Quantcast
Channel: Linux CPanel / WHM
Viewing all 101 articles
Browse latest View live

How To Unblock an IP Address in APF

$
0
0
Advanced Policy Firewall, or APF, is a software firewall commonly installed on  servers. It is an interface to iptables, which is standard software for managing network ports on Linux. Interacting with iptables can be complex, but APF greatly simplifies the process. APF is only accessible via ssh, and there is no way to make changes in APF through WHM or cPanel.

 Pre-Flight Check

  • These instructions are intended specifically for unblocking an IP Address in APF.
  • I’ll be working from a Liquid Web Core Managed CentOS 6.5 server, and I’ll be logged in as root.
  • For further details, see our in-depth look at the APF firewall.

Check APF for Your IP Address

Let’s say that you want to check whether or not a specific IP address, maybe 8.8.8.8 , is blocked by APF. That’s easy!

You may receive a result similar to:

/etc/apf/deny_hosts.rules:# added 8.8.8.8 on 04/25/14 13:42:01 with comment: {bfd.courier}
/etc/apf/deny_hosts.rules:8.8.8.8

The above means that BFD detected a brute force attack from the IP 8.8.8.8 on port 25, and automatically added a rule to APF to prevent future connections specifically from that IP address

Unblock an IP Address
If the IP address is denied in APF and you want to remove it, then use this command:

apf -u 8.8.8.8

If the command is successful, you should get a result similar to:

apf(12721): {trust} removed 8.8.8.8 from trust system

APF then needs to be restarted for the change to take effect:
apf -r

If you’d prefer a more advance firewall for APF, see our tutorial on how to install and configure CSF and its security plugin LFD (Login Failure Daemon).







How to install kloxo panel in centos

$
0
0
Go to below path.

    cd /usr/local/src

Use the wget Command to download latest version of Kloxo Auto Installer Script

    wget http://download.lxcenter.org/download/kloxo/production/kloxo-installer.sh

Give proper permission.


    chmod 777 kloxo-installer.sh

Install Kloxo control panel as Master.

    ./kloxo-installer.sh –type=master

Next follow the instructions. Once done you will get below message.

    Congratulations. Kloxo has been installed succesfully on your server as master

    You can connect to the server at:
    https:/IP/:7777 – secure ssl connection, or
    http:/IP/:7778 – normal one.

    The login and password are ‘admin’ ‘admin’. After Logging in, you will have to
    change your password to something more secure

    We hope you will find managing your hosting with Kloxo
    refreshingly pleasurable, and also we wish you all the success
    on your hosting venture

    Thanks for choosing Kloxo to manage your hosting, and allowing us to be of
    service



Once you will get the above message then try accessing above link in browser. If still you are unable to access it then try adding port in iptables.

You can use one of the below command to enable port in iptables:

    iptables -A INPUT -p tcp -m tcp –dport 7777:7778 -j ACCEPT

or

    iptables -A INPUT -p tcp -m tcp –dport 7777 -j ACCEPT
    iptables -A INPUT -p tcp -m tcp –dport 7778 -j ACCEPT

Once done restart the iptables.

    /etc/init.d/iptables restart

How to Configure Multiple shared IP’s in WHM

$
0
0
It is not possible to add multiple shared IP’s from WHM but it is possible to do it from SSH.

First of all we need to create a /var/cpanel/mainips/ directory if it is not present.

    mkdir /var/cpanel/mainips/

Then we have to create a file.

    vi /var/cpanel/mainips/root

Add all IP’s into it. save the file and quit.


    198.98.98.215
    198.98.98.216
    198.98.98.217
    198.98.98.218

Now login to WHM and check the IP’s

    Home>>IP Functions>>Show/Edit Reserved IPs





How to install WHMSonic in cpanel

$
0
0
Login to your server root SSH and copy/paste the following command fully and run it.

    cd /root/; rm -f installr.sh; wget http://www.whmsonic.com/setupr/installr.sh; chmod +x installr.sh; ./installr.sh



Sample installation output:

    ***********************************************************************
    * WHMSonic Setup v2.1.11 *
    ***********************************************************************
    WHMSonic installer is now installing the latest version. This may take a few minutes, please wait…
    –2013-11-29 00:55:15– http://www.whmsonic.com/v2/setup/whmsonic.zip
    Resolving www.whmsonic.com… 67.228.53.90
    Connecting to www.whmsonic.com|67.228.53.90|:80… connected.
    HTTP request sent, awaiting response… 200 OK
    Length: 10530510 (10M) [application/zip]
    Saving to: `whmsonic.zip’


    WHMSonic installer is now installing the latest version. This may take a few minutes, please wait…
    Dear valued customer, WHMSonic v2.1.12 has been successfully installed, you can now access to WHMSonic at your WHM Root at the bottom of your left menu.
    If you have the CSF firewall installed on your server, it is updated for the radio ports by WHMSonic.

