Create account Login Webmail Contact Us



 
RSS Feed
Knowledgebase : Dedicated Server Support
   

All of our Dedicated Servers are Based and managed in US.
We Offer 99.99% Network/SLA and power Uptime Guarantee!
Yes, We do. Please click on the server you are interested in to see the details.
Installing Zend Optimizer In order to install Zend Optimizer on a cPanel server please do the following: 1) Log into your server via SSH 2) Issue the following command : Code: /scripts/installzendopt 3) Follow the on-screen instructions. ====...
Installing Midnight Commander (File Manager) If your control panel does not bring Midnight Commander with it, here is how to install this good file manager: Midnight Commander : =================== 1) Log into SSH and issue the following commands: ...
How do I install Nano? If your control panel does not bring Nano with it, here is how to install this text editors: Nano Editor : =================== Obtain a copy of Nano at http://www.nano-editor.org/download.html and upload it to your system, pi...
Installing Advanced Policy Firewall (APF) APF (Advanced Policy Firewall) APF is a modular, policy based iptables firewall system designed for ease of use and configuration. It employs a subset of features to satisfy the veteran Linux user and the novi...
Installing Rootkit check (Scan for trojans/backdoor) RootKits ======== The definitions ============= "A kit for maintaining root" "A root kit is a set of tools/programs used by an intruder after a succesful intrusion into a system. These tools...
Basic shell commands Viewing files and moving around in shell At the command prompt, enter " ls " this will list the contents of your current directory. You should see something like this (sample contents) Code: [[email protected] steph]# ls file....
What are some basic shell commands? Viewing files and moving around in shell At the command prompt, enter " ls " this will list the contents of your current directory. You should see something like this (sample contents) Code: [[email protected] st...
Secure the Secure Shell By default SSH will give root and any local user secure access to the server. For security reasons it is a good idea to change this setting and specify the users which are allowed to have SSH access. The configuration file for SSH...
All Unix systems support virtual memory, sometimes referred to simply as "VM". With VM in service, active applications and processes on your system can reside in physical memory or space on your hard disks that serves as an extension to physical memory. T...