Blogs

How To Install WordPress Manually Using cPanel

Install WordPress Manually As you are probably aware, most reputable hosting providers these days include automated WordPress install tools such as MOJO, Softaculous, etc. These installers work great in many cases, but often stuff your site full of unwanted plugins and themes. In addition, these automated tools have a reputation for timing out or being completely unavailable at times, which can be frustrating if you’re on a deadline. In this post we will walk you through the steps to successfully install WordPress manually using your cPanel. As an added bonus we have also included a tutorial video at the bottom of this post and a handy-dandy PDF Cheat Sheet with some useful instructions and links. Let’s get started, shall we? Step 1: Download the most recent version of WordPress to a location of your choice at WordPress.org   Step 2: Upload and extract the WordPress .ZIP file to your desired installation directory. Okay so at this point I am assuming that you already have a hosting provider using cPanel and that you have already created an Add-On Domain or Subdirectory. Within the File Manager, locate and navigate to that directory. From the top toolbar of the cPanel, select “Upload” and browse for the file you downloaded from WordPress.org. Once the .ZIP file has finished uploading, return to the directory by clicking the “← Go Back to “/home/yourserverhere/public_html/yoursitehere” link. Within the directory root you will now see the wordpress.zip file. Click on this file to select it and then from the cPanel tool bar at the top, click “extract”. After that click “reload” in the cPanel toolbar and you will see the extracted wordpress folder. You can now delete the .ZIP file in order to keep everything nice and clean. Step 3: Move files from the wordpress folder back into the directory root. Double click on the newly extracted “wordpress” folder and you should now see all the WordPress files. From the cPanel toolbar, click on the box “Select All”. All of the WordPress files should now be highlighted. In the cPanel toolbar select “Move File” and a modal will pop up with a directory link “/public_html/yourdirectoryname/wordpress”. Remove the “/wordpress” tail from the end of the path and click Move File(s). All files should now be moved to your directory root and click “Up One Level” from the toolbar to view them. Step 4: Create a database and database user We have finished the initial steps and now it’s time to setup the database that will power your website. Navigate to your cPanel’s main dashboard and locate/click the icon “MySQL Database Wizard”.   Once inside the Database Wizard you will be prompted to create a New Database. Your database prefix will appear followed by an underscore and a blank area for you to populate your database name “yourserver_blankarea“. In the blank area you will enter your database name and keep it in a safe spot for a future step. The database name should be at least 3 characters and only contain alphanumeric characters. After filling in the name click “next step”.   You will now be prompted to create a Database User. Your database prefix will appear again followed by an underscore and a blank area for you to populate your database username “yourserver_username“. The database username cannot contain more than seven alphanumeric characters. Save the username to a safe location for future use. Now either manually enter a password of your choice or use the provided “Password Generator”… just make sure that your password is strong and secure. Now click on the button “Create User”.     Now that you have created the Database User, you will be brought to a page that asks you to assign privileges. Tick the box at the top that reads “All Privileges” and then click the button “Next Step”. Your database is now set up and you can now move on to plugging the database information into the wp-config.php file. Step 5: Populate the wp-config.php file with your database information Okay now it is time to navigate back to the proper directory in the file manager with your database information handy. In your site’s directory root, locate the file named “wp-config-sample.php“.  Click on this file and then select “Code Editor” from the top toolbar, click “Edit” and open the .php file. Now that the wp-config-sample.php file is open in the Code Editor, it is time to start adding your database information… Locate the line that reads “define(‘DB_NAME‘, ‘database_name_here‘);” and add your database name. Locate the line that reads “define(‘DB_USER‘, ‘username_here‘);” and add your database username. Locate the line that reads “define(‘DB_PASSWORD‘, ‘password_here‘);” and add your database password. Step 6: Replace default Unique Keys and Salts With your wp-config-sample.php file still open in the Code Editor, navigate to the section that reads “*Authentication Unique Keys and Salts”. Visit the WordPress Unique Phrase and Salt Key generator here >> or as linked in the provided PDF “Cheat Sheet“. Copy the Unique Phrase and Salt Keys generated by the WordPress API and replace the default ones located in the wp-config-sample.php file. Once you are finished with that, hit “Save” and exit the Code Editor and return to the directory root. Step 7: Rename “wp-config-sample.php” to “wp-config.php” Now that you are back in the directory’s root, single click on the wp-config-sample.php file to highlight it. From there click on the “Rename” icon in the top toolbar and rename “wp-config.sample.php” to “wp-config.php”. Click the “Rename File” button and you’re all finished with this phase.   Step 8: Run the WordPress Installation Script At this point you are all finished with the cPanel portion of this process… congrats! Now it is time to run the WordPress Installation Script by visiting this link here >> or the one provided on the PDF Cheat Sheet. Once you have visited the link for the Installation Script, you will be brought to a page with the URL “https://example.com/wp-admin/install.php”. Replace the “example.com” with the address of the website you are creating. Hit Return/Enter on your keyboard and the install process will begin. Once you have arrived at the next screen, select
Read more