    Manuals – Tutorials: http://help.sonicpanel.com
    Technical Support: http://www.whmsonic.com/support/

    Best Regards
    SonicPanel INC

DDOS – How attack check

$
0
0
Whenever the load in the server increases due to a particular user in the server. Check the following:

You can check the user in top.

Find the domain owned by the user:

    grep username /etc/userdomains

use the following command after you get the domain name:

    less /usr/local/apache/domlogs/domain.com | awk ‘{print $1}’ | sort | uniq -c | sort -n


This will give the ip and number of connections in the descending order. For example:

109.87.146.129
177.103.142.33
199.15.233.164
5.249.162.52
199.115.229.73

In the above case we can see too many connections from those ips. This is surely abnormal. Immediately block such ips in the server using csf or block that ips in hosts.deny.

How to install Malware Detect (Maldet) for CentOS 6 / Linux

$
0
0
Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for detection. In addition, threat data is also derived from user submissions with the LMD checkout feature and from malware community resources. The signatures that LMD uses are MD5 file hashes and HEX pattern matches, they are also easily exported to any number of detection tools such as ClamAV.

There is nothing complicated in installation process, but root access to your server is required. 
Installation via SSH

cd /usr/local/src/
wget http://www.rfxn.com/downloads/maldetect-current.tar.gz
tar -xzf maldetect-current.tar.gz
cd maldetect-*
sh ./install.sh or sudo sh ./install.sh
maldet --update-ver
maldet --update

To scan a folder, for example /home you should type maldet -a /home.



Now that LMD is installed, you need to open the configuration file located at /usr/local/maldetect/conf.maldet (with your favorite editor ie vi,nano etc ). The configuration file is fully commented so you should be able to make out most options but lets take a moment to review the more important ones anyways.

email_alert
This is a top level toggle for the e-mail alert system, this must be turned on if you want to receive alerts.

email_addr
This is a comma spaced list of e-mail addresses that should receive alerts.

quar_hits
This tells LMD that it should move malware content into the quarantine path and strip it of all permissions. Files are fully restorable to original path, owner and permission using the –restore FILE option.

quar_clean
This tells LMD that it should try to clean malware that it has cleaner rules for, at the moment base64_decode and gzinflate file injection strings can be cleaned. Files that are cleaned are automatically restored to original path, owner and permission.

quar_susp
Using this option allows LMD to suspend a user account that malware is found residing under. On CPanel systems this will pass the user to /scripts/suspendacct and add a comment with the maldet report command to the report that caused the users suspension (e.g: maldet –report SCANID). On non-cpanel systems, the users shell will be set to /bin/false.

quar_susp_minuid
This is the minimum user id that will be evaluated for suspension, the default should be fine on most systems.
The rest of the options in conf.maldet can be left as defaults unless you clearly understand what they do and how they may influence scan results and performance.
Usage & Manual Scans
The usage of LMD is very simple and there is a detailed –help output that provides common usage examples, I strongly recommend you check the –help output and spend a few minutes reviewing it.
The first thing most users are looking to do when they get LMD installed is to scan a certain path or series of paths.

[An important note is that LMD uses the ‘?’ character for wildcards instead of the ‘*’ char.]
In the below examples I will be using the long form flags but they are interchangeable with the short form flags (i.e: –scan-recent vs. -r).

