Blogs

Find the Potential Spammer Account in cPanel/Exim

In this tutorial we can check how to find the potential spammer account in cPanel Exim mail server. What is Spam?             In technical spam is an Unsolicited Commercial Email (UCE), means email messages sent to a personal machine without the prior request.   Types of Spam 1) Phishing spam 2) Foreign bank spam 3) Get rich easily and quickly spam 4) Illicitly pirated software 5) Newsgroup and forum spam   What are its Effects? Some effects of spam 1) Fills your Inbox with a number of bounce back emails. 2) Reduces your Internet speed. 3) Steals useful information like your credit card details and contact list information. 4) Alters your search results on search engine.   What happens after the compromise? The attacker puts a PHP file on the server that acts as part of a DDoS or a script that used to send a ton of spam. Whatever application you are using to connect to email (Outlook, Thunderbird, etc.) and use that to start spamming. We know that someone on our server is spamming. We don’t know if it’s due to a script or if it’s because someone’s machine got attacked.   Let’s look at a command which is used to searches for all external logins exigrep @ /var/log/exim_mainlog | grep _login | sed -n ‘s/.*_login:\(.*\)S=.*/\1/p’ | sort | uniq -c | sort -nr -k1 The above script is used to exigrep through our email log and return any line containing an @ and then sort, gives how many instances are there.   Let’s check which user/account has been hacked: exigrep @ /var/log/exim_mainlog | grep U= | sed -n ‘s/.*U=\(.*\)S=.*/\1/p’ | sort | uniq -c | sort -nr -k1 Using this script, we got the user who is sending the most email on the system. We can analyze that this user is producing spam.   Let’s track down the script grep “cwd=” /var/log/exim_mainlog | awk ‘{for(i=1;i<=10;i++){print $i}}’ | sort |uniq -c| grep cwd | sort -n | grep /home/ Executing this command will check the lines in the Exim log that contains the string “cwd”. It helps to find the folder where the spam is happening.   Let’s check the X-PHP-Script field grep X-PHP-Script /var/spool/exim/input/*/*-H | awk ‘{print $3}’ | sort | uniq -c | sort -nr This will search the active mail queue. It checks for the X-PHP-Script field in the header of the emails. This must be enabled in cPanel by default or it can be enabled in Whm. This above line gives which script sent the email.   Code Breakdown The below line is used to find most used mailing script’s location from the Exim mail log. grep cwd /var/log/exim_mainlog | grep -v /var/spool | awk -F”cwd=” ‘{print $2}’ | awk ‘{print $1}’ | sort | uniq -c | sort -n   grep cwd /var/log/exim_mainlog Use the grep command to locate string “cwd” from the Exim mail log. This stands for current working directory grep -v /var/spool Grep with -v is used to Invert the sense of matching, To select non-matching lines.That doesn’t show any lines that start with /var/spool. Because /var/spool is the normal Exim deliveries. awk -F”cwd=” ‘{print $2}’ | awk ‘{print $1}’ Use the awk command with the -F separator set to “cwd=”, then print out the $2nd set of data, then pipe that to the awk command again. It only prints out the $1st column, thereby we can get back the script path. sort | uniq -c | sort -n Filter the script paths by their name, and count them, sort them again in ascending order.
Read more

