What Is Disk Space Abuse? Keeping an eye on Disk Space Abuse is a crucial part to prevent websites from facing downtime, slow loading speed, or slow email arrival speed. The disk space of a server could be divided into parts, and you can view information about disk spaces from SSH or WHM. Today, in
Today in this article, we’re gonna learn to transfer files using the WinSCP file transfer protocol. But, before getting ahead, it’s better to have a brief knowledge of File Transfer Software first. Transferring files from WinSCP isn’t a big deal. Anyone can do it easily if he has basic knowledge of FTP. So let’s learn about the WinSCP
How To Protect Your Server From Spam Emails? Summary: Nowadays, when the spammer has increased widely. It’s crucial to protect your server and client’s emails from sending spam emails. Well, here in this tutorial, we’ll walk you through several methods to keep your server from sending out spam or junk mail. Generally, bulk email senders
Hi, In this article, we’ll show you how to Block/Unblock IP Addresses in SSH. You can also Block/Unblock IP Addresses from WHM root for which we have already written an article. But, using SSH to ban/unban IP Addresses is more effective and less time-consuming because you don’t have to browse through the WHM interface in
With the help of SSH Key, you can access the command-line interface (CLI) to your web server. Security is one of the major advantages of SSH as it established an encrypted connection from your server to the remote server. Usually, we use a password to connect with SSH, but using an SSH key is way more secure
You might have faced a situation in which you perform an uploading/downloading task on a remote server, and suddenly the connection drops, SSH terminates the session, and all your work is lost. Well, we all had faced this at some point. Aren’t we? However, today in this article, we’re gonna walk you through the process to
Well, JetBackup offers several backup options such as Incremental Backup, Archived Backup, Compressed Backup, Etc. To automate these backup processes, we use the Backup Jobs option in JetBackup. If you don’t have JetBackup installed in your WHM, you can browse our previous tutorial to Install JetBackup in WHM Root and come to this post again, after installing the JetBackup.
What is Linux Ownership Permission? In Linux, whoever creates a file or directory becomes the owner of it. Linux File Ownership has divided into three types: User: A user is the one who created the file. Whoever creates a file becomes the owner of that file. Group: A group can have multiple user access in it. A
What is SFTP and how it Works? How to Create an SFTP Connection? Top SFTP commands How to Transfer Files in SFTP? Some Other Useful SFTP commands What is SFTP? How Does SFTP Work? SFTP (Secure File Transfer Protocol) is the safest file transfer protocol used to access, manage, and transfer files over an entirely secured
You can also watch our VIDEO TUTORIAL for this topic. What Is SSH? SSH, Telnet, and Rlogin are three ways of doing the same thing: logging in to a multi-user computer from another computer, over a network. Multi-user operating systems, such as Unix and VMS, usually present a command-line interface to the user, much like