Knowledgebase

knowledgebase List

We collaborate with the providers of best-of-breed technologies, services, and other streams.

image

Knowledgebase

Backup/Restore

How to Generate and Download a Full Backup of Your cPanel Account

How to Generate and Download a Full Backup of Your cPanel Account

 

Backing up is important, and you should do it regularly. Follow this tutorial to make a full backup of your website with cPanel.

1. Log in to your cPanel account.

2. In the Files section, click on Backup.


3. Under Full Backup, click on Download a Full Website backup.

4. From the drop-down menu, select Home Directory as the backup destination and enter your email to receive a notification when the backup is complete.

Leave Include integration links as it is.

After the cPanel backup is finished, you will receive a notification. You can download backups from Backup > Download a Full Account Backup.

Backup/Restore

CPanel – How to Download Backup of Home Directory, MySQL, or Email Only

Backing up is important, and you should do it regularly. Follow this tutorial to make a full backup of your website with cPanel.

1. Log in to your cPanel account.


2. In the Files section, click on Backup Wizard.


3. Under Backup or Restore, click on Back Up.

4. Under Select Partial Backup. choose one of the available backup options to create and download a backup of it. To download a Home Directory backup, click on Home Directory.



5. Confirm by clicking on Home Directory again.

Now, the download will start.

Dedicated Servers

How to manage Dedicated Servers

Managing a dedicated server involves tasks such as initial setup, ongoing maintenance, security measures, and monitoring to ensure optimal performance and security. Here’s a guide on how to manage a dedicated server:

  1. Initial Setup:
  • Provision the server: Purchase or lease a dedicated server from a hosting provider or data center.
  • Choose an operating system: Select the operating system (OS) that best suits your needs, such as Linux (e.g., Ubuntu, CentOS) or Windows Server.
  • Configure network settings: Set up networking configurations, including IP addresses, DNS settings, and firewall rules.
  1. Remote Access:
  • Use remote administration tools: Access the server remotely using tools like SSH (for Linux) or Remote Desktop Protocol (RDP) (for Windows).
  • Secure remote access: Ensure secure remote access by using strong authentication methods like SSH keys or VPN connections.
  1. Security Measures:
  • Install security updates: Regularly apply OS updates and patches to address security vulnerabilities.
  • Configure firewall: Set up a firewall to control incoming and outgoing traffic, and only allow necessary ports and services.
  • Implement security software: Install antivirus, intrusion detection/prevention systems, and other security tools to protect against malware and unauthorized access.
  • Harden server configurations: Follow security best practices to configure the server securely, such as disabling unnecessary services, limiting user permissions, and using encryption where appropriate.
  1. Monitoring and Performance Optimization:
  • Monitor server health: Use monitoring tools to track server resource usage (CPU, memory, disk, network) and detect performance issues or anomalies.
  • Optimize performance: Configure server settings and applications to maximize performance, such as adjusting resource allocation, optimizing database settings, and caching frequently accessed data.
  • Implement backups: Regularly back up critical data and configurations to prevent data loss in case of hardware failures, accidental deletions, or security breaches.
  1. Regular Maintenance:
  • Perform routine maintenance tasks: Schedule regular maintenance activities, such as disk defragmentation (for Windows), disk cleanup, log rotation, and database optimization.
  • Monitor logs: Review server logs for errors, warnings, and security-related events, and take appropriate actions to address any issues identified.
  • Update software: Keep server software up to date by installing patches, updates, and new releases to address bugs, security vulnerabilities, and performance improvements.
  1. Disaster Recovery Planning:
  • Develop a disaster recovery plan: Create a plan outlining procedures for restoring server functionality in case of disasters such as hardware failures, data corruption, or cyberattacks.
  • Test backups and recovery procedures: Regularly test backups and recovery procedures to ensure data integrity and verify that systems can be restored effectively in case of emergencies.

By following these steps and staying proactive in managing your dedicated server, you can ensure its security, reliability, and optimal performance for your business or organization.

