is a security feature of all Microsoft accounts which cannot be turned off. 

If the option for 72 days password expiration is enabled in your account then it will automatically ask you to reset password.

To turn off the password feature on Windows 10:

1. Click the Start menu and type "netplwiz." The top result should be a program of the same name — click it to open.

2. In the User Accounts screen that launches, untick the box that says "Users must enter a name and password to use this computer."

3. Hit "Apply."

4. When prompted, re-enter your password to confirm the changes.

WordPress Login Page Refreshing and Redirecting Issue

This article will guide you on methods to resolve WordPress Login Page Refreshing and Redirecting Issue. 

Your login credentials (username/password) are incorrect. You're being blocked by your security plugin. You changed the WordPress login URL. There's a problem with your #WordPress #site (White Screen of Death, 500 Internal Server #Error, and so on.)

To fix redirect #problems in WordPress:

1. Delete cookies on that specific site.

2. Clear WordPress site, server, proxy, and browser cache.

3. Determine nature of redirect loop.

4. Check your HTTPS settings.

5. Check third-party services.

6. Check your WordPress site settings.

7. Temporarily disable WordPress #plugins.

8. Check redirects on your server.

Outsourcing Improves Software Development

In summary, in order to stay at the top, it is vital to respond to the demands and trends of your consumers. This is made easy and possible through Outsourcing. Today, we saw how #Outsourcing Improves #Software #Development.

Outsourcing has the potential to improve your business' efficiency, reduce the time to market of your application, and result in significant cost-savings, but only if it is done correctly. There are significant risks involved in outsourcing development as well.

Advantages of Outsourcing includes:

1. Focus on core tasks.

2. Lower costs.

3. Promote growth.

4. Maintain operational control.

5. Offer staffing flexibility.

6. Provide continuity and risk management.

7. Develop internal staff.

Windows Error Code 17

This article will guide you on different methods to tackle Windows Error Code 17 which causes Windows #program to crash, slow Windows performance and periodic system freeze.

#Windows error code 17 is a standard device driver error. This error can be attributed to either a corrupt driver or an outdated driver. To resolve, Do a search for your device #driver and see if the newest version available was released since you bought your hardware. If it was, you probably need to download the newest version.

To Fix #Spotify Could Not Be Started #Error Code 17:

1. Open the “Firewall & network protection” via Search bar;

2. Click on “Allow an app through firewall”;

3. Press “Change settings”;

4. In the list of programs, find Spotify and check the boxes for it under the Private and Public columns. 

If it's absent here, click on the “Allow another app …” button and add it manually.

HTTP 400 Bad Request error

This article will guide you on different methods to resolve #HTTP 400 Bad Request error which indicates that the request you sent to the #website #server, often something simple like a request to load a web page, was somehow incorrect or corrupted and the server couldn't understand it.

To Fix 400 Bad Request Error:

1. Check the Submitted URL.

2. Clear Browser #Cache.

3. Clear Browser Cookies.

4. File Upload Exceeds Server Limit.

5. Clear #DNS Cache.

6. Deactivate Browser Extensions.

SMTP Error 451

This article will guide you on different methods to resolve #SMTP #error 451 which occurs due to the receiving server rejecting your email. 

This can happen for a number of reasons but most likely is due to the recipients server being overloaded with #messages.

To fix SMTP Error: Failed to connect to server:

1. Modify the #firewall rules on the server to allow outbound connections on #ports like 465.

2. Modify the SMTP restrictions on the server.

3. Edit #PHPMailer settings like Host, Port etc.

4. Correct #DNS resolution for mail server.

Microsoft office Error code 1309

This article will guide you on different methods to resolve #Microsoft office Error code 1309. To avoid this error please right click the downloaded file and select “Extract All,” then choose a destination for the files to be extracted to.

If you encountered a problem while installing Office on a PC, try restarting your computer and then attempting to install Office again. If that didn't help, use this easy fix tool to uninstall #Office completely. After your uninstall is complete, try reinstalling Office.