How to create/modify SPF records for domain in Plesk?

Create or Modify SPF records in Plesk By default, Plesk has the following SPF record preconfigured out-of-the-box: example.com TXT v=spf1 +a +mx +a:server.example.com -all The parts of this record mean the following: Part Description v=spf1 The domain uses SPF of the version 1. +a All the hosts from the “A” records are authorized to send mail. +mx All the hosts from the “MX” records are authorized to send mail. +a:server.example.com The domain server.example.com is authorized to send mail. -all All other domains are not authorized to send mail.   If it is necessary to modify the record, use the steps below: Log into Plesk. Go to Domains > example.com > DNS Settings. Click on the domain’s name in the record and modify the record as required:
Read more

How to enable DKIM in Plesk?

How to enable DKIM (spam protection)  in Plesk? Log into Plesk. Go to Tools & Settings > Mail Server Settings > DKIM spam protection section. Enable the Allow signing outgoing mail or/and Verify incoming mail (For Plesk on Linux only) and press the OK button: Verify incoming mail (Plesk for Linux). This option switches on DKIM checking for all incoming mail. All messages are checked, and if the check fails, are marked with a special header. Allow signing outgoing mail. This option enables customers to switch on the DKIM signing of outgoing mail on a per-domain basis. Warning:  It does not automatically enable the signing of outgoing email messages. To use DKIM, users must switch it on for individual domains
Read more

How Can I Track Emails Coming In To Sonicwall Email Security?

How Can I track emails coming in to Sonicwall Email Security? Tracking emails. You can trace a particular email and find out if it ever hit the sonicwall device and or it was rejected, deleted, Junked or bounced. Any email that hits the Email security device irrespective of being rejected, deleted, bounced, junked, gets recorded in a log file called “Mfe” Please follow the following steps to get to the log:   Login into the device as “admin” Go to Manage | System Setup | Server | Advanced |download system/Log files: Logs: Mfe (select from the drop down as shown below) It will display logs with dates on it as the file name. Select the date which you want to track emails for and do a search on the email. You can search using the sender’s or recipients email address or subject of the email. The log entries would show the message location, Message threat, Sender’s IP, date and time sent to, along with other information. To view it in readable format, open the log file in MS excel. Message Location category: ju= Junk box rj = rejected dv = delivered qu = queued bo = bounced Message Threat Category: ddha = Definate directory harvest attack dspm= Definate Spam lspm = Likely Spam dvir = Definate Virus lvir = Likely Virus dphi= Definate Phishing lphi = Likely Phishing good = good email (no Threat) Plyt = Policy Threat Example of 1 email’s Mfe log entry: 5     px    i     ju   dspm   192.168.6.110_    —-  ————–    —————   —–    —-  ——-p—-      ————      200911160004590086296      testmail@sonicwall.com  –  testaccount@test.com    testaccount@test.com    “John Smith”      Your credit balance is over its limit     3289  emailsecurity     192.168.1.10      25    collab      –     –     rules:rules:Score=-31.26      518d52eee664842c  en_US      <000d01ca6655$931ac960$6400a8c0@withoj2>  192.168.6.110     Conclusion: Version= 5 Inbound/outboud = i Msg/Location= ju MsgThreat= dspm GotfromIP = 192.168.6.110 MlfUniqueId = 200911160004590086296 EnvRcptTo = testmail@sonicwall.com EnvMailFrom = testaccount@test.com HdrFromAddr = testaccount@test.com HdrSubject = your credit balance is over its limit MsgSizeInBytes= 3289 NqMlfHost = emailsecurity NextHopServer = 192.168.1.10 NextHopPort = 25 Categories = collab Reason = rules:rules:Score=-31.26 SecuritySecret = 518d52eee664842c MsgLanguage = en_US (English- US) Message-ID = <000d01ca6655$931ac960$6400a8c0@withoj2> FirstTouchIP = 192.168.6.110
Read more

