Category: Tutorials

Restricting Remote Desktop Access To Specific IP Addresses

Since most Windows Servers worldwide use Remote Desktop, it is a favored target for hacker / automated bots attacks: It is not uncommon for bots to attack RDP port of a Windows Server within minutes of a Windows Server coming online for the first time. You can protect your Windows Server from such attacks by […]

How to Install 3CX v20 on Debian 12 Linux on KVM Cloud

Installing 3CX v20 on Debian 12 system can be a straightforward process when you understand each step. This guide provides details on the commands used during the installation. Prerequisites Open a Terminal Session Access your Debian 12 cloud instance or VPC or VPS and open the terminal. This can usually be done by searching for […]

How to Start Using a Web Hosting Account

Starting with a web hosting account is an essential step in launching your online presence. Whether you’re setting up a personal blog, an e-commerce website, or a professional portfolio, a hosting account serves as the foundation. Here’s a comprehensive guide to help you get started: Step 1: Choose the Right Hosting Plan Before diving into […]

5 Linux commands to check free disk space

Keeping track of disk utilization information is on system administrators’ (and others’) daily to-do list. Linux has a few built-in utilities that help provide that information. Linux df command The df command stands for “disk-free,” and shows available and used disk space on the Linux system. df -h shows disk space in human-readable format df -a shows the file system’s […]

How to use a Private key for SSH authentication

What’s a private key? Even the most complex passwords cannot match the cryptographic strength of private keys. With SSH, private keys significantly improve security by relieving users of the burden of remembering complex passwords (or worse yet, writing them down). Let’s first Open a terminal and generate a private key. Step 1 : Check to […]

How to Disable SSH Password Authentication

As long as you use strong passwords, it is not necessary to disable SSH password authentication for your server; however, you can disable it if you would like. Before you proceed, keep these things in mind: You should only disable SSH password authentication if you are extremely familiar with public key authentication and understand the potential consequences of […]

Download and Install WordPress Via the Shell Over SSH and With WP-CLI

Installing WordPress often takes a lot of steps: downloading and uncompressing a zip file, uploading files to the server, and setting up the database and config. That can take a lot of time. Or you can do it by using the Fantastico or SimpleInstall utilities available via your host’s control panel. There is nothing wrong with […]

ISPConfig change port – How to change the default port

Why do we need to change the default port? Generally, we change ispconfig port to another for security reasons. By default we access the admin panel of Ispconfig via http://ip-addresss:8080. However, most often our customers prefer to change that port to another. A major benefit of changing the default port is that we can deter […]

3CX Outbound Rules – A Complete Example

Configuring Outbound Rules on 3CX Phone System is a very simple affair if you have a single device or service which you deliver calls with – in most cases a single rule will be enough. But the Outbound Rules in 3CX Phone System allows you to create much more complex rules – allowing you to […]

CredSSP Encryption Oracle Remediation

There is a critical security vulnerability found in the Credential Security Support Provider protocol (CredSSP) that could potentially lead to remote code execution. This vulnerability allows an attacker to intercept and relay user credentials, enabling them to execute malicious code on the targeted system. CredSSP serves as an authentication provider for various applications, making any […]