To fix Another installation is already in progress on Windows 10:

1. Restart the #Windows Installer service.

2. End Windows Installer process.

3. Disable Windows Installer service and restart your #PC.

4. Perform Disk Cleanup.

5. Perform a Clean #Boot.

6. Check your #Registry.

7. Uninstall and reinstall Office.

GlusterFS install CentOS 7

This article will guide you on the steps to install and setup #GlusterFS. 

GlusterFS is a scalable #network filesystem suitable for data-intensive tasks such as cloud storage and media streaming. 

GlusterFS has a client and #server component. Servers are typically deployed as storage bricks, with each server running a glusterfsd daemon to export a local file system as a #volume.

To install GlusterFS:

1. Have at least two nodes. CentOS 7 on two servers named "server1" and "server2".

2. Format and mount the bricks.

3. Installing GlusterFS.

4. #Iptables configuration.

5. Configure the trusted pool.

6. Set up a GlusterFS volume.

7. Testing the GlusterFS volume.

psql to restore a text dump How to do it

This article will guide you on steps to perform  text dump restoration. Basically, psql restores a text dump in the same file format.

You can backup a single table, a #schema, or a complete database. Select the name of the backup source in the #pgAdmin tree control, right click to open the context menu, and select Backup… to open the #Backup dialog. 

The name of the object selected will appear in the dialog title bar.

In #PostgreSQL, you can restore a database in two ways:

i. Using psql to restore plain #SQL script file generated by pg_dump and pg_dumpall tools.

ii. Using pg_restore to restore tar file and directory format created by the pg_dump tool.


To Restore Postgres Database:

1. Restore a postgres database. $ psql -U erp -d erp_devel -f mydb.sql.

2. Backup a local postgres database and restore to remote server using single command: $ pg_dump dbname | psql -h hostname dbname.

3. Restore all the postgres databases.

4. Restore a single postgres table.

How to set rDNS in Windows Name Servers

This article will guide you on how to set #rDNS records in Windows Name servers. rDNS means mapping the address to a #hostname.

Nslookup is an MS-DOS utility that enables a user to look up the IP address of a domain or host on a network. The #nslookup command can also perform a reverse lookup using an IP address to find the domain or host associated with that IP address.

PTR record ( a pointer record ) is the certain type of DNS record that resolves an IP address to a host name. Getting reverse #DNS going is done by finding the PTR records in use by a DNS server. These PTR records will be managed by the company that is in control of the IP address which was assigned to you.

1. A pointer (PTR) record is a type of Domain Name System (DNS) record that resolves an IP address to a domain or host name, unlike an A record which points a domain name to an IP address. 

2. PTR records are used for the reverse DNS lookup. Using the IP address, you can get the associated domain or host name.

3. An A record should exist for every PTR record. 

4. The usage of a reverse DNS setup for a mail server is a good solution. 

5. While in the domain DNS zone the hostname is pointed to an IP address, using the reverse zone allows to point an IP address to a hostname.

Plesk MSSQL remote connection

This article will guide you on how to enable and resolve #MSSQL related #errors. MSSQL remote connection is disabled in #Plesk servers by default.

To enable remote connections to MS SQL server:

1. Connect to the server via RDP.

2. Press the Start button, go to Microsoft SQL Server XXXX (where XXXX is the MSSQL version) and click the SQL Server XXX Configuration Manager.

3. Open the SQL Server Configuration Manager (Local) > #SQL Server Network Configuration menu and click the Protocols for MSSQLSERVERXXXX (where XXXX is the MSSQL version).

4. Make sure that the TCP/IP protocol has the Enabled status

5. Double-click the TCP/IP protocol, go to the IP Addresses tab and scroll down to the IPAll section.

6. Specify 1433 in the TCP Port field (or another port if 1433 is used by another MS SQL Server) and press the OK button:

Note: the specified port, e.g, 1433, must be opened in the firewall.

