Any time you are connecting another application to WHMCS via their API, you have to add the IP address of the application WHMCS and allow access. Here’s how: Login to your WHMSC Go to Setup -> General Settings Click on the Security tab Find the “API IP Access Restriction” box […]
How do I disable Internet Explorer Enhanced Security?
For Windows 2003 Windows Server 2003 is shipped with security locked down by default. Part of this locking down is Internet Explorer Enhanced Security which is an extra layer of protection when surfing the internet using Internet Explorer. You can uninstall the entire Configuration, or just for users, or just […]
How do I enable ICMP echos in Server 2008?
To enable ICMP replies in Windows Server 2008 you must allow ICMP packets through the windows Firewall Press Start Goto -> Administrative tools Click on ‘Windows Firewall with Advanced Security’ Click on ‘Inbound Rules’ Scroll down to find: ‘File and Printer Sharing (Echo Request – ICMPv4-In)’ Right-click on this and […]
Terminal Server Has Exceeded Max Connections
This problem happens because Windows only allows two remote terminal services connections to be logged in as an Administrator, and you’ve either got two people already on that server as an Administrator, or more likely, you’ve got a disconnected session that is still logged in (simply closing the RDP session […]
Windows Memory Limits
The table below describes the psychical memory limits supported by each Windows version. We want make sure our clients are aware of these limits as we begin to offer increased amounts of RAM across our server platforms. Version 32bit Limit 64bit Limit Windows 2003 Standard R2 4GB 32GB Windows 2003 […]
How do I use iptables?
Warning Modifying rules on your server can cause the server to become inaccessible on port 22 (SSH) or your alternate SSH port. Description / Basic Overview Everyone in the IT industry is very concerned with security, especially if you’re a linux administrator. Many linux distributions come with several services that […]
How do I set up SSH key authentication?
SSH packets being sent from the SSH client to the server are encrypted with a form of shared-key cryptography, using a random key which is generated for each new connection and thrown away when that connection is over. The client and the server use public-key cryptography to agree on the […]
How can I reset my root password?
This article explains how to reset the root password if you no longer know it. You will require KVM access to your server in order to perform these steps. CentOS/Fedora Through the KVM, initiate a restart of your server by sending the shutdown command:
1 |
shutdown -r now |
When it comes to the […]
How can I tell if I’m being attacked?
When experiencing a DoS or DDoS attack, the first thing you will most likely notice is that your server is unresponsive or is very slow to respond. Check your Bandwidth Graphs The first thing you should do is check your server’s bandwidth graphs. You can do this through our control […]
Receiving an “ip_conntrack: table full” error.
On OpenVZ/HyperVM machines sometimes the ip_conntrack table will become full and drop packets. You can tell if it is doing this by looking in your /var/log/messages file. To find out the current limit run:
1 |
sysctl net.ipv4.netfilter.ip_conntrack_max |
Then to increase it edit /etc/sysctl.conf and change the linenet.ipv4.netfilter.ip_conntrack_max = to a higher number. […]