If we wanted to scan all user public_html paths under /home*/ this can be done with:
root@server[~]# maldet –scan-all /home?/?/public_html
 
If you wanted to scan the same path but scope it to content that has been created/modified in the last 5 days you would run:
root@server[~]# maldet –scan-recent /home?/?/public_html 5
 
If you performed a scan but forget to turn on the quarantine option, you could quarantine all malware results from a previous scan with:
root@server[~]# maldet –quarantine SCANID
 
Similarly to the above, if you wanted to attempt a clean on all malware results from a previous scan that did not have the feature enabled, you would do so with:
root@server[~]# maldet –clean SCANID
If you had a file that was quarantined from a false positive or that you simply want to restore (i.e: you manually cleaned it), you can use the following:
root@server[~]# maldet –restore config.php.2384
root@server[~]# maldet –restore /usr/local/maldetect/quarantine/config.php.2384
 
Once again, I encourage you to fully review the –help output for details on all options and the README file for more details on how LMD operates.
You can also do the Daily scan by seetting the cron :-

Daily Scans
The cronjob installed by LMD is located at /etc/cron.daily/maldet and is used to perform a daily update of signatures, keep the session, temp and quarantine data to no more than 14d old and run a daily scan of recent file system changes.

The daily scan supports Ensim virtual roots or standard Linux /home*/user paths, such as Cpanel. The default is to just scan the web roots daily, which breaks down as /home*/*/public_html or on Ensim /home/virtual/*/fst/var/www/html and /home/virtual/*/fst/home/*/public_html.

That's it!

How to install CHKRootkit

$
0
0
Install CHKROOTKIT
Product Name: CHKROOTKIT
Product Version: 0.49
Homepage: http://www.chkrootkit.org/

Description: chkrootkit (Check Rootkit) is a common Unix-based program intended to help system administrators check their system for known rootkits. It is a shell script using common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures and for comparing a traversal of the /proc filesystem with the output of the ps (process status) command to look for discrepancies.
It can be used from a “rescue disc” (typically a LiveCD) or it can optionally use an alternative directory from which to run all of its own commands. These techniques allow chkrootkit to trust the commands upon which it depends a bit more.

There are inherent limitations to the reliability of any program that attempts to detect compromises (such as rootkits and computer viruses). Newer rootkits may specifically attempt to detect and compromise copies of the chkrootkit programs or take other measures to evade detection by them.
Step 1: Downloading and Installing it:

cd /usr/local/src
wget ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz
wget ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.md5 md5sum -c chkrootkit.md5
tar -zxvf chkrootkit.tar.gz
mkdir /usr/local/chkrootkit
mv /usr/local/src/chkrootkit*/* /usr/local/chkrootkit
cd /usr/local/chkrootkit
make sense Step 2: Adding program to daily cron job
There you go! should be installed, and you will get a mail daily with a status on your system

nano -w /etc/cron.daily/chkrootkit.sh Step 2.1: Add this text to the chkrootkit.sh file
#!/bin/sh
(
/usr/local/chkrootkit/chkrootkit
) | /bin/mail -s 'CHROOTKIT Daily Run (PutServerNameHere)' your@email.here Remember to change PutServerNameHere and your@email.here
Step 2.2: Chmodding chkrootkit


chmod 700 /etc/cron.daily/chkrootkit.sh Optional config 1: Make the content of the email report focus on possible threats only

nano -w /etc/cron.daily/chkrootkit.sh Add a -q after the /usr/local/chkrootkit/chkrootkit line

usr/local/chkrootkit/chkrootkit -q

That's it!

Enableing passive mode in FTP server with CSF firewall

$
0
0
Passive mode is always very important for ftp servers, if you are running csf firewall and cannot connect to ftp server then it means that range of passive ports is blocked in firewall. Here are simple steps

1) Add Passive Port range 30000-350000 to your Pureftp or Proftp configuration file

i) For Pure FTP

open /etc/pure-ftpd.conf, and this line

PassivePortRange    30000 35000

ii) For pro FTP

Open /etc/proftpd.conf, and add this line

PassivePorts    30000 35000

iii) Now add these ports in CSF config

Open /etc/csf/csf.conf

# Allow incoming TCP ports
TCP_IN = "20,21,22,25,53,80,110,30000:35000"

iv) restart csf and ftp

service csf restart
service pureftpd restart (or)
service proftpd restart

Now you will not get error while connecting to ftp
That's it!

