Remove any the previous installation of Apache if it is installed from yum command in the target system. Installation procedure To proceed with the installation procedure, run the below command which installs all the required packages for the source code compilation of Apache and press y to continue with the installation. [root@linuxtips ~]# yum […]

We can compare a filesystem to a refrigerator, or any other storage with multiple shelves that is used for storing different items. These shelves or compartments help us to organize grocery items in our refrigerator by certain characteristics, such as shape, size, type, and so on. The same analogy is applicable to a filesystem, […]

how install wordpress in lampp server centos

Install Lempp If Don’t how install Lampp server see this tutorial Creating WordPress MySQL Database Our WordPress will require a database and a database user. To create one, simply use the following commands. Feel free to replace the database name, user and password as per your preferences: # mysql -u root -p […]

Step 1: Log in to your WHM. Step 2: Click the Package icon. You can also find this section by searching for the word “package” in the search bar Step 3: Go to Add a Package. Step 4: Type a name for Package. Step 5:  Select the desired amount of resource in Package. Step […]

Hostingaro

About cPanel cPanel is a convenient application that allows users to administer servers through a GUI interface instead of the traditional command line. Although the installation for cPanel is relatively simple, the script does take several hours to run. Notes Setup Before installing cPanel on our droplet, we need to […]

Introduction Like most other Linux distributions, CentOS 7 uses the netfilter framework inside the Linux kernel in order to access packets that flow through the network stack. This provides the necessary interface to inspect and manipulate packets in order to implement a firewall system. Most distributions use the iptables firewall, which uses the netfilter hooks to […]

Introduction Any service that is exposed to the internet is susceptible to attacks from malicious parties. If your service requires authentication, illegitimate users and bots will attempt to break into your system by repeatedly trying to authenticate using different credentials. A common example of this is with SSH, which will […]

Introduction While connecting to your server through SSH can be very secure, the SSH daemon itself is a service that must be exposed to the Internet to function properly. This comes with some inherent risk and offers a vector of attack for would-be assailants. Any service that is exposed to […]