LMTP ( Local Mail Transfer Protocol ) in cPanel

The Local Mail Transfer Protocol (LMTP) is a derivative of Extended SMTP (ESMTP, sometimes referred to as Enhanced SMTP, is a definition of protocol extensions to the Simple Mail Transfer Protocol standard), the extension of the Simple Mail Transfer Protocol (SMTP). LMTP is an Application Layer protocol of the Internet Protocol Suite. It must not use the default unsecure port number (25) of SMTP, but it uses a TCP (Transmission Control Protocol) transport like SMTP. When the receiving side does not have a mail queue, such as a mail storage server acting as a MDA (Mail Delivery Agent), LMTP is designed as an alternative to normal SMTP for these situations. Mail queues are an important requisite of SMTP. There are situations in which mail queues are not possible, LMTP is desirable, since a mail storage server should manage only its mail store and it will not allocate more storage for a mail queue. This is impossible with SMTP when there are multiple recipients for a mail message. SMTP can only point out the successful delivery or failure for all or none of the recipients and it also create a separate queue to handle the failed recipients. But in the case of LMTP, it can point out the success or failure to the client for each recipient and it also allow the client to handle the queueing instead. The client in this scenario would be an Internet-facing mail gateway. LMTP issues in cPanel LTMP is what Dovecot is now configured to use for local deliveries. We can discuss some LMTP issue on cPanel. If you are getting email alerts from your server as “The service ‘lmtp’ appears to be down” or alert for dovecot down. Then perform the following steps. Try to restart the dovecot service first. # restartsrv_dovecot Then you must be getting error like: mRT+MfXIqldQfgAAswxAZg: msgid=<20160810062513.AF7881C3219@domain.com>: save failed to INBOX: Quota exceeded (mailbox for user is full) Aug 10 10:56:56 server50 dovecot: lmtp(user@server50.domain.com): Error: write(/home/user/mail/dovecot-quota.lock) failed: Disk quota exceeded   This error occurs because the cPanel user has been exceeded its quota. Dovecot is very sensitive so you will need to increase the disk quota for the user in order to resolve this issue. For this, please follow the below steps.   1)  Log in to WHM. 2)  Select the icon ‘Account Function’. 3) Click on the icon ‘Modify an Account function’. 4) Select the domain which you want to modify. 5) Increase the ‘Disk Quota’ and click on the ‘Save’ button.
Read more

cPanel’s Email Deliverability Interface

To prevent outgoing e-mail from being marked as spam and being blocked, cPanel introduces a new feature called Email Deliverability. This feature introduced in the latest version of cPanel which helps the cPanel users to manage SPF, DKIM and PTR records for their domains. This also helps the users to resolve any issues that may exist with SPF, DKIM and PTR records. SPF record is a Sender Policy Framework which helps to identify which servers are authorized to send mail for a domain. This will help you to reduce spam activity in your domain. DKIM record is another method to validate the authenticity of email messages. Here the sender sends a mail which includes the private key and then the recipient server check the DNS server for the domain for the public key to verify the signature. This will also help to reduce the spam from your domain. Here are the steps for accessing the Email Deliverability interface on your new cPanel server. 1) Login to your cPanel server. 2) Click on icon ‘Email Deliverability’ under the ‘Email’ section. 3) From the ‘Email Deliverability’ tab, we can check whether our DNS records are correct or not.   From there you can manage and check the mail-related DNS records for your domains hosted on cPanel account. The first column tells you the Domain name and the second one gives you the details about the ‘Email Deliverability Status’, whether a problem exists with your domains DNS records. Finally, the last column tells you about the ‘Actions’ required for correcting the DNS records. Repair: This feature allows the system to repair a domain’s invalid records Manage: This interface allows you to manually resolve issues with your domain’s mail-related DNS records. When we click on the ‘Manage’ button beside the domain name, then it will navigate you to another window and from there you can manually add your DNS records. You can install/configure the DNS of your all domains on your cPanel account from this interface.
Read more

cPanel & Plesk Price increase 2021

cPanel and Plesk continue with dramatic yearly price increases (see 2019 price increase) even in the midst of a global pandemic while people and countless businesses are making sacrifices to stay afloat. The brass over at cPanel and Plesk are clearly unfazed. Announced today 10/1/2020 there will be a 10-15% price increase on all license costs. Justification for this price increase being –  NGINX support – which is still in beta! cPanel apparently has been caught by surprise that Centos8 and Cloudlinux8 have been release over a year. Yi-Solutions has no choice but to pass the price increase along to our customers as well. On the bright side, we have been building our relationship with DirectAdmin over the last year. We will soon be offering the Direct Admin Personal license completely FREE with the purchase of a VPS or Dedicated server. We will be introducing this offer in our control panel before the year’s end. cPanel to DirectAdmin migrations are possible. Below are the new prices that will take effect immediately for new orders. All current licenses will be updated to the new pricing structure on 1/1/2021. Plesk Edition Current Price Price – starting Jan 1, 2021 VPS Plesk Admin Edition $10.0 $12.0 VPS Plesk Pro Edition $15.0 $17.5 VPS Plesk Web Host Edition $21.5 $28.5 Dedicated Plesk Admin Edition $10.0 $12.0 Dedicated Plesk Pro Edition $15.0 $17.5 Dedicated Plesk Web Host Edition $45.0 $50.5   Cpanel Edition Current Price Price – starting Jan 1, 2021 Admin Cloud $14.5 $22 Pro Cloud $19.5 $32.25 Plus Cloud $27.0 $45.00 Premier Cloud $34.0 $49.50 Premier Metal $34.0 $49.50
Read more