PHP header not redirecting error

This article will guide you on ways to fix #PHP #header not #redirecting error which generally occurs mainly due to the absence of ob_start() function, incorrect header formats, and so on. Your target destination server does not allow iframe redirects. Fix: Servers can solely determine if websites hosted on them can be reached via an #iframe redirect. The easiest way to resolve this is to simply change your selection from "Redirect using iframe" to "Redirect URL".

To redirect URL in PHP:

1. You can simply use the PHP header() function to redirect a user to a different page. 

2. The PHP code in the following example will redirect the user from the page in which it is placed to the URL http://www.example.com/another-page.php . 

3. You can also specify relative #URLs.

Server sent passive reply with unroutable address

This article will guide you on ways to resolve #Server sent passive reply with unroutable address which occurs due to bad server settings or when an FTP client is behind #NAT. 

#FileZilla has updated their FTP #client, and FTP over TLS is now used by default. This results in clients being unable to connect to their server from the outside network.

Make sure that you properly set up for FTP over TLS/SSL, explicit and passive ports are allowed on the #firewall and set on Serv-U:

i. Go to the Serv-U settings at: Global Limits & Settings > Settings - Network Settings.

ii. Ensure the Auto-configure firewall through UPnP checkbox is not checked.

iii. Ensure the Packet time-out is set to 300 seconds.

iv. Set #PASV Port Range is 50,000-50,009, and port forward these ports to your router.

This configures the file transfer traffic to be routed through the router and directly to Serv-U through “Port Forwarding”.


If, after this, you are still unable to connect, try disabling the "Block FTP_Bounce and FXP" option - this has been known to cause issues for some clients. To do this, follow the steps below:

1. Navigate to Global > Limits and Settings  > #FTP Settings.

2. Select Global Properties. (If this is not available, first select Use Custom Settings to gain access to it).

3. On the Advanced Options tab, make sure "Block FTP_Bounce and FXP" is unchecked (which it is by default).

Troubleshooting DHCP client issues

This article will guide you on troubleshooting different DHCP #client issues. Whenever a DHCP server gets a request from a client it responds with a DHCP offer containing IP address being offered, #network mask offered, the amount of time that the client can use and keep it, the ip address of the DHCP server making this offer.

To #Troubleshoot DHCP:

1. Check for IP Address Conflicts. #DHCP clients connect to the network using a leased IP address.

2. Check Physical Connectivity.

3. Test connections with other Client using a Static #IP Address.

4. Confirm Switch #Port #Configuration.

5. Verify the source of Clients IP Address.

Optimize Image before Upload Using PHP

This article will guide you on how to #optimize the #image on upload in #PHP. #TinyPNG uses smart lossy compression techniques to reduce the file size of your PNG files. By selectively decreasing the number of colors in the image, fewer bytes are required to store the data. The effect is nearly invisible but it makes a very large difference in file size.

To optimize images for the web:

1. Name your images descriptively and in plain language.

2. Optimize your alt attributes carefully.

3. Choose your image dimensions and product angles wisely.

4. Reduce the file size of your images.

5. Choose the right file type.

6. Optimize your thumbnails.

7. Use image sitemaps.

Install NET framework 4.8 on windows server 2016

This article will guide you on how to #install .NET framework 4.8 on windows server 2016. 

Can't install .NET Framework 3.5 #Windows 10 0x800f0954?

NET Framework 3.5 or Any Optional #Feature. If the error 0x800f0954 occurs installing optional Windows features, it may be because the system is unable to access the Windows Update server. This is especially true in case of domain-joined computers which is configured to downloads updates from a WSUS server.

By using the Windows server 2016, we can install . NET Framework 3.5 which can be easily installed through Server Manager. 

i) Open the 'Server Manager' and navigate to the 'Manage' and then select 'Add Roles and Features'. 

ii) Click next to 'Features' section and select the option '.

