Common cPanel /Scripts

Solution Hello Guys! Here you can find some common cPanel scripts which are useful for the task given below. Common cPanel /Scripts Install Zend Optimizer /scripts/installzendopt Hostname A Entry Missing! /scripts/fixndc then restart bind and apache Install Cron on New Server /scripts/installrpm anacron vixie-cron ; /etc/rc.d/init.d/crond start Bandwidth issues /scripts/cleanbw

Access your database remotely on a cPanel hosting

First of all, it is important to explain how the database/database user names are formed. The names consist two parts — your cPanel username and the actual database/username name. For example — if your username is “user” and if you named your database “databasename” you should use: user_databasename Same for

Compress cPanel domlogs

Solution Before setting up compression of your logs, you will want to have cpanel run the stats as often as possible. This is so you do not miss any stats that would have been included, were your logs not compressed before stats run. To do this, login to WHM, and

Fix the MYSQL ERROR: Client does not support authentication protocol

Solution This error is encountered by both scripts and applications, that are unable to use the new authentication protocol introduced by MySQL 4.1.x. The only real fix for this, would be to update your code. There is however a workaround, that can be implemented. You will need to edit your

How do I access Spam Assassin?

Solution 1. Login to your control panel (https://www.yourdomain.com:8082) 2. Click on the “Mail” link. This will display “Mail Manager Main Menu” screen. 3. Click on “SpamAssassin“. This take you to the “Spam Message Filter Configuration” screen. 4. The “Current Status” box will tell you if Spam Assassin is currently enabled

How do I manage domain SSL Certificates?

Plesk enables you to upload a Secure Socket Layer (SSL) Certificate, generate a Certificate Signing Request (CSR), and/or generate a Self-signed Certificate. Each certificate represents a set of rules used when exchanging encrypted information between two computers. Certificates ensure secure communications; this is especially important when handling e-commerce transactions and

How do I manage anonymous FTP Access?

Within Plesk the Administrator, or Client given domain creation capabilities, can set up Anonymous FTP capabilities for a given virtual host. Anonymous FTP is used to allow an open, yet controlled, environment for visitors to the domain to download and/or upload files to and from the domain account. Users will

Checking Which Ports Are Open When the Firewall Is Activated

Linux firewall ports are used to allow or deny incoming or outgoing connections to a Linux system. Different firewall products have different commands or methods to open ports, such as iptables, ufw, or firewalld. The port number, protocol, and zone are usually required to specify which port to open. The

Unlock the Linux Plesk admin or a user login if it has been locke

Plesk will lock out accounts if multiple failed attempts to login are registered. The default is to lock accounts for 30 minutes after 3 failed attempts. Attempting to login with an account that has been locked out will result in an “Access Denied” pop up – even if the password

Try to log in to webmail for any domain it returns 404 error

This appiles to Plesk Windows version 7.5 This error means that web site webmail(default) responsible for webmail is misconfigured in IIS. To return it to working state you need to apply Plesk utility that will reconfigure webmail on the server. “%plesk_bin%\defpackagemng.exe” –fix –type=webmail