How to Enable PhpMyAdmin and RoundCube Auto-Login in DirectAdmin

cPanel is one of the most common and widely used control panels. But cPanel has recently announced a massive increase in their pricing scheme. This increase in the price schema has impacted so many customers and businesses. So, customers are now migrating their cPanel sites to other control panels, and some of them are migrating their cPanel sites to DirectAdmin. With the recent inrush of cPanel to DirectAdmin migration, there is a confusion in the access of PhpMyAdmin and RoundCube. In DirectAdmin, the PhpMyAdmin and RoundCube require login credentials. With cPanel, the users grant access to all the tables created under the cPanel user. The one-click feature within the cPanel interface helps an end-user to log into the PhpMyAdmin and RoundCube automatically. When clients migrate from cPanel to DirectAdmin, they get confused with the DirectAdmin credentials and the credentials for the PhpMyAdmin and RoundCube. To log in to the PhpMyAdmin, they need to input the database user name and password and in case of the RoundCube, they need to input the user’s email address and password. The SingleSignOn feature of the DirectAdmin can help the user to automatically log into the PhpMyAdmin and RoundCube with a single click via the DirectAdmin interface. Since October 2019, the Single SignOn feature of DirectAdmin is disabled by default. In this knowledge base, we will learn how to enable the one-click login or auto-login feature for PhpMyAdmin and RoundCube via the DirectAdmin interface. Steps to Enable One-Click Login for PhpMyAdmin from DirectAdmin To enable the one-click login for PhpMyAdmin in the DirectAdmin interface, follow these steps. First of all, Log in to the DirectAdmin server as a root user. Then, Switch to the ‘directadmin’ directory by executing the following command. # cd /usr/local/directadmin/ Run the following command to enable the one-click login for PHPMyAdmin. # ./directadmin set one_click_pma_login 1 After that, restart the DirectAdmin service by using the following command. # service directadmin restart Then, switch to the ‘custombuild’ directory. # cd custombuild After that, execute the following command to update the build. # ./build update Finally, Run the following command to make all the changes reflect in the DirectAdmin panel. # ./build phpmyadmin After enabling the one-click login feature of PhpMyAdmin, you can log in to the PhpMyAdmin from DirectAdmin panel without entering the login credentials as such of cPanel. To test, follow these steps: Log in to the DirectAdmin interface as a root user. Go to the ‘Account Manager’ option and select the ‘MYSQL Management’ from the drop-down. Then, select the database name from the list to which you want to login. Click the ‘Login’ button far right to the database to login to the PhpMyAdmin without entering the login credentials. To make PhpMyAdmin only accessible with the Single SignOn feature and not with the database user name and password, follow the steps given below. Log in to the DirectAdmin server as a root user. Switch to the ‘custombuild’ directory by using the following command. # cd /usr/local/directadmin/custombuild Then, update the build script by using the following command. # ./build update After that, disable the public feature of PHPMyAdmin by executing the following command. # ./build set phpmyadmin_public no Execute the following command to make all the changes reflect in the DirectAdmin panel. # ./build phpmyadmin After executing the above commands, when a user will try to log in to the PHPMyAdmin using the database credentials, the system will prompt the following message. Access to phpMyAdmin is only allowed from the control panel. Steps to Enable One-Click Login for RoundCube from DirectAdmin The one-click login is often known as ‘Single SignOn or SSO logins. To enable the one-click login for RoundCube from the DirectAdmin interface, follow these steps: Log in to the DirectAdmin server as a root user. Switch to the ‘directadmin’ directory by using the following command. # cd /usr/local/directadmin/ Then, enable the one-click Webmail login by executing the following command. # ./directadmin set one_click_webmail_login 1 After that, restart the DirectAdmin service by executing the following command. # service directadmin restart Now, switch to the ‘custombuild’ directory. # cd custombuild After that, run the following command to update the build script. # ./build update Then, update changes to the dovecot configuration by executing the following command. # ./build dovecot_conf Execute the following command to update the changes to the EXIM configuration file. # ./build exim_conf Finally, execute the following command to update RoundCube. # ./build roundcube After executing the above commands, follow the below-given steps to avail the Single SignOn feature for RoundCube. Log in to the DirectAdmin interface as a root user. Navigate to ‘Email Manager’ and click the ‘Email Accounts’ option from the drop-down.   Select the email account from the list to which you want to login. Then, click the ‘+’ symbol at the far right of the email account and select the ‘Sign In to Webmail’ option. This time, the system won’t prompt for login credentials and gets redirected directly to the RoundCube account. Please note that this above feature does not get applied to the system accounts, and you need to log in to the system accounts using the DirectAdmin login credentials. The virtual email accounts can only use this feature.
Read more

