How to Reset MySQL root Password

If you’ve forgotten or need to change your root user password in MySQL, you might be wondering what steps are necessary to reset your MySQL root password. Luckily, there are couple of ways to do this.   Using the mysqladmin Command to Change root Password If you’ve never set a

How to Check and Repair a Corrupted MySQL Database Table Using SSH

In this tutorial we’ll cover how to use MySQLcheck to repair a corrupted database table. Repairing a Corrupted MySQL Database Table Please refer to the following steps: First, log in to your MySQL server using Secure Shell (SSH). Then, enter the following command at root prompt: mysqlcheck -r [database name]

How to Check if the Default FTP Port 21 is Blocked

What is FTP Port 21? FTP, or File Transfer Protocol, is a means of transferring data online directly from one server to another. Typically requiring a username and password, it can be used through your web browser or a dedicated FTP client. In order for FTP to work, it requires

How to Configure an MX Record

What is an MX Record? MX records, or mail exchange records, are special server settings that help control the way your email is routed. In terms of DNS, an MX record tells incoming mail which server can receive it, and then directs it to that server. In other words, if

What are Domlogs?

Domlogs are the domain logs which are generated for requests made to a domain. Web statistics use these logs. Typically, information in domlogs includes data on IP addresses, the identities of requesters, date and timezone information, file size, and more. If the domlogs are removed, you will be unable to

What is the Difference Between Dual-Core and Quad-Core Processors?

If you’ve been working with computers for any length of time, you probably know that quad-core processors are faster than dual-core processors. But why? Well, the answer comes down to simple mathematics.   Dual-Core vs. Quad-Core As you may have already guessed from their names, a dual-core processor has two

How to Resolve ‘passwd: Authentication token manipulation error’ for cPanel

passwd: Authentication token manipulation error At times, a user may find themselves unable to update their password via cPanel. If your attempt to change the password fails, you should see a message that looks something like this: Error: Changing password for user status. Changing password for status (current) UNIX password:

Common Linux Log Files and Their Uses

List of Linux Log Files The following is a list of commonly found log files within Linux, alongside a short description of what kind of information each file contains. Typically, all log files on linux servers are located under the /var/log directory. Depending on the setup of your server though,

How to Change/Set Date, Time, & Timezone on a Linux Server

The date, time, and timezone are important aspects of a Linux system that affect how it operates and interacts with other systems. There are different ways to describe and change these settings in Linux, depending on the distribution and the tools available. Below you will find information on how to

How to unrar on Fedora core Linux Server ?

If you are using Fedora core Linux server then use yum to install rar : yum install unrar Also you can refer following steps: – root@server [~]#cd /tmp root@server [~]#wget https:// www . rarlab.com/rar/rarlinux-3.6.0.tar.gz root@server [~]#tar -zxvf rarlinux-3.6.0.tar.gz root@server [~]#cd rar root@server [~]#cp rar unrar /bin To extract rar file

How to Enable Leech Protection in cPanel

What is Leech Protection? The Leech Protect utility available within cPanel enables administrators to prevent users from publicly disclosing passwords used to access restricted areas of a website. It does this by limiting the number of times a user can log in to these restricted areas. It gives site administrators