Different ports used on cPanel server

$
0
0
Here is the list of different ports used on cPanel server:-

20 –> FTP (Inbound/Outbound,TCP/UDP)
21 –> FTP (Inbound/Outbound,TCP/UDP)
22 –>SSH (Inbound,TCP)
25 –>SMTP (Inbound/Outbound,TCP)
26 –>SMTP (Inbound/Outbound,TCP)
37 –>RDATE (Outbound,TCP)
43 –>WHOIS(Outbound,TCP)
53 –>DNS (Inbound/Outbound,TCP/UDP)
80 –>HTTP (Inbound/Outbound,TCP)
110 –> POP3(Inbound,TCP)
143 –>IMAP4(Inbound,TCP)
443 –>HTTPS(Inbound,TCP)
465 –>SMTP (TLS/SSL)(Inbound/Outbound,TCP/UDP)
873 –> RSYNC(Outbound,TCP/UDP)
993 –>IMAP4 (SSL)(Inbound,TCP)
995 –>POP3 (SSL)(Inbound,TCP)
2082 –>CPANEL(Inbound,TCP)
2083 –>CPANEL (With SSL)(Inbound,TCP)
2086 –>WHM (Inbound,TCP)
2087 –>WHM (With SSL)(Inbound,TCP)
2089 –>cPanel licence(Outbound,TCP)
2095 –>WEBMAIL(Inbound,TCP)
2096 –>WEBMAIL (With SSL)(Inbound,TCP)
3306 –>MYSQL (Inbound/Outbound,TCP)

How to disable PHP functions per domain?

$
0
0
If you want to disable the PHP functions  for a particular  domain, just put the following entry in the .htaccess corresponding to the domain.

php_flag engine off

You may also put the following entry in the virtual host entry  in httpd.conf corresponding to the domain.

php_admin_flag engine off

Restart httpd once this is done.

mod_security: Access denied eror code 403

$
0
0
You may get the following error in Apache logs:-

===================================================
mod_security: Access denied with code 403. Error reading request body, error code 70007:

The timeout specified has expired
===================================================
Fix:-

1. Open the Apache configuration file

root@server1 [~]#vi /usr/local/apache/conf/httpd.conf

2. Change the  Timeout value to 300

3. Restart Apache service.

root@server1 [~]# /etc/init.d/httpd restart

Issue will be fixed.

How to redirect webmail.domain.com to domain.com/webmail?

$
0
0
Here is the steps:-

Make changes to zone db ( Ie /var/named/domain.com.db)
create a subdomain webmail
entry wil be like this

    ==========================
    domain.com. IN A 64.20.54.242
    localhost.domain.com. IN A 127.0.0.1
    domain.com. IN MX 0 domain.com.
    mail IN CNAME domain.com.
    www IN CNAME domain.com.
    ftp IN A 67.20.54.242
    cpanel IN A 67.20.54.242
    whm IN A 67.20.54.242
    webmail IN A 67.20.54.242
    webdisk IN A 67.20.54.242
    ======================

Put the following rule in subdomain folder ( virtual subdomain which doesnmt have entry in httpd.conf file

ie /home/domain/public_html/webmail directory

    ==================================
    RewriteEngine on
    RewriteCond %{HTTP_HOST} ^webmail.domain.com$ [OR]
    RewriteCond %{HTTP_HOST} ^www.webmail.domain.com$
    RewriteRule ^.*$ “http\:\/\/domain\.com\/webmail” [R=301,L]
    ==================================

How to catch spammer or Scammer in Cpanel server?

$
0
0

1. Open exim.conf
pico /etc/exim.conf

2) Find this;
Ctrl + W: hostlist auth_relay_hosts = *

#########################
Runtime configuration file for Exim #
#########################

3) After hostlist auth_relay_hosts = *

add the following

log_selector = +address_rewrite +all_parents +arguments +connection_reject +delay_delivery +delivery_size +dnslist_defer +incoming_interface +incoming_port +lost_incoming_connection +queue_run +received_sender +received_recipients +retry_defer +sender_on_delivery +size_reject +skip_delivery +smtp_confirmation +smtp_connection +smtp_protocol_error +smtp_syntax_error +subject +tls_cipher +tls_peerdn
4) The final result should look like this

hostlist auth_relay_hosts = *

log_selector = +address_rewrite +all_parents +arguments +connection_reject +delay_delivery +delivery_size +dnslist_defer +incoming_interface +incoming_port +lost_incoming_connection +queue_run +received_sender +received_recipients +retry_defer +sender_on_delivery +size_reject +skip_delivery +smtp_confirmation +smtp_connection +smtp_protocol_error +smtp_syntax_error +subject +tls_cipher +tls_peerdn