Autodiscover Information For Mail Clients in DirectAdmin

Autodiscover is a system to figure out which settings to use for the POP/IMAP/SMTP settings, that allows the mail client users to configure their email address automatically. We can set up this in DirectAdmin with basic requirement: subdomain and an SRV record. You can add the SRV record on which domain you wish to use these settings for. If you have any global SSL certificate in exim/dovecot for your hostname, it will be better to make sure the clients use the correct value. Hence they did not get SSL certificate errors. Let’s suspect that you are connecting your clients to server.hostname.com with clientdomain.com for both IMAP and SMTP. Then first of all need to create a subdomain called ” autodiscover.hostname.com ” to store the  XML. 1) Need to setup SRV record on the mentioned client domains “clientdomain.com” DNS zone: _autodiscover._tcp.clientdomain.com. 3600 IN SRV 10 10 443 autodiscover.hostname.com. 2) Next, need to create the subdomain autodiscover.hostname.com in Directadmin, then can we add the follwing code into a file called autodiscover.php: <?php //get raw POST data so we can extract the email address $data = file_get_contents(“php://input”); preg_match(“/\<EMailAddress\>(.*?)\<\/EMailAddress\>/”, $data, $matches);   //set Content-Type header(“Content-Type: application/xml”); echo ‘<?xml version=”1.0″ encoding=”utf-8″ ?>’; ?>   <Autodiscover xmlns=”http://schemas.microsoft.com/exchange/autodiscover/responseschema/2006″> <Response xmlns=”http://schemas.microsoft.com/exchange/autodiscover/outlook/responseschema/2006a”> <Account> <AccountType>email</AccountType> <Action>settings</Action> <Protocol> <Type>IMAP</Type> <Server>server.hostname.com</Server> <Port>993</Port> <DomainRequired>off</DomainRequired> <LoginName><?php echo $matches[1]; ?></LoginName> <SPA>off</SPA> <SSL>on</SSL> <AuthRequired>on</AuthRequired> </Protocol> <Protocol> <Type>POP3</Type> <Server>server.hostname.com</Server> <Port>995</Port> <DomainRequired>off</DomainRequired> <LoginName><?php echo $matches[1]; ?></LoginName> <SPA>off</SPA> <SSL>on</SSL> <AuthRequired>on</AuthRequired> </Protocol> <Protocol> <Type>SMTP</Type> <Server>server.hostname.com</Server> <Port>587</Port> <DomainRequired>off</DomainRequired> <LoginName><?php echo $matches[1]; ?></LoginName> <SPA>off</SPA> <Encryption>TLS</Encryption> <AuthRequired>on</AuthRequired> <UsePOPAuth>off</UsePOPAuth> <SMTPLast>off</SMTPLast> </Protocol> </Account> </Response> </Autodiscover>  SRV record always using port 443 for autodiscover.hostname.com, So make sure you have got a valid certificate setup for this subdomain. You can check this by entering the domain on https://www.sslshopper.com/ssl-checker.html or can try to access it on a browser with https://autodiscover.hostname.com 3) Finally, we will need to set up a .htaccess hidden file so that we can trace any request to the needed subdomain like autodiscover.hostname.com results in the autodiscover.php being called. We need to add the following lines to the .htaccess file under the subdomain DocumentRoot. RewriteEngine On RewriteCond %{REQUEST_FILENAME} -s [OR] RewriteCond %{REQUEST_FILENAME} -l [OR] RewriteCond %{REQUEST_FILENAME} -d RewriteRule ^.*$ – [NC,L] RewriteRule ^.*$ autodiscover.php [NC,L]   If you need any further help, please do reach our support department.
Read more

