≡ Menu

404 Page after Create New Cpanel Account

In a cPanel/WHM server, when you create a new account When you create a new account, while awaiting the propagation dns of your new domain, you can access your domain temporarily – this can be achieved by

But, when tried this it shows:

Feel free to check Apache mod_userdir Tweak in CPanel / WHM

The fix for this is, login to WHM.

Under Security > Security center > Apache mod_userdir Tweak

You may see the checkbox (Enable mod_userdir Protection) ticked, uncheck it and save.

Now, try accessing the temporary URL. It should work.

{ 0 comments }

Differences CHMOD 777 and 755

chmod function to change the permissions mode in linux/unix. If you use the chmod 777 or 755 using octal mode. Actually, a number above the sum of the symbol mode.

symbol mode radio scripts free

r = read = 4 -> permissions for the right to read
w = write = 2 -> permissions for the right to write
x = execute = 1 -> permissions for the right to execute/run the executable file

so if 777 = rwxrwxrwx
while 755 = rwxr-xr-x

The first three columns rwx-permissions owned by the owner stating the file / directory.
three-column-two states rwx permissions owned by a group of ownernya. Owners have a user group ..
-three-column “rwx” third states which are owned by other permissions, meaning here other than the owner and group.

{ 0 comments }
FLER - ThemeForest Modern, Simple & Elegant All-use WordPress Theme

FLER combines what’s best in usability with its modern and elegant design and its administrator panel features. Fler has over more than 100 shortcodes all of which are directly embedded in the visual editor. No more going back to the documentation to see shortcodes.

Main Features :

* DDPanel
* 100+ shortcodes embedded in the visual editor of wordpress
* Fleixible pages. No more lame portfolio templates. Mount your portfolio page the way YOU want it to be like.
* Interactive custom fields.
* Modern and elegant design
* WordPress Custom Post Types
* Fully customized theme
* timthumb integration
* MUCH MORE

DETAIL INFO

LIVE DEMO

[onlymembers]
DOWNLOAD LINK
http://www.uploadstation.com/file/Dy3AWZd/flerWP.rar
http://www.filesonic.com/file/461088571/flerWP.rar
http://www.fileserve.com/file/FSphqEU/fler.rar
[/onlymembers]

{ 0 comments }

BlogSkin Skin for WordPress Thesis Theme

BlogSkin for Thesis Theme

BlogSkin is a Skin for WordPress thesis theme comes with our Awesome Options Control Panel for Thesis Theme, it makes it super easy to control every single feature of your blog with a few clicks. There are 18 schemes and variations that you can switch between them with a simple drop list in your option panel, plus a lot of other control over your logo image and custom RSS feed URL and email subscription E.G.

What’s inside the options panel?

* General Options
* Social Media Options
* Multi-Author Options
* Geeky Options
* Advertising Options
* Opt-in Forms
* Footer Options

MORE INFO

LIVE DEMO

[onlymembers]
DOWNLOAD LINK
http://www.filesonic.com/file/335779571/BlogSkin.rar
[/onlymembers]

BlogSkin Skin for WordPress Thesis Theme

{ 0 comments }

3 SEO Tips for Bing Search Engine

While Google remains a search engine that dominates the market, the threat from other search engines should not be underestimated.

Other search engines are like Bing from Microsoft, it could someday become Google‘s biggest enemies.

Bing could be a threat partly because of their aggressive campaign to spend 80-100 million dollars to fulfill his ambitions shifted Google.

Plus Microsoft’s aggressive promotions that are behind Bing, requires people who are involved in online business have to pay attention to this search engine.

Bing birth sparked a lot of questions in the minds of many people such as:

“What happened to the website that is optimized for Google?”, “What is the difference Bing from Google when running a campaign ad?”, “Will there be panic?”,” Should we start optimizing a website for Bing? ”

Bing is very different from Google and Yahoo, both in the way of page rank and way of presenting search engine results.

The difference between Bing and Google reminded again of what happened in the 90’s where an online marketer must create a separate page optimized for different search engines, each for Google, Yahoo, Lycos, and AltaVista.

