Tag: Users

Reading Time: 13 minutes

Introduction

In this second tutorial on server load, we outline the steps that should be taken when investigating where server load originates and what may be causing your server to become overloaded. As noted in Part 1 of our series, excessive use of any apps or services can typically cause load issues. Here are the four main areas of concern:

Continue reading →
Reading Time: 7 minutes

Introduction

In this two-part series, we outline the steps to take when investigating where server load originates or causing your server to become overloaded. When running a server that hosts multiple websites, high load issues often crop up. To find out how and why this occurs, read on. 

Continue reading →
Reading Time: 3 minutes

Have you run into the cPanel error seen below in WHM where it prevents you from adding more cPanel accounts? It states that you have exceeded the total number of accounts allowed by your license. If so, this tutorial will demonstrate how you can increase the quantity of available accounts from within your Manage interface.

Continue reading →
Reading Time: 6 minutes

Our last article on Ubuntu security suggestions touched on the importance of passwords, user roles, console security, and firewalls. We continue with our last article and while the recommendations below are not unique to Ubuntu specifically (nearly all discussed are considered best practice for any Linux VPS server or dedicated server) but they should be an important consideration in securing your server.

Continue reading →

How to Improve IIS Security

Posted on by Jacob Sundberg | Updated:
Reading Time: 7 minutes

When investigating site infections or defacing on a Windows VPS Server, the most common root cause is poor file security or poor configuration choices when it comes to how IIS should access file content.  The easiest way to prevent this is to start with a secure site.

Continue reading →
Reading Time: 7 minutes

What Does Server Load Mean?

Checking a server’s load allows us to evaluate server resources and confirm they are sufficient for any running application. It enables us to troubleshoot slow performance and reliably pinpoint any server resource that may need attention.

Continue reading →
Reading Time: 4 minutes

This guide walks you through some common tasks surrounding a Postgres server. In this tutorial, we’ll cover installing Postgres, creating new databases and users, backing up databases, and more! Let’s dig in!

Continue reading →
Reading Time: 5 minutes

What is RBAC?

Kubernetes Role-Based Access Control or the (RBAC) system describes how we define different permission levels of unique, validated users or groups in a cluster. It uses granular permission sets defined within a .yaml file to allow access to specific resources and operations.

Continue reading →
Reading Time: 2 minutes

Linux has a robust permissions system. This is a very good thing, as it enables a clear separation of roles among users, especially between the root user and your average user. Sometimes, though, you might want your average user to have some or all of root's privileges. In Linux, this is accomplished with sudo.

Continue reading →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434