To install Microsoft . #NET Framework 3.5. 1 on Windows Server 2012 R2:

1. Open Server Manager and select Features.

2. Select Add roles and features to launch the Add Roles and Features wizard.

3. In the Add Roles and Features wizard, click.

4. In the Confirm Installation Selections dialog box, click Install.

When you try to install the Microsoft . NET Framework 4.7 on a #computer that runs Windows 7 Service Pack 1 (SP1), Windows Server 2008 R2 SP1, or Windows Server 2012, the setup is blocked and cannot continue. 

This issue occurs when the computer does not have the update for D3DComplier (D3DCompiler_47. dll) installed.

PHP cURL 403 forbidden error

This article will guide you on different methods to fix #PHP #curl #error which can occur due to syntax errors, mod_security issues, and also due to incorrect coding issues. A 403 #error indicates that the user cannot access certain web pages. It is a generic error that says: "You do not have permission to view this page". 

The "Access Denied" error appears when your Mozilla Firefox browser uses a different proxy settings or VPN instead of what's really set on your Windows 10 PC. Thus, when a #website detected that there is something wrong with your browser cookies or your network, it blocks you which is why you can't open it.Typically, the error is caused by an issue with the #URL or with cached files within the browser.

To fix 403 #forbidden:

1. What is a 403 Forbidden Error?

2. Refresh the Page.

3. Double Check the Address.

4. Clear Your Browser Cookies and Cache.

5. Check if You Have Permission to Access the URL.

Imagick php install

This article will guide you on how to install #Imagick #PHP #extension. Imagick is the most popular PHP extension which helps to create edit convert, and/or manipulates images. ImageMagick is a free and open source, feature-rich, text-based and cross-platform image manipulation tool used to create, edit, compose, or convert bitmap images. It runs on #Linux, #Windows, #Mac Os X, iOS, Android OS, and many other operating systems.

To use Imagick with PHP in your server, you can easily achieve it with the following #command:

sudo apt-get install php-imagick.

php -m | grep imagick.

sudo service apache2 restart.

Reset Windows Administrator Password from Hyper-V

This article will guide you on steps to reset the forgotten #Windows Administrator password from Hyper-V using an #ISO file.

Microsoft's Hyper-V virtualization can greatly reduce cost of operations. By purchasing a few very powerful #servers you can virtualize all or most of your entire infrastructure while reducing the cost of #hardware and maintenance.

To Reset Lost Admin Password for Hyper-V Virtual #Machine:

1. Select the administrator account, then click the Reset Password button to reset the password to blank. 

2. Click the Restart button to reboot the virtual machine, you are able to log in to the administrator account with a blank password.

Add User To Group in Linux

This article will guide you on how to add a #user to a #group in #Linux. The group permissions apply only to the group that has been assigned to the file or directory, they will not effect the actions of other users. The others permissions apply to all other users on the system, this is the permission group that you want to watch the most.

Groups can be thought of as levels of #privilege. A person who is part of a group can view or modify files belonging to that group, depending on the permissions of that file. User belonging to a group has privileges of that group, for example - sudo groups lets you run software as super user.

To view all groups present on the system simply open the /etc/group file. Each line in this file represents information for one group. Another option is to use the getent command which displays entries from #databases configured in /etc/nsswitch.


To Create a New Sudo User:

1. Log in to your server as the root user. #ssh root@server_ip_address.

2. Use the adduser command to add a new user to your system. Be sure to replace username with the user that you want to create.

3. Use the usermod command to add the user to the wheel group.

4. Test sudo access on new user account.


To List Users in Linux:

i. Get a List of All Users using the /etc/passwd File.

ii. Get a List of all Users using the getent Command.

iii. Check whether a user exists in the Linux system.

iv. System and Normal Users.

Executing queries from the MySQL Command Line

This article will guide you on how to run queries from the 3MySQL command line. The MySQL #Command Line Tool is a useful way to run #queries from the command line. It’s easy to run select queries and display the results in either a horizontal or vertical format, and the queries run are kept in a history file which you can navigate through. 