While there is no certainty what will happen in the future, better prepare for the worst by familiarizing yourself with the SEO Bing as early as possible.

Here are some SEO strategy that can be used to Bing:

1. Has a domain with an older age.

Bing gave more value to domains that were older than the domain under the age of six months.

2. Make the title of creative and interesting articles.

Just like other search engines, Bing also be impressed by the articles that have interesting titles.

3. Create an article at least 300 words.

Bing tend to prefer a longer article. So try only articles on your website have at least 300 words long.

{ 0 comments }

Secure Servers With CSF (CentOS & cPanel)

Talking about Secure Servers With CSF Config Server Firewall, Not unlike the place we live in the real world, the existence of a server is also often the target of bad people who generally want to disrupt the stability and safety. Departing from this, then comes an application called a firewall to secure a server from external attacks. There are some names firewall applications are known, one of which is CSF (ConfigServer Security & Firewall). As the name implies, this application is in charge of securing the existence of a system from the types of attacks that can destabilize the server. One of the advantages CSF from similar applications is ease of installation and configuration. Therefore, in this article I will present a guide to integrate the CSF as a firewall on your server or VPS account.

Perl Module Integration

CSF requires library of Perl modules, so be sure to integrate into your system first.

If your operating system is CentOS, execute the following commands through the console to know the perl installation packages are available.

After that continue with the integration of the Perl modules required. Still through the console, execute the command below to do so and wait until the installation process is complete.

Installing CSF

After a Perl module available in the system, now you can proceed to the installation phase CSF. Check out a few steps below.

Go to your working directory, then download the installer package it CSF.

Unloading a file compression CSF and into the extraction directory.

Integrate CSF into the system, then test the results of the installation.

Configuring CSF

Done with the installation stage and the CSF has been running in test mode (Testing). For that, the next step is to configure the CSF.

Use any text editor available on the system, then edit the configuration files CSF.

Make sure the testing option is turned off by giving the value 0.

For CSF automatically update the latest release version if there is, switch it auto updates.

For passive FTP session handling, also define the port ranges are allowed in the TCP_IN.

CSF is also equipped with LFD (Login Failure Detection), which served to detect and block the process of login error that exceeds the requirement.

Some other options you can switch on and set the configuration as needed. Be sure to save the configuration upon completion.

Apply the latest configuration of the system by repeating the daemon CSF.

Operate CSF in Console

Latest configuration has been implemented and now your system is protected by CSF which acts as a firewall. In addition to configuration, you can also execute some commands congenital CSF. For example, you get an IP address that disrupt the system for activities PING constantly keep your system becomes busy (POD – Ping of Death).

For example the handling of the case above, you can just reconfigure in the CSF for ignore ICMP protocol request. But if you just want to deny ICMP request from a certain IP address only, then you can also define it using the internal command CSF.

With a simple command above, the system will reject all request from IP address 123 123 123 123. It is marked with the-d parameter which stands for Deny (Reject). Be sure to repeat the daemon CSF CSF-r command every time you make changes.

Note: To find out the internal commands CSF and its function, please CSF followed by execution command button presses [enter] on the keyboard.

Integrate CSF in cPanel

It can be used in environments CLI (Command Line Interface), CSF can also collaborate with cPanel. CSF will be recognized as one of the intake (Plugins) WHM after finish integrated into the system. That way, you also can configure via a browser.

Use any browser to visit the WHM, and then do the validation account.

Arriving at the WHM main menu, scroll down and click on the option [Plugins] for all existing intake WHM displayed.

Click the option [ConfigServer Security & Firewall] and not long ago all the features associated with the CSF is presented.

Similar to the CLI mode, you can also configure the CSF through the [Firewall Configuration]. Also try measuring your system’s security level using the [Check Server Security] which will calculate the level of server security and view reports with the score. Through the report also can you see anywhere that still must be addressed for the server more secure.

Conclusion

After knowing and learn article above, would now not have to worry anymore to integrate CSF to VPS or server system. With a variety of features that are reliable, simple configuration, easy operation, compatible with cPanel and free licensed. Why wait? Immediately reinforce your system using CSF now. Next you can simply sit back and allow the CSF on guard.

{ 0 comments }