Articles

A non-delivery report is received A non-delivery report is a message that is sent by the mail server to the sender when the... Authorization protection wp-login.php (Password Protecting) To protect against password brute force for wp-login.php, you can use HTTP Basic Authentication.... CMS configuration file location If you have changed your MySQL access password or are transferring a new site, to connect your... Configuring popular CMS to work via the HTTPS protocol WORDPRESSTo configure HTTPS on cms WordPress, you need to go to the site’s administrative panel.... DNS has not yet been updated. How to access the site? Sometimes situations arise when a domain name has not yet been registered, DNS has not been... Deleting emails via the Roundcube web mail interface To delete letters, you should: 1) Select the letter you want to delete 2) Click on Delete, your... Do I need a dedicated IP address for my website with SSL? The "Virtual Hosting" and "Site Builder" services use SNI technology, which allows you to install... Do you have phpMyAdmin and how to get into it? Yes, sure. You can get to phpMyAdmin from the Control Panel, section "Databases". Do you provide SSH access? SSH access is provided on some tariff plans (Business, VIP and GURU). To provide ssh access, you... Do you provide anonymous FTP access? No Does the site take a long time to load? The loading speed of a site is, of course, one of the key factors in how a visitor evaluates a... Does your hosting support Flash technology? Flash videos are played on the client side, and not on the hosting provider's servers.Thus, the... Domain redirection (web forwarding) To use the “domain forwarding” service (web forwarding) Provided that you have a domain and... Error "Unknown collation utf8mb4 unicode 520 ci" when importing a database When transferring a site's database (DB) from one hosting to another, you may receive a... Error 403 (Forbidden, access denied) Error 403 (Forbidden, access denied) can occur for one of several reasons: You have uploaded the... Error 500 Internal Server Error Error 500 is displayed on a website in cases where the server cannot process the site’s PHP code... Error 503 Service Temporarily Unavailable 1. A large number of requests to the web server:- The downloaded resource is broken/contains... Error 504 Gateway Timeout Error 504 (Gateway Timeout, time expired) occurs due to the fact that the nginx web server does... Error User has already more than 'max_user_connections' active connections. What does it mean? This error means that you have exceeded the maximum allowed number of MySQL connections provided... Example: Custom .htaccess error pages Sometimes web server visitors request pages that for some reason do not exist on the server: an... Example: deny access from some IP addresses .htaccess Sometimes it becomes necessary to block access to the site or part of it from certain IP... Example: denying access to some .htaccess files. Sometimes it becomes necessary to deny access to certain files. For example, to configuration... Exceeding the number of FTP connections 530 Sorry, the maximum number of clients (10) from your host are already connected - you will... FTP Active and passive modes There are two modes for connecting to an FTP server - active and passive. Active mode is... FTP file transfer mode There are two modes for transferring files using the FTP protocol: Text (ASCII) is a mode for... FTP login and password do not work: "530 LOGIN INCORRECT" Check your access via the Plesk panel web interface. Correctly enter your IP address included in... FTP protection, using the .ftpaccess file. This allows you to change settings using .ftpaccess files. Directives specified in the .ftpaccess... Getting started with Git Git is a version control system that records changes to a file or set of files over time and... HTTP Status Code Meanings An HTTP status code is part of the header line of the web server's response to a client request,... Help, my site has been hacked! If your account has been hacked, rest assured that it is not related to the security of the... How can I create a database? You can create databases yourself from the Control Panel, in the "Databases" section.To create a... How can I prevent emails from going to spam? Digital signature DKIM and SPF Using DKIM for an email domain In order to enable the use of DKIM digital signature, go to the... How can I set up a task to run at a specific time? You can configure the execution of scripts for a specific time through the Control Panel, in the... How do I restore a website from a backup? To restore a site from a backup, you need to contact technical support - support@billur.com you... How much space do my websites take up on the server? Data on the use of web space on the server is located in the Plesk panel "Statistics" section... How to change PHP version on shared hosting? 1. Log in to your Plesk hosting control panel 2. On the required domain, click "PHP Settings"... How to check if port 25 is blocked? The standard port that is used to connect to the SMTP protocol is port 25. One of the most likely... How to check the connection to the site? Ping or ping is a term that refers to the time it takes for a packet sent from your computer to... How to clear DNS cache DNS (Domain Name Service) is a mechanism used on the Internet to map numeric IP addresses to text... How to create a subdomain (subdomain) To add auto subdomains, go to the Plesk panel. Next, in the Websites and domains section, click... How to find out the IP address of your computer? Your IP address becomes known to the site (server) already when a connection is established,... How to host a website? In order for the site to appear on the Internet and be seen by other users, you need to place... How to log into the admin panel of different CMSs? To log into the site as an administrator, use the address bar. This method is the most correct... How to prevent unwanted search bots from indexing your site. The process of indexing a site with a large number of pages can take a long time and create a... How to properly diagnose and fix a mail problem? Several different network protocols are involved in the operation of electronic mail... How to protect yourself from password guessing from the site’s admin panel (brute force attack) The goal of this attack is to obtain access data to the admin panel of your site by trying... How to recover administrator password in Drupal? Restoring access via phpmyadmin1) Log in to phpmyadmin of your server provided by the hosting.2)... How to recover the administrator password in Bitrix? To recover the administrator password, save the following script to a file:... How to reduce the load on the CPU and database As site traffic increases, the load on CPU and MySQL increases To avoid blocking a subscription... How to run a website in Python? First you need to log in to the CPANEL hosting control panel through your personal account on the... How to set up an email client on a mobile device? How to set up an email client for Android? 