Search results

  1. K

    Do you know the way to resolve “403 forbidden request forbidden by administrative rules’?

    403 errors are completely different from other types of errors. You may go through a greater number of solutions at the same time. None of them would retrieve the exact solution as you think. It may lead to a broken website sometimes so; you don’t want to cross that situation right! Let’s start...
  2. K

    User Password Expiration and Aging Management in Linux

    Passwords are crucial to maintaining safety and integrity of a system. As a Linux administrator, managing password is one of the core tasks. With password expiration, you force users to change their password. Password aging is similar to expiration except that you force users to change their...
  3. K

    Adding/Removing a User from a Group in Linux

    Linux allows multiple users to connect to it and work in collaboration. Hence it, by default, is a multi-user system. Managing all the users is a fundamental task for any Linux admin. User management involves everything from creating users, to managing their privileges to removing them when not...
  4. K

    Switching (SU) to another User Account Without Password: A Complete Guide

    When making a switch from one user account to another in Linux, you need to provide a password for authentication purposes. By default, only the superuser could do it, while the rest of the users would have to provide the password. But what if you could skip inputting the password and make...
  5. K

    A Complete Guide to Forcing cp Command to Overwrite without Confirmation

    cp Command (or the copy command) is used for copying files and/or directories from one location to another in Linux. It is a quite common command. If you’ve been using it for a while, you should be familiar with the overwriting scenario. Under usual circumstances, it overwrites destination files...
  6. K

    Converting PDF Files to Image Files Using Linux Command Line

    If you need to convert a PDF file or multiple PDF files to image file format like JPG or PNG, then you can do so using the Linux Command Line. No need to invest money in expensive software that do the same. Linux has a tool called pdftoppm that does the job for you. In this article, learn how to...
  7. K

    Check the Processes Listening on a Given Port in Linux (3 Ways)

    Ports are an important element of communication among apps and software. They serve as an endpoint for communication. In the case of an operating system like Linux, a port is a logical construct that recognizes a particular process or a network service. At any given point in time, there might be...
  8. K

    Here’s how to Make Files and Directories Undeletable in Linux Even by Root User

    There are certain files and directories that are of utmost important. Losing them can be catastrophic for a person or business. In Linux, root accounts have the capability to delete any file as per their preference. To safeguard the files or directories, its best to make it undeletable even by...
  9. K

    Guide to Resolving the Plesk 503 Service Temporarily Unavailable Error?

    A 503 Service Error is a common type of error where the service remains temporariy unavailable. There are multiple reasons why you may get this error. In Plesk, this is what the error message reads: Service Unavailable. HTTP Error 503. The service is unavailable. When you check the error log...
  10. K

    No Database Selected Error: How to Fix During SQL File Import?

    SQL is a popular language used for managing servers and databases. If using an SQL database, you may come across this error called ‘No Database Selected’. As evident from the message, the problem occurs because there is no database selected prior to importing the SQL file. Fortunately, its not...
  11. K

    Restoring Database in SQL Server using .mdf and .ldf Files

    SQL is one of the most common programming in use for server and database. It can be used with any RDBMS to manipulate SQL database over the server. When managing a database, you may have the need -- at some point in time -- to restore it. Instead of a direct restore, you can use the .mdf file...
  12. K

    How to Quickly Fix the PhpMyAdmin Continuously Redirecting Error?

    When you try to access PhpMyAdmin, you may come across continuous redirect error. In such cases, you won’t be able to access the mysql database for a certain period of time. In most cases, the error is because of a corrupt ‘mysql’ database. If you check the error log in cPanel, you will find...
  13. K

    Solving the ClamD Service Failed to Start Issue

    ClamD is a really useful service to keep your servers safe from viruses. If you’re using a Linux server, you may come across the ClamD Service Failed to Start error. Here’s the exact error message you’re going to get: Startup Log LibClamAV Error: cli_tgzload: Invalid checksum for file daily.hsb...
  14. K

    Steps to resolve PhpMyAdmin redirecting issue

    PhpMyAdmin redirecting due to read-only /tmp – Hope, this is mainly because of the MySQL which works directly or indirectly to bring errors. Sometimes, PhpMyAdmin figures out the loop again and again by giving the warning message “The system will redirect you in a moment”. Why because MySQL...
  15. K

    How to fix the problem “Eximstats database is too large”?

    Are you struggling with the error Eximstats database is too large? One most common error will have occurred during the performance of the lower disk. /usr/local/cpanel/scripts/eximstats_spam_check The above script tends to load when you have lower performance on disk. There is a default...
  16. K

    Steps to check the location for Imagemagick

    To check the location for imagemagick: Login to server as root. After that run the below command: which convert In result you can get the path of imagemagick path.
  17. K

    Ways to restrict Remote Desktop Access

    To restrict RDP access you first have to open Windows Server control panel. First, open the Windows Server control panel. Go to System and Security And click on “Windows Defender Firewall” where you can find “Firewall configuration” option. Now click on “Advanced Settings” and then you will...
  18. K

    Steps to backup IIS configuration

    You can follow below steps: You have to click on Computer icon under IIS (Internet Information Services). Now click on “Action” and then select “Backup/Restore Configuration” option. Here you have to click on “Create backup” and enter the name of backup file. After that, click on “OK”. NOTE...
  19. K

    Here’s How to Fix Email deferred due to greylisting Error

    As an email user or administrator, you might be receiving dozens or scores of emails every day. But if some of the emails are being deferred, you might be missing out on some vital emails. Lets’s start with what is Email defer and greylising. Email defer is an instance when the email from a...
  20. K

    Fixing the Apache Error: Unable to open logs httpd CentOS

    When managing your Apache server, you may come across this error that reads: Apache Error: Unable to Open Logs It usually occurs when restarting Apache. You can find this error in the /var/log/httpd/error_log file. To fix this error, you can execute this command: echo $ulimi If it returns a...
Top