Set up DirectAdmin to Use a Remote MySQL Server

We can set up MySQL to be run on an external server when we have a large database that would require management and monitoring of its own. The best way to do so is to host MySQL on a different server. Then we can connect our application to our Remote MySQL database which is pretty simple. This shouldn’t be needed too often, as usual, you can just move all those user accounts to another server to comfort and maintain the load. But in the case of a large database using up the whole server, you don’t have many choices. Set up DA to Use a Remote MySQL Server 1) Firstly, install MySQL on the remote server. DirectAdmin is not required on this server, as it just used to host our MySQL Databases and nothing else. 2) The next move is to create/setup up a user that a DirectAdmin can connect to on the remote MySQL server. Normally the default user for DirectAdmin is da_admin, so the connection with the same name is better but not required. The username and password you have created for the new user must be set in the /usr/local/directadmin/conf/mysql.conf file for DirectAdmin to use. On a side note, if the remote server is on a LAN IP, and the connecting IP to that remote server will not be the same as your server IP, but rather some other IPs. Instead of server IP, you can add an access host by default in the /usr/local/directadmin/conf/mysql.conf file. Add the following line to the file mentioned in the previous paragraph: access_host=x.x.x.x Where x.x.x.x is the IP or host will be the IP address of your remote database server. Please note that the above given method is only for grants da_admin on the “localhost”, meaning you have to already be on that remote MySQL server to use the account. You will need to add another access host or IP to allow the DA server to connect to it. Normally, you just run the GRANT ALL PRIVILEGES ON *.* TO da_admin@localhost command again, but change localhost to the IP of your DA server. Just like this. GRANT ALL PRIVILEGES ON *.* TO da_admin@1.2.3.4 WITH GRANT OPTION; FLUSH PRIVILEGES; We don’t need the “identified by pass” again in this case, because the password is already from adding it the first time. 3) In this instance, the remote MySQL database will be ready and found to accept the DA to use it. You can test this by logging to your DA via SSH and then type: mysql -uda_admin -p --host=x.x.x.x Where x.x.x.x is the IP of your MySQL server. If you are not able to connect, then you must need to check your settings again, also make sure that the MySQL port 3306 is open on the remote box. 4) Then tell DirectAdmin to use the remote server. Edit the configuration file: /usr/local/directadmin/conf/mysql.conf add the line: host=x.x.x.x where x.x.x.x is the IP of your remote server. Make sure there is a newline character at the end of the line. (Eg, press enter) 5) Enter into DA and check the MySQL section of your user level to see if you get any kind of errors related to this. If not, then you can try for adding a database to make sure it works. 6) The only authorize task would then be to fix up phpMyAdmin also connect to the remote host. To do so, Edit /var/www/html/phpMyAdmin/config.inc.php. Then find the following line in the configuration file: $cfg['Servers'][$i]['host']          = 'localhost'; // MySQL hostname or IP address Change it to the following. $cfg['Servers'][$i]['host']          = 'x.x.x.x'; // MySQL hostname or IP address Where x.x.x.x is the IP of your MySQL server. 7) For new MySQL user databases, you will need to tell the DirectAdmin about the new IP, so they have that IP assigned into their access hosts.
Read more

How to Manually Clone WordPress Website?