If you don't want to run a particular query after all you can use the c command to clear it.

The most common way to get a list of the MySQL #databases is by using the mysql client to connect to the MySQL server and run the SHOW DATABASES command. If you haven't set a password for your MySQL user you can omit the -p switch.

To Connect to a MySQL Database:

1. Click Services tab.

2. Expand the Drivers node from the Database Explorer.

3. Enter User Name and Password.

4. Click OK to accept the credentials.

5. Click OK to accept the default schema.

6. Right-click the MySQL Database #URL in the Services window.

Vestacp 502 bad gateway error

This article will guide you on common causes for #Vestacp #502 bad gateway #error and different methods to fix this error.

A 502 Bad Gateway indicates that the edge server (server acting as a proxy) was not able to get a valid or any response from the origin server (also called upstream server).

Server software timeouts: This error can also occur when a web server takes more time to complete and a caching tool reaches its timeout values that time. Slow queries can also cause this problem too.'

To fix Error 502 Gateway:

1. Refresh the page.

2. Start a new browser session or load the site on a different browser.

3. Restart your computer and networking equipment.

4. Clear your #cache and cookies.

5. Change your #DNS server.

Add domain in PRTG

This article will guide you on how to add a #domain in the #PRTG #monitoring system.

PRTG is a network monitoring system to monitor a #website.

If you are working in more complex environments or those with a desire to reduce the number of authentication mechanisms on their networks, PRTG includes the option to easily integrate with Active Directory (AD).

1. PRTG additionally adds the probe device to the local probe. This is an internal system device with several sensors. It has access to the probe system and monitors the system's health parameters. 

2. PRTG automatically analyzes the devices that you add and recommends appropriate #sensors on the device's Overview tab.

Security certificate does not specify subject alternative names

This article will guide you on steps to fix #Security certificate does not specify subject alternative names. 

Basically, the #error, Security certificate does not specify subject alternative names trigger if the certificate does not have the correct SubjectAlternativeName extension.

Subject Alternative Names or SANs allow you to secure multiple domains from one SAN SSL certificate. SANs are additional domain names added to an SSL certificate.

To add a Subject Alternative Name to a certificate:

1. If you want to add #SAN, most CAs allow you to reissue a certificate with new details, though this will usually revoke your old certificate. 

2. You don't need the old CSR to reissue a certificate, you can instead create a new CSR with the updated details using a new or existing private key.

The Subject Alternative Name (#SAN) is an extension to the X. 509 specification that allows users to specify additional host names for a single SSL certificate. The use of the SAN extension is standard practice for #SSL #certificates, and it's on its way to replacing the use of the common name.

Restore a database in Alwayson Availability Group

This article will guide you on steps to restore a #database in alwayson availability group.

If you receive an #error that the database is in use, try to set the user to single user mode: USE master; GO ALTER DATABASE Database_name SET SINGLE_USER WITH ROLLBACK IMMEDIATE; Then try the restore with #recovery command again. Also, make sure you are on the latest service pack or cumulative update.

Creating a #SQL #Server AlwaysOn Availability Group.

Open SQL Server Management Studio and connect to the SQL Server instance. Expand the AlwaysOn High Availability folder in the Object Explorer. Right-click on the Availability Groups folder and select the New Availability Group Wizard.

To Restore a Database in a SQL Server AlwaysOn Availability Group:

1. Make the secondary server from which the backups were taken the primary server.

2. Remove the database to be restored from the AlwaysOn Availability Group.

3. Restore the database.

4. Add the database back into the Always Availability Group.

Windows update error 0x800B0109

This article will guide you on steps to fix the #windows #update error 0x800B0109.

Windows error code #0x80070422 refers to an inability of Windows 7 to startup the Windows Update service so your computer can connect to the update servers at Microsoft.

Steps For Fixing #Error Code #0x800b0109:

1. Open Administrative Tools from Control Panel. Open Control Panel, type administrative tools in the search box, and then click Administrative Tools.

