Tag: Redirection
How to Set Up Domain Redirects in cPanel
II. How to Create an Email Account in cPanel
III. How to Set Your Default Address in cPanel
IV. How to Set Up an Autoresponder in cPanel
V. How to Set Up Email Forwarding in cPanel
VI. How to Set Up Email Filters in cPanel
VII. How to Enable Spam Protection in cPanel
VIII. How to Add an MX Entry in cPanel
IX. How to Use Webmail From Within cPanel
X. How to Change Your cPanel Password
XI. How to Update Your Contact Information in cPanel
XII. How to Change Your cPanel Theme
XIII. How to Change the Primary Language in cPanel
XIV. How to Add a Record With the DNS Zone Editor in cPanel
XV. How to Backup Your Website in cPanel
XVI. How to Use the Disk Space Usage Tool in cPanel
XVII. How to Create Additional FTP Accounts in cPanel
XVIII. How to Password Protect a Directory in cPanel
XIX. How to Use the IP Blocker in cPanel
XX. How to Set Up Hotlink Protection in cPanel
XXI. How to Create a Subdomain in cPanel
XXII. How to Create an Addon Domain in cPanel
XXIII. How to Create a Domain Alias in cPanel
XXIV. How to Set Up Domain Redirects in cPanel
XXV. How to Create a MySQL Database in cPanel
XXVI. How to Use the Index Manager in cPanel
XXVII. How to Create Custom Error Pages in cPanel
XXVIII. How to Set Up a Cron Job in cPanel
There are instances when it is necessary to send traffic from one domain or page to another. Knowing how to set up domain redirects in cPanel helps you accomplish this. Send visitors from to one site or page to another URL using this tutorial.
A pipe is a form of redirection in Linux used to connect the STDOUT of one command into the STDIN of a second command. It allows us to narrow the output of a string of commands until we have an easily digestible amount of data. The pipe character is the | symbol and is placed between any two commands. Pipes are one of the most used command-line features that Linux has. Every article showing Linux commands will almost inevitably include pipes.
What Indicates A Compromised Website?
Introduction
What happens when a site is compromised? How quickly can you respond when you recognize the signs that something is amiss? In today’s article, we will explore some of the more common indicators of a compromised website, how you can spot it, and how to act on it in a timely manner.
Redirect to HTTPS
Google just announced that starting July 2018 Chrome, their very popular web browser, will start alerting for all websites which are not using Secure Sockets Layer, or SSL encryption. This is huge. The ramifications of such an alert could be quite impactful to traffic, to websites, and especially for the average user. So, what does that mean for you? More importantly, what can you do about it? No worries! Liquid Web has you covered.
How to Pass Command Data With I/O Redirection
Throughout the articles in the Knowledge Base, you may have seen a few interesting characters in the examples. Specifically, we are referring to these characters: |, >, and <. Today, we’re going to talk a bit about pipes.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.