Search results

  1. Bhawani Singh

    Steps to Restoring Table Structure from frm and ibd Files

    Restoring Table Structure from frm and ibd Files InnoDB uses the ib_log file to recover the data. It also needs the ibdata1 file containing data dictionary and also some data pending in the table. The data dictionary is a duplicate system that is used for recording table structure and matching...
  2. Bhawani Singh

    [RESOLVED] MySQL Error : "Your Password does not satisfy the Current Policy Requirements"

    Error Your Password does not satisfy the Current Policy Requirements One can set many variables for validating a password. The password policy has to be strong if not you will get “Your Password does not satisfy the Current Policy Requirements” error when to try to set any password in MYSQL...
  3. Bhawani Singh

    A complete guide of Linux Top command

    A complete guide of Linux Top command Linux Top Command: Linux Top command is an interactive utility which displays the character-based screen of all processes that runs on the current system. Screen content can be sorted by characteristics like CPU usage and memory usage. The top command...
  4. Bhawani Singh

    Changing WordPress Address (URL) Through Database

    Changing WordPress Address (URL) Through Database WordPress Address (URL) holds the WordPress core files. In WordPress, SQL database is used to store all the data like posts, configuration and pages. In SQL tables, WordPress URLs should be changed if the WordPress website is changes to...
  5. Bhawani Singh

    Error "Failed to fetch zone file for 'domainname.com'"

    Error "Failed to fetch zone file for 'domainname.com'". DNS Zone is used for the administration of the DNS (Domain Name System) and it directs the domain traffic to the perfect locations. All the DNS records are kept in the DNS Zone. DNS zone of all the domains can be managed and edited using...
  6. Bhawani Singh

    Email Bounce: Retry Timeout Exceeded

    Email Bounce: Retry Timeout Exceeded Email Bounce: Retry Timeout Exceeded is the error message that is automatically created by mail delivery software. This permanent error message occurs when there is a problem in sending or receiving mail through the server. The message ID is added to...
  7. Bhawani Singh

    How to manually add DNS of new domain in Linux?

    Adding Domain to DNS Server: Every system in a network have an IP address and it is unique address of that particular machine. Similarly the website also has IP address but it is not used. Websites are referred by their names like google.com or facebook.com. It is very hard to remember IP...
  8. Bhawani Singh

    Transferring the website data from one cPanel to another remotely

    CPanel is the online website hosting control panel and it is Linux based. GUI and automation tools are used for simplifying the website hosting process. cPanel functions are virtual private server or dedicated server. It cannot be uninstalled easily and the server has to be reformatted for...
  9. Bhawani Singh

    Scheduling cron job under Linux or UNIX

    Adding Jobs To cron Under Linux or UNIX: Using cron the Linux and UNIX users can run their scripts and commands at the specified time and date. Scripts can also be scheduled. Corn is the mostly preferred tool for running system admin jobs and it will always executed in the background. It...
  10. Bhawani Singh

    Steps to Drop all tables in MySQL database

    MySQL: MySQL is the popular open source database with relational database management system. It is used by web-based application and its performance is high, reliable and it is very easy to use. Table contains set of elements with rows and columns. Creating the table is same as creating a...
  11. Bhawani Singh

    Steps to create software RAID 1

    Linux and RAID1: Linux is an operating system which is based on UNIX and it is an open source OS. RAID 1 is disk mirroring is reconstruction of data to two or more disks. Applications which need high availability and high performance use RAID 1. The data can be read from both the disk at the...
  12. Bhawani Singh

    How to prevent Brute Force attack on Joomla website with modsecurity rule?

    Block Brute force attack is a threat faced by web developers and this attack involves in guessing the password. Passwords are guessed with the combinations of symbols, letters and numbers. The current combinations has to be found and the guessing continues till that. Website that is in need of...
  13. Bhawani Singh

    Importing Pages and Posts between WordPress Websites

    WordPress allows the user to make dynamic blogs and websites and the contents can be edited very easily. Currently WordPress supports to import data in form of posts. It creates different roles for the users in the website like admin, editor, contributor and author. Importing pages and post from...
  14. Bhawani Singh

    Steps to change ASP session timeout from IIS 7

    ASP (Active Server Page) is a server-side technology used to build dynamic web pages. It is a technology used to execute scripts on the web server. When a server request for an ASP file, the ASP engine gets the request from the server and the ASP engine reads the ASP file. Then the server...
  15. Bhawani Singh

    Choose Let’s Encrypt in Plesk and Enjoy with Secured Data

    Today data privacy is somewhat challenging, especially in internet. Don’t worry. SSL/TLS Certificates protect sensitive data by encryption method. With valid SSL/TLS Certificate, SSL/TLS Certificate is required to protect data in internet. Thus, to provide security with Plesk and Plesk Mail...
  16. Bhawani Singh

    Reasons for Email Going To Spam Box and it’s Solution:

    Reasons for Email Going To Spam Box and it’s Solution: Actually 79% of commercial emails sent to Inbox. This means that few emails are sent to spam box or blocked. The emails going to spam box can be avoided using spam filter. There many reasons why the mail is not delivered to Inbox. The...
  17. Bhawani Singh

    Using Mac Email Programs Copy of a Mail is Left on the Server?

    Mail is an email client with the operation system macOs, iOS and others given by Apple Inc. Some email clients has a default setting to download the messages of the mail on the server. Settings on the email client is modified to keep the copy of the mail on the server. If multiple user access...
  18. Bhawani Singh

    TOP Command Examples in Linux

    Top Command is one of the important tool for system administrator. TOP command in LINUX displays the running process on the system and also the list of task which is currently managed by the server. It is a non- interactive command. System summary information as well as list of threads currently...
  19. Bhawani Singh

    Error "Your PHP installation appears to be missing the MySQL extension"

    PHP: PHP is an open source scripting language executed on the server and it is an important tool for making interactive and dynamic pages. It is widely used to develop the web based software applications and functionalities. It is mainly designed for web development. PHP code is embedded in...
  20. Bhawani Singh

    Steps to Flush DNS cache on Windows.

    What is DNS? DNS is also known as Domain Name System. It is mainly used for converting the URL into IP address. DNS is a root server. IP address are in the form of numbers and user will find difficult to remember all those number , so instead of remembering the number we can type the URL but the...
Top