1. Open the Mail program and go to account settings.... How to transfer a website to your hosting? Our company helps its clients transfer websites to our servers. To receive this assistance, you... How to work with PHP mail function? The mail function sends email. Example #1 Sending a letter. Using the mail() function to send a... How to work with mail via the web interface? Access via web mail interfaceTo access your mailbox via the web interface, use any of these... I want the php code to be processed in html files. How to do it? To do this, add the following line to the .htaccess file: AddHandler application/x-httpd-php... Import and Export MySQL Database Import and export of MySQL databaseExport MySQL Database1.Log in to phpMyAdmin and click on the... Installing SSL in the Plesk panel 1. Log in to the Plesk control panel. 2. In the menu on the left, click on Domains. 3. Select... Installing Wordpress In order to install CMS WordPress in your subscription, you should click on the Install WordPress... Installing a Let's Encrypt SSL certificate 1. Log in to the Plesk control panel. 2. In the menu on the left, click on Domains. 3. Select... Is it possible to create additional FTP access? You can create FTP access from the Control Panel in the "FTP Access" section Is it possible to make one FTP access and have me go to my root folder on the server, and it already contains the folders of all sites? Yes, of course, when creating FTP access from the Control Panel in the "FTP accounts" section,... Is there an alternative to using the getcwd function? Yes, there is such an alternative. You must use an absolute path using the realpath function The... Node.JS, Ruby, PHP 1. Node.JS Node.js is a JavaScript runtime that allows you to write incredibly powerful... PHP Handlers On the "Virtual Hosting" service you can use the following methods of PHP operation:FPM -... Procedure for detecting a virus In the vast majority of cases, hacking and infection occurs through vulnerabilities in the site... Protect your WordPress site from DDoS attacks Websites created using the WordPress CMS can be used by attackers to launch DDoS attacks. Uses... Purpose and use of the .htaccess file The .htaccess file (note that the first character in the file name is a dot) is used to manage... SPF entry SPF – Sender Policy Framework. SPF allows the domain owner to specify in the TXT record of the... Search and eliminate malicious code on the site. Sending spam. Search and eliminate malicious code on websites.   There are many viruses on the Internet that... Setting up an FTP client in Total Commander After receiving information with access details to your hosting account, you will be able to... Setting up the FileZilla FTP client This instruction describes how to create an FTP connection to a server using FileZilla. This FTP... Setting up the Microsoft Outlook 2010 email client Access via Microsoft Office Outlook 2010To configure Microsoft Office Outlook 2010: Launch... Slow FTP, data transfer error Initially, any FTP program will work in a so-called application. active mode, so if traffic... Softaculous To install applications using the Softaculous tool, you need: 1) Log in to the Plesk server... The PHP script does not work, giving the error: Allowed memory size of 33554432 bytes exhausted The error means that the PHP script did not have enough RAM allocated for it to work correctly. The browser says that my site is infected, what should I do? There are many viruses on the Internet that spread themselves through websites. Unfortunately,... Viruses on the site: treatment method and safety settings How do I find out if your site is infected? 1. The resource is blocked by an antivirus or an... What are Blacklists of spam servers, DNSBL What are Blacklists of spam servers, DNSBL   DNSBL, blacklists or blacklists is a Domain Name... What are the technical characteristics of shared hosting? Development software:OS Cloudlinux 8 and Almalinux 8Hosting control panel Cpanel 112 and Plesk... What is .htaccess and how to use it? .htaccess is an additional configuration file for the Apache web server. Allows you to set a... What is SQL? SQL is short for Structured Query Language. SQL is designed to work with relational databases. It... What is a DBMS? A DBMS is a structured system for working with databases with an established set of rules.... What is shared hosting? Virtual hosting (shared hosting) is a type of hosting that allows you to host many websites on... What is site phishing? Phishing is a type of fraud whose goal is to gain access to confidential user data: login,... What is the email address of the web interface? We provide a web interface for accessing mail at the following... What is the hosts file for? HOSTS file is used to resolve symbolic domain names (google.com) to their corresponding IP... What is the robots.txt file used for? The robots.txt file is a text file located in the root directory of the site, in which special... What restrictions apply to web hosting? Current restrictions:The maximum number of simultaneous connections (max_user_connections) is... What to use to host files on the server To upload files to the server, you need to use programs that support the FTP protocol. With their... What webmail interface do you provide? A mail interface is available on shared hosting - RoundCube Where does the CMS store database connection settings? Below is information about configuration files that store settings for connecting to popular CMS... Why do regular emails end up in SPAM? There can be many reasons, here are some reasons why your emails end up in the Spam folder or may... Why do you need to pay on time for purchased services: Domain, Hosting, SSL certificate, etc. Today, every self-respecting organization has its own website, which is the company’s... xmlrpc.php of your website is used by attackers to launch DDoS attacks. Your site acts as an intermediate link, but the work of site scripts will create a huge load on...
« Back