We have shared various articles that illustrate SSH commands and their functions. Today, in this tutorial we will explain the procedure to delete multiple files in Linux. In this article, we will go through the following. Command to delete multiple files Command to delete multiple files accessed before Command to delete multiple files with same
SSH commands allows user to manage files and directories easily. We have shared multiple articles on related topics. Today, we’re going to discuss in-detail procedure to change file permissions recursively in Linux. In this tutorial we will discuss the following. Change File Permissions Recursively from SSH Terminal Change File Permissions Recursively via PHP file in
In this tutorial, we will describe the procedure to disable SELinux permanently in Linux server. Let us go through the procedure in detail. Login to SSH with root credentials and follow the below mentioned steps. #1. Check the Status SELinux on your system To check the status of SELinux, execute the following command. sestatus #2.
Linux allows user to manage maximum number of files and directories from Command Line Interface. With the Linux command user can create, delete and manage several other task related to files and directories. Even Linux allows user to find one or more files from thousand with the find command. Today, in this tutorial we are
As a website owner, you may face the issue of disk quota exceeded that means the disk drive get cluttered with large number of files and directories which may be unnecessary. So, it is important to find those files or directories in order to check if they are consuming unwanted space. In this article, we
Exim is the mail software that manages all the email delivery on your server. This software is used by the user having root administration or those who are using VPS or Dedicated server. WHM is the control panel used by root users to manage multiple task related to accounts. Today, in this tutorial we will
Sometimes, it is important to check the current users who are working on Linux system. Let us consider an example. Suppose you are a root user and you want to do some changes in the configuration files but at the same time you did not want any user to be logged in or perform any
Sometimes, it is required to know about your Server Information, no matter you are using shared hosting plans, VPS or Dedicated Servers. Thus, it is important for users to know about the components and configuration they are using. Today, in this tutorial, we are going to discuss various commands that you can use to check
Setting up a strong password is always recommended to manage the security of control panel or any management panel. So, it is important to have a strong password whether you are cPanel user or having multiple cPanel users. Today, in this tutorial we will go through in detail procedure to change password in Linux via
There are several reasons behind AWStats not updating error. Usually, this error occurs due to wrong file permissions, configuration errors, wrong directives, etc. So, let’s have a detailed discussion to solve the AWStats not updating issues in cPanel. However, before starting ahead, let’s have a brief look at AWStats. What is AWStats? Advanced Web Statistics
Hi, In this article, we’ll walk you through 20 Basic CSF Firewall commands that will help you use ConfigServer Security Firewall (CSF) more efficiently in SSH also. In this tutorial, we’ll first explain what the command does, and then we’ll use those basic commands with live examples. Let’s dive right in!! Note: You must have the SSH login with
You can easily import/export your Jetbackup settings from SSH, and save them somewhere else if you don’t want to lose your Jetbackup settings. However, doing this task will require root access as this task is only for Administrators or root users. Just like creating backups in Jetbackup & restoring them in your external or remote
MySQL Strict Mode is used to prevent users from configuring any third-party websites or software for security purposes. It’s easy to disable MySQL Strict Mode on your Server using the following methods: Disable MySQL Strict Mode from my.cnf File Disable MySQL Strict Mode from SQL 1: Disable Strict Mode using my.cnf File Follow the below steps
Note: There are two methods to Blacklist/Whitelist IPs in Imunify and both of them require root access. If you’re a Shared Hosting user with user-level access, you should contact your hosting provider to perform this task. Additionally, you can forward this tutorial so that they can easily perform your task. Imunify360 is security software that
What Is Disk Space Abuse? Keeping an eye on Disk Space Abuse is a crucial part to prevent websites from facing downtime, slow loading speed, or slow email arrival speed. The disk space of a server could be divided into parts, and you can view information about disk spaces from SSH or WHM. Today, in
Hi, If you’re getting started with Linux and looking for the best way to learn Basic Linux Commands with live examples, this is going to be the best article for you. Nowadays, when every second or third person has their own website, Learning Linux Commands has somewhere become a necessary task for us. PuTTY, is
Complete Guide to Backup & Restore Websites Creating a time-to-time backup, and restoring that backup when needed is the most crucial part of the web hosting industry. There are several types of backup options by which a user can easily create a backup and also restore it. Here, in this tutorial, we’re gonna walk you
Well, if you already read our previous article to restore cPanel backup from WHM and looking for an SSH method to restore bulk cPanel backups at once, you’re at the right place. Here, in this tutorial, we’re gonna talk about two different ways to restore your cPanel accounts via SSH. Let’s directly dive right in!! There
What is SSH? SSH, also known as Secure Socket Shell, is a network protocol that allows two computers to communicate over a secure network and share data. SSH is one of the safest ways to transfer files/data from the remote server to a local computer. It’s majorly used by the system administrators. SSH uses the Public Key
Sometimes, it’s difficult to find a Linux file surrounded by thousands of other files. The Linux Command-Line (CLI) has numerous commands that help perform several tasks effortlessly. Apart from listing all the contents of the present directory using the ls command, creating a new directory using the mkdir command, using rsync command, or creating a new blank file using the touch command. You