Browsing Category:

Tutorials

Convert any website to WordPress

As you all know that WordPress is the leading open source content management system (Mainly used for blog) and many prefer this due to the easy management as well as the coding is so simple. WordPress is the popular CMS around the world. Many users use this, even big companies use for managing their websites and blogs.Today I would be showing you to convert any website to a WordPress theme. It's simple as long as you read this tutorial properly and do as I say.So, In this tutorial, I would be Read more
July 15, 2012
/

Tips for Server Admins & Website Owners

I have been writing a lot of tutorials about software installations, server security and lots, but I haven't told about tips to keep in mind while managing a server right? Well here it is! This is about you guys who manages servers by yourself. Backup Always always always backup your server and websites, we cannot actually predict when the server crashes or hacked. If you don't have a proper backup solution which is ready to restore your websites at any time, then you would be in trouble!If you Read more
July 9, 2012
/

Monitoring Usage in Linux Server

Now I would tell you some basic command which well help you monitor your server.VZ ParametersOn a Virtuozzo VPS you can output your usage of the VZ parameters. You should pay most attention to oomguarpages and privmpages. Anything with a failure is generally bad! cat /proc/usr_beancounters Apache ConnectionsIf you have experience in Server Administrator task, you surely have a headache on the Apache connections when it is getting tons of connections to the server!Grep port 80 (web services Read more
July 9, 2012
/

How to install Root kit checker

Now i would teach you how to install Root kit and scan manually or automatically (Using cron jobs). This what basically does is that it will allow you to check if there is anyone who has hacked your server or not.How does Hackers or Spammers done this?Well basically hackers and spammers will try to find insecure upload forms on your/clients' websites and then with injection methods, try to upload the root kit on your server.What happens then?If the hacker/spammer can run it, it will modify Read more
July 9, 2012
/