Dedicated Servers

How to manage Dedicated Servers #2

Managing a dedicated server involves tasks such as initial setup, ongoing maintenance, security measures, and monitoring to ensure optimal performance and security. Here’s a guide on how to manage a dedicated server:

  1. Initial Setup:
  • Provision the server: Purchase or lease a dedicated server from a hosting provider or data center.
  • Choose an operating system: Select the operating system (OS) that best suits your needs, such as Linux (e.g., Ubuntu, CentOS) or Windows Server.
  • Configure network settings: Set up networking configurations, including IP addresses, DNS settings, and firewall rules.
  1. Remote Access:
  • Use remote administration tools: Access the server remotely using tools like SSH (for Linux) or Remote Desktop Protocol (RDP) (for Windows).
  • Secure remote access: Ensure secure remote access by using strong authentication methods like SSH keys or VPN connections.
  1. Security Measures:
  • Install security updates: Regularly apply OS updates and patches to address security vulnerabilities.
  • Configure firewall: Set up a firewall to control incoming and outgoing traffic, and only allow necessary ports and services.
  • Implement security software: Install antivirus, intrusion detection/prevention systems, and other security tools to protect against malware and unauthorized access.
  • Harden server configurations: Follow security best practices to configure the server securely, such as disabling unnecessary services, limiting user permissions, and using encryption where appropriate.
  1. Monitoring and Performance Optimization:
  • Monitor server health: Use monitoring tools to track server resource usage (CPU, memory, disk, network) and detect performance issues or anomalies.
  • Optimize performance: Configure server settings and applications to maximize performance, such as adjusting resource allocation, optimizing database settings, and caching frequently accessed data.
  • Implement backups: Regularly back up critical data and configurations to prevent data loss in case of hardware failures, accidental deletions, or security breaches.
  1. Regular Maintenance:
  • Perform routine maintenance tasks: Schedule regular maintenance activities, such as disk defragmentation (for Windows), disk cleanup, log rotation, and database optimization.
  • Monitor logs: Review server logs for errors, warnings, and security-related events, and take appropriate actions to address any issues identified.
  • Update software: Keep server software up to date by installing patches, updates, and new releases to address bugs, security vulnerabilities, and performance improvements.
  1. Disaster Recovery Planning:
  • Develop a disaster recovery plan: Create a plan outlining procedures for restoring server functionality in case of disasters such as hardware failures, data corruption, or cyberattacks.
  • Test backups and recovery procedures: Regularly test backups and recovery procedures to ensure data integrity and verify that systems can be restored effectively in case of emergencies.

By following these steps and staying proactive in managing your dedicated server, you can ensure its security, reliability, and optimal performance for your business or organization.

Cloud VPS

How to connect Cloud VPS

Connecting to a Cloud VPS (Virtual Private Server) typically involves several steps, including provisioning the server, accessing it remotely, and configuring it according to your needs. Here’s a general guide on how to connect to a Cloud VPS:

  1. Provision the VPS: Depending on the cloud provider you’re using (such as Amazon Web Services, Google Cloud Platform, Microsoft Azure, DigitalOcean, etc.), you’ll need to log in to the provider’s dashboard, navigate to the VPS or instance creation section, and follow the steps to create a new virtual server. This usually involves selecting the operating system, server size, region, and other configuration options.
  2. Obtain Server Credentials: Once the VPS is provisioned, the cloud provider will usually provide you with credentials to access the server. This typically includes an IP address or hostname, a username, and a password or SSH key pair. Make sure to keep these credentials secure.
  3. Connect via SSH (Secure Shell): SSH is a common method for securely accessing remote servers. If you’re using a Unix-based system (such as Linux or macOS), you can open a terminal and use the ssh command to connect to your VPS. For example: ssh username@server_ip Replace username with your actual username and server_ip with the IP address or hostname of your VPS. If you’re prompted for a password, enter the password provided by your cloud provider.
  4. Connect via Remote Desktop Protocol (RDP): If you’re using a Windows-based VPS, you can connect via RDP instead of SSH. On a Windows computer, you can use the Remote Desktop Connection application to connect to your VPS. Enter the IP address or hostname of your VPS, and then enter the username and password provided by your cloud provider.
  5. Initial Server Setup: Once connected to your VPS, you may want to perform some initial configuration tasks, such as updating the system packages, setting up firewalls, installing necessary software, and securing the server. This may vary depending on your specific requirements and the operating system you’re using.
  6. Install Additional Software: Depending on your needs, you may need to install additional software on your VPS, such as a web server (e.g., Apache or Nginx), a database server (e.g., MySQL or PostgreSQL), or other applications.
  7. Regular Maintenance: Keep your VPS up to date with security patches and software updates, and regularly monitor its performance and security.

Remember to follow best practices for security, such as using strong passwords or SSH keys, keeping software up to date, and configuring firewalls to restrict access to your server.

24/7 World-Class Support

Ran into trouble? Contact our Customer Success team any time via live chat or email.

Need help choosing a plan?

Need help? We're always here for you.