The process of creating a replica of your website is known as website cloning. By using this clone, you can create blueprints, perform updates, test compatibility, and more before implementing the changes on your website. By this method, you can safely implement any changes to your live website. In this tutorial, we are going to check How to Manually Clone a WordPress Website. Why Do You Need to Clone Your Website? Every power user of WordPress has access to create the exact copy of your website. This feature is most helpful for web agencies that have several websites across multiple WordPress hosting providers. Whenever an issue occurs on your live website, you can create a clone and try the fixes in that copy until you get a resolution. So, it is easy to implement the correct resolution on your live website. If you want to update a theme in a website without breaking any service, then you can follow the below steps: First, take the clone of your website. Update the theme on the clone. Do all the necessary testing. Then, either remove the previous version or make this clone website as the original version of your website. The scenarios when you need to create a clone for your website are: 1) TO PERFORM COMPATIBILITY TEST You can perform the compatibility testing on your website to check if all the components are working as expected and also if the website codebase is capable of running on software and hardware infrastructure. While performing the compatibility test, you need to make some changes to your website. So, we suggest you perform these tests on a cloned or staging website instead of the live website. Similarly, perform all the processes that can affect your website on the clone, such as code change, implement themes and plugin updates, installation of untested themes, and more. 2) TRANSFER OF YOUR WEBSITE TO NEW SERVER The transfer of a website from one hosting provider to another seems to be easy. But it is always essential you create a clone of your website along with the backup of website files and databases before the transfer. If the website gets broken after the transfer, you can use the clone of your website to recover. 3) TO CREATE A BLUEPRINT The website builders use blueprints to create their website. These blueprints are stored in a shared location to speed up the development process, and these setups include code-level customization, plugins and themes configuration, and more. 4) TO BACK UP YOUR WEBSITE You can also use the cloning process to help make a backup (web files and database) of your website and store that in an offsite location. We can use this cloned website stored in offsite locations during disaster recovery. You can use different WordPress plugins to create a clone of your website. Clone a WordPress Website You can clone your WordPress website using multiple methods. But in this knowledge base, we discuss how to clone a WordPress website manually. CLONE A WORDPRESS WEBSITE MANUALLY The manual process of cloning your WordPress website includes the following steps:  Compress WordPress Files First, you need to clone your website is to compress all the files and folders in your public_html directory. For the same, follow the below steps: Log in to your cPanel as a root user. Navigate to the ‘File Manager’ and select the ‘public_html’ directory of your WordPress installation. Then, select all the files and right-click to select the ‘Compress’ option.   Then, select the compress file type and enter the name of the compressed archive. Click the ‘Compress File(s)’ button. Upload the Compressed File After the download, you can upload the compressed file to the new hosting location via FTP or SSH. The SSH is faster than the FTP upload. To upload the compressed file to the new location, follow the below process. Log in to the new hosting location via SSH as a root user. Switch to the folder in which you want to upload a copy of your WordPress website. Make sure that the folder is empty. If it is not empty, save all the essential files and folders to a safe location and then run the following command to empty the folder. # rm -rf * Then download and unzip the generated zip file. # wget </URL/of/the/Zip/File> # unzip <filename>.zip Replace the </URL/of/the/Zip/File> and <filename> flags in the above commands with the actual URL of the website zip file and name of the file, respectively. Database Migration All the web files got uploaded to the new location. After that, we need to import the database to the new location. To export the database from the current location, and then import it to the new location, follow the below process. Log in to the database manager (phpMyADmin) and select the database. Navigate to the ‘Export’ option and download the ‘.sql’ file. Then, log in to the new database manager and click the ‘Create Database’ button. Navigate to the ‘Import’ option. Click ‘Choose File’ and upload the downloaded ‘.sql’ file. Update the wp-config.php Next, you need to update the wp-config.php file to make sure that the WordPress installation on the new location gets connected with the new database. Go to the ‘public_html’ folder and open the ‘wp-config.php’ file. Then, enter the new database credentials. Conclusion Website cloning is the process of creating an exact duplicate of your website. By using this clone, you can create blueprints, perform updates, test compatibility, and more before implementing the changes on your website. We hope this knowledge base was helpful to you. Please comment below for any questions or queries. If you are an YISolutions customer, please reach out to our support team for further help.
Read more

How to install WordPress multi-site using cPanel softaculous

As we already explained what is WordPress MU or WordPress Multi-site  – Let us show you how you can install one in few clicks under cPanel with the help of Softaculous. Login to cPanel: (If you do not remember cPanel login details, feel free to reach our support) Select WordPress from Softaculous App Installer     Click on Install Now:  That will select the latest version of WordPress version available under Softaculous app installer.     Select HTTPS protocol:  We offer FREE SSL for domains hosted under Shared hosting plans which use our hosting plan’s nameservers. Select the correct domain name. It is recommended to remove WP from directory field.  Softaculous by default populate a default directory name to avoid users overwrite an existing WordPress installation under domain root folder. Select Enable Multisite (WPMU) : This will create a WordPress Multi-site installation once you complete the setup.     It is recommended to follow these additional configurations to keep your WordPress secure by enabling auto-update and daily backups    
Read more

Migrate WordPress to cPanel in easiest way

Very first question sparks your mind post ordering a Shared Web-hosting plan might be – How to migrate your WordPress website from old web-hosting provider to YISolutions. What if we told you that there is a single button click WordPress data migration option available for a Shared hosting cPanel users. Isn’t it something interesting!  Yes it is. This awesome option is available through Softaculous app installer tool we offer under Shared Linux Hosting plans. Here are few steps you shall follow to import WordPress data from an active control panel which supports FTP.   Login to cPanel: (If you do not remember cPanel login details, feel free to reach our support) Select WordPress from Softaculous App Installer Click on Import button you see post loading WordPress Installation page from Softaculous     Fill in the requested details of your previous hosting provider and select the correct domain name under Destination >> Choose Domain     Click on Import and wait for the import to be completed.     This is one of the safest way to migrate in a complete WordPress installation to YISolutions shared hosting cPanel servers.
Read more
Cart

No products in the cart.