Categories

Dedicated Servers (25)

How to setup, configure and secure your dedicated server and applications

Developers (4)

Basic guides about HTML, PHP, .htaccess and MySQL Databases

DirectAdmin (22)

How to use the DirectAdmin control panel. For shared hosting and resellers

Domains and DNS (31)

Guides explaining the setup, registration, renewal and transfer of domains

E-Mail (20)

How to use your E-mail accounts, use webmail and protect yourself from spam

Other Services (14)

Information about uptime monitoring and server management solutions

Pre-Sales Info (7)

Answers to some of the most common sales questions.

Reseller Hosting (11)

Information specific to Reseller Web Hosting accounts.

SSL Certificates (26)

How to purchase and setup your SSL security certificates

VPS Accounts (30)

How to setup, configure and secure your Virtual Private Server

Web Hosting (22)

How to use your hosting account and upload files for your website

Your Account (19)

Subscriptions, payments, refunds and cancellations.

Most Popular Articles

 How to optimize Apache performance

Squeezing the most performance out of your Apache server can make difference in how your Web site functions and the impression it makes. Even fractions of a second matter, especially on dynamic sites. 1. Selecting the correct MPM...


 Installation CSF Firewall on CentOS

The guide below is applicable to systems running CentOS5, CentOS 6 and CentOS 7. The ConfigServer Security & Firewall is a popular open source Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and Security...


 Installation Rootkit Hunter (rkhunter) on CentOS

Rootkit Hunter (rkhunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. Rootkits are self-hiding toolkits secretly installed by a malicious intruder to allow that user to gain access to the...


 Installation Linux Malware Detect (Maldet) On CentOS

Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to...


 Installation of Directadmin on CentOS

In this guide I will be explaining how to install Direct Admin on a clean installation of CentOS 5, 6 and 7. The procedure is exactly the same on all three of these operating systems and with both 32-bit and 64-bit versions. It is very...