#######################################
# Runtime configuration file for Exim #
#######################################

5) Save and restart exim DONE!
ctrl + X then Y
/etc/init.d/exim restart

Now tail your log and watch the show!
tail -f /var/log/exim_mainlog

Customize your default apache page in cpanel

$
0
0
You just have to login to your server via ssh.
Navigate to /usr/local/apache/htdocs

    # cd /usr/local/apache/htdocs

And finaly edit the file index.html

    # nano index.html

If you list the content of /usr/local/apache/htdocs you will see that you can also modify the content of other error pages that cpanel’s apache outputs.

End you are done

How to Setup Minecraft on a Linux CentOS Server

$
0
0
Installation
============
Installation is quite straightforward:

rm -fv csf.tgz
wget http://www.configserver.com/free/csf.tgz
tar -xzf csf.tgz
cd csf
sh install.sh

Next, test whether you have the required iptables modules:

perl /usr/local/csf/bin/csftest.pl

Don't worry if you cannot run all the features, so long as the script doesn't
report any FATAL errors

You should not run any other iptables firewall configuration script. For
example, if you previously used APF+BFD you can remove the combination (which
you will need to do if you have them installed otherwise they will conflict):

sh /usr/local/csf/bin/remove_apf_bfd.sh

That's it. You can then configure csf and lfd by reading the documentation and
configuration files in /etc/csf/csf.conf and /etc/csf/readme.txt directly or
through the csf User Interface.

csf installation for cPanel and DirectAdmin is preconfigured to work on those
servers with all the standard ports open.

csf auto-configures your SSH port on installation where it's running on a non-
standard port.

csf auto-whitelists your connected IP address where possible on installation.

You should ensure that kernel logging daemon (klogd) is enabled. Typically, VPS
servers running RedHat/CentOS v5 have this disabled and you should check
/etc/init.d/syslog and make sure that any klogd lines are not commented out. If
you change the file, remember to restart syslog.

See the csf.conf and readme.txt files for more information.


Webmin Module Installation/Upgrade
==================================

To install or upgrade the csf webmin module:

Install csf as above
Install the csf webmin module in:
  Webmin > Webmin Configuration > Webmin Modules >
  From local file > /usr/local/csf/csfwebmin.tgz > Install Module


Uninstallation
==============
Removing csf and lfd is even more simple:

cd /etc/csf
sh uninstall.sh


GD::Graph
=========
This perl module is required for Statistical Graphs available from the csf UI.
It is dependent on garphical libraries being installed for your OS (e.g.
libgd, libpng, etc. which is beyond the scope of this document)

The perl module itself can be installed in a variety of ways, e.g.:

RedHat/CentOS/CloudLinux:
# yum install perl-GDGraph

Debian v6:
# apt-get install libgd-graph-perl

Direct from cpan.org:
# perl -MCPAN -e shell
cpan> install GD::Graph

How to Block an IP Address on a Linux server

$
0
0
To block an IP on your Linux server you need to use iptables tools  and netfilter firewall. First you need to log into shell as root user. To block an IP address you need to type the iptables command as follows:

# iptables -A INPUT -s IP-ADDRESS -j DROP

Replace IP-ADDRESS with your actual IP address. For example, if you wish to block an ip address 103.575.713.93 for whatever reason then type the command as follows:

# iptables -A INPUT -s 103.575.713.93 -j DROP

If you have IP tables firewall script, add the above rule to your script.If you just want to block access to one port from an ip 103.575.713.93 to port 22 then type command:

# iptables -A INPUT -s 103.575.713.93 -p tcp --destination-port 22 -j DROP

CentOS / RHEL / Fedora Block An IP And Save It To Config File

Type the following two command:

# iptables -A INPUT -s 103.575.713.93 -j DROP
# service iptables save

How to replace MySQL with MariaDB in cpanel

$
0
0
MariaDB is an enhanced drop-in replacement for MySQL. MySQL 5.1 is compatible with MariaDB 5.1, 5.2 and 5.3. MySQL 5.5 is compatible with MariaDB 5.5.

