Hostwinds Tutorials
Tools and instructions enabling you to maximize the potential of your Hostwinds product and service experience.
Search results for:
Bad actors and malicious users, and bots may attempt to access your server by sending a barrage of SSH requests. Each request attempts to guess your password, therefore taking control of your server in what is known as a "brute force" attack. Usually, computers the hacker...
WordPress is a top-rated platform for easy-to-use hosting. Being as popular as it introduces many security concerns, however. It is imperative to secure and harden your WordPress installation so that your site remains safe from external attacks . This guide will set forth...
There may be a time that you notice that your web hosting account has been hacked, and Hostwinds certainly understands that this is an overwhelming feeling. While you may do your best to build your account and configure it in the way that you need, there are instances where...
It is important to maintain the rule of least privilege for your web hosting account. cPanel offers you the ability to add many types of users for uploading files through FTP, sending and receiving emails, and accessing your application directly with elevated privileges....
Hostwinds Account Security is a top priority, and we take this very seriously. We go to great lengths to make sure your web hosting services are as secure as possible with the latest versions of the Operating System and cPanel/WHM for you so that you can focus on building...
What is Google verification? Verification with Google is a way to prove ownership of a website. With it, you can take full advantage of the Google Search Console. The Google Search Console is another tool that allows you to track how Google is indexing your website, view how...
If your mail is successfully going through to your recipient's mail server, but the mail itself seems to get filtered into their SPAM folder, there can be several reasons as to why. This guide will go over the different potential reasons and how to make sure your mail is as...
When you register a domain name, you are asked to provide quite a bit of information. This is so that if ICANN (the organization that handles domain name registrations) needs to get in touch with you for any reason, they can do so. If this information is not accurate, you...
To improve security with cPanel / WHM, it is common to have a firewall installed. The most common being ConfigServer Security & Firewall . Otherwise known as csf . While this firewall is intended to prevent malicious users from gaining unauthorized access to the server,...
Linux is designed to manage multiple users efficiently, ensuring that only authorized individuals can access or modify specific files. This is done through a system of file ownership and permissions that helps protect system and user data. Understanding these mechanisms...
The internet is a busy place, full of active registered domains used around the world. Millions of domains are registered and expire each year, and this data has to be collected for registrars to keep tabs on who has registered a domain. With that said, WHOIS data was...
After you create your email within cPanel, there may come a time where you may want to change your password to your email account for a variety of reasons. The following steps will outline how to change your webmail(s) password if needed. Step 1: Log into your cPanel service...
One of the best things you can do to protect your SHOUTcast station and your files is to change your password often. Changing your password often will reduce the risk of anyone else gaining access to your account. How To Change Your SHOUTcast Password It is assumed that you...
This guide is about running a virus scanner on your cPanel. This is intended to check if your web hosting files or cPanel email have acquired any malware by using the built-in tool included with your account. How To Run the Scan Login to your cPanel Scroll down to the...
When website visitors visit your site, they may be greeted to warn that the site is insecure if you are not using a padlock. This can happen in several different web browsers, such as Mozilla Firefox and Google Chrome. When web visitors see a green padlock and a Secure...
If you would like to reset the password for the root user's MySQL password, this guide will help you through that process. Reset MySQL Password Stop the MySQL Server You will want to have the correct version before continuing with this guide and can get it using this command...