2. Double-click Services.  If you’re prompted for an administrator password or confirmation, type the password or provide confirmation.

3. Right-click the Background Intelligent Transfer Service (BITS) service, and then click Properties.

4. On the General tab, next to Startup type, make sure that Automatic (Delayed Start) is selected.

5. Next to Service status, check to see if the service is started. If it’s not, click Start.

6. Click OK to close the #Properties dialog box.

7. Right-click the Windows Event Log service, and then click Properties.

8. On the General tab, next to Startup type, make sure that Automatic is selected.

9. Next to Service status, check to see if the service is started. If it’s not, click Start.

RoundCube CONNECTION FAILED Database Error

This article will guide you on the different methods to fix Database Error: Connection Failed error shows up due to database errors or #PHP #errors. 

Establishing a Database Connection #Error basically means that for some reason or another the PHP code was unable to connect to your #MySQL database to retrieve the information it needs to fully build that page. That's why the error is always shown on a blank page because there is no information about your site as it is not connected to your database.

Establishing a Database Connection Error Occur due to:

1. Incorrect Login Credentials.

2. Corrupt #Database

When You Are Locked Out of WordPress Admin

This article will guide you on different ways to tackle Your #WordPress Site #error when you Are Locked Out of WordPress #Admin #Dashboard.
A common reason that can lock you out of the WordPress admin area is error establishing the #database connection. Usually, this error occurs when your database is corrupted, unresponsive or your web #hosting service provider has issues with its servers. Sometimes, this error can last for hours and spoil your user experience badly.

DirectAdmin Skin or Interface Issues

This article will guide you on different methods to fix #DirectAdmin #skin or #interface issues.
To fix DirectAdmin Skin or Interface Issues:
What if the DirectAdmin skin is corrupted? How to fix DirectAdmin Skin or Interface Issues? Here are some steps you can try.
1. Reinstall skin.
cd /usr/local/directadmin/data/skins/
./packskins.sh
2. Recompile PHP using the following commands.
cd /usr/local/directadmin/custombuild
./build update
./build clean
./build php d
These steps will fix almost every issues with DirectAdmin skin.

Webmail timeout issue in DirectAdmin


This article will guide you on how to resolve #timeout #error in #webmail in #DirectAdmin. Generally, webmail timeout issue can occur if the timeout value is exceeded.
The term timeout or time-out has several meanings, including: A network parameter related to an enforced event designed to occur at the conclusion of a predetermined elapsed time.
To fix Webmail timeout error in DirectAdmin:
Modify the config file "/var/www/html/webmail/inc/config.php" or in /var/www/html/webmail/inc/config.security.php
and set
Code:
# Session timeout for inactivity
#
$idle_timeout = 10; //minutes
to whatever value you need.

Database version or build from backup file

This article will guide you on how to determine the database #version or build from a #backup file.
To know what #SQL version a #database is:
The first is by using either Enterprise Manager or SQL Server Management Studio and right clicking on the instance name and selecting Properties. In the general section you will see information such as on the following screenshots. The "Product version" or "Version" gives you a number of the version that is installed.
In order to find the SQL Server version from a bak file:
1. Here is the output returned by the RESTORE HEADERONLY statement. Here you will see a DatabaseVersion column that contains the value.
2. That's how you find out from which version of SQL Server a given backup file came.

Improve SQL Server Bulk Data Import Performance

This article will guide you improve #bulk #data #import #performance. The BULK INSERT command is much faster than bcp or the data pump to perform text file import operations, however, the BULK INSERT statement cannot bulk copy data from #SQL Server to a data file. Use the bcp utility instead of DTS when you need to export data from the SQL Server table into a text file.
To Speed up SQL Bulk Insert with #transactions:
1. Declare the variables that store the number of desired items ( @items ), the size of the chunks( @chunk_size ) and the counter of the number of executed inserts( @counter )
2. Open the first transaction and initialize the while loop.