Make sure to save all existing data just in case there are any issues.

    cp -Rf /var/lib/mysql /var/lib/mysql-old
    mv /etc/my.cnf /etc/my.cnf-old

Disable the targets so cPanel no longer handles MySQL updates

The following will mark the versions of MySQL we distribute as uninstalled so they are no longer maintained by cPanel/WHM

    /scripts/update_local_rpm_versions –edit target_settings.MySQL50 uninstalled
    /scripts/update_local_rpm_versions –edit target_settings.MySQL51 uninstalled
    /scripts/update_local_rpm_versions –edit target_settings.MySQL55 uninstalled

Remove existing MySQL RPM’s so theres a clean slate for MariaDB

The below command will uninstall the MySQL RPM’s!

    /scripts/check_cpanel_rpms –fix –targets=MySQL50,MySQL51,MySQL55

Create a yum repository for MariaDB

    vi /etc/yum.repos.d/MariaDB.repo

place the following inside of it depending on the DISTRO (https://downloads.mariadb.org/mariadb/repositories/):

    [mariadb]
    name = MariaDB
    baseurl = http://yum.mariadb.org/5.5.29/centos6-amd64/
    gpgkey=https://yum.mariadb.org/RPM-GPG-KEY-MariaDB
    gpgcheck=1

Remove php from the /etc/yum.conf file then run the following commands

    yum install MariaDB-server MariaDB-client MariaDB-devel
    /etc/init.d/mysql start
    mysql_upgrade
    /etc/init.d/mysql restart

Add php back to the /etc/yum.conf file to ensure future php updates don’t get clobbered

Rebuild easyapache/php to ensure modules are intact/working

    /scripts/easyapache –build

 

Unable to establish a PHP session – PHPMyAdmin error

$
0
0
PHPMyAdmin error

Do you ever come across the following error when you access PHPMyAdmin from cPanel.
Access Denied Unable to establish a PHP session. If you believe that this is in error or inadvertent, contact your system administrator and ask them to review your server settings.


Normally, you will get this error when the permission or ownership of the tmp folder for this user is wrong. That is, make sure the ownership of /home/$username/tmp folder has ownership set to $user and permission as 755. If it is not, you will face the same problem.
Solution:

1. SSH into the server as root.

2. Check the permission and ownership of /home/$user/tmp folder. Set ownership as $user.

# chown $user. /home/$user/tmp

3. Set permission of the tmp folder to 755.

#chmod 755 /home/$user/tmp

That’s it!!!

$user can be replaced with your respective username.

How to change main domain of a cPanel reseller account with an existing domain name?

$
0
0
 Here are some tips on cPanel reseller account modification. It’s quite simple if the new domain you wish to set as primary of your WHM re-seller is not under the same account. It can be simply managed from the “Modify an Account” section. You can simply modify the account information from this location. As it is a re-seller, you must do the following steps after modifying the account.

    Make sure that;You do not want the current domain and data. If you need it, please take backups.
    Change reseller ownership of all accounts under that reseller to the new username.
    Check resellers name-servers, if they are using their own.
    Switch reseller priveliges to new user.
    And so on.

Here I am listing some steps to changing the reseller main account that I have done few days ago for a client. His actual requirement is:

"Change the cPanel reseller account's main domain to an already existing domain under his reseller account"



Example:
He wants to set up “nextdomain.com” (already existing under his re-seller account) as main domain for his re-seller account. Also, wanted to terminate the current main domain “currentdomain.com”.
Steps:

1, I created a backup of “nextdomain.com” (The domain he actually wants to set as main domain).
2, Terminated that account “nextdomain.com” (To avoid conflict when modifying the existing domain with new).
3, Modified the existing account with new domain name, I didn’t changed the $user name. The user name change will cause problem with all his accounts’ ownership and its little complex.
4, Replaced the “public_html” contents with the data from the backup I created.
5, Also, replaced the “email” folders with new.
6, As it was a WordPress site, created a database and restored it from the backup. (Need to edit the username details in database, makes sure that you have made the necessary changes in Site URL and home in your WordPress database).

That’s it…!!

How to reboot cpanel/whm in ssh

Viewing all 101 articles
Browse latest View live