What Is Directory Harvest Attack? And How Can We Protect Against Directory Harvest Attack (DHA) ?

What is Directory Harvest Attack? A Directory Harvest Attack or DHA is a technique used by spammers to find valid/existent  email addresses at a domain either by using Brute force or by guessing valid e-mail addresses at a domain using different permutations of common username. Its easy for attackers to get hold of a valid email address if your organization uses standard format for official e-mail alias,   EXAMPLE:  jsmith@example.domain, johns@example.domain, or johnsmith@example.domain How Can we protect against Directory Harvest Attack (DHA) ? Spammers can threaten your network with junk mail if they get a list of all users in an organization’s directory or can guess email addresses from your organization. DHA Protection Feature of Email Security can help to protect organizations vulnerable to increased attacks on their email and other data systems. To use DHA feature Login onto the Email security Server as Admin Go to Manage | Security Services | Connection Management | Directory Harvest Attack (DHA) Select from the following options for handling email addressed to people who are not in your directory: ⦁ Directory Harvest Attack (DHA) protection off (process all messages the same whether or not the email address is in LDAP)- This option means DHA protection is OFF  ⦁ Permanently delete–  This option will delete any email that comes in for an Invalid Email address. The deleted email cannot be retrieved.  ⦁ Reject invalid addresses (Tarpitting)– This option will reject the email if it is going to an Invalid email address and tarpits the connection for the amount of time selected. (0-3 seconds, best set to 0 as optimal)  CAUTION: Enabling tarpitting protection uses system resources (CPU, memory) and may slow down your server. Also, rejecting is not truly a form of DHA Protection, but it can slow down the sending machines, but as a side effect, the delay you impact also delays your machine. ⦁ Always store in Junk Box – This option will store emails going to invalid users in Junk box regardless of any spam rating.   You can also setup DHA based on Domain names by setting the following: ⦁ Apply to all recipient domains– This Option, when selected, would apply the above DHA settings to all the recipient domains on your network.⦁ Apply only to the recipient domains listed below– This Option will allow you to enable DHA only for domain names listed in the box⦁ Apply to all recipient domains except those listed below– This Option will allow you to disable DHA only for domain names listed in the box  NOTE: you can add multiple domains in the box separated by <CR>    DHA takes a priority regarding how emails are judged. Once a message is detected as DHA will not go through any other actions and will abide by you DHA selection.   To use the DHA feature on email security you will first need to configure LDAP configuration on email security server. This will pull all the users and email address from your LDAP server and email security will recognize valid emails using the LDAP configuration. Make sure you see all valid users under Manage|Users, Groups & Organizations|Users on Email security server after you configure LDAP.  NOTE: If the navigation or the screenshot looks different from the one mentioned above , you may be in an older firmware version and would require a firmware upgrade. Please refer the link below to upgrade the firmware to latest version.
Read more

How to Manage Users in Plesk

This article describes how to create and manage users for a Plesk account. User accounts enable you to grant access to specific people. These people can then access Plesk to manage websites, applications, or e-mail under your domains. To create a user in Plesk, follow these steps: Log in to Plesk. In the left sidebar, click Users: On the Users page, click Create User Account. On the Create User Account page, under General Information, in the Contact name text box, type a name for the contact. In the Email address text box, type the e-mail address of the user. In the User role list box, select the user role you want to assign to the user. In the Access to subscriptions list box, select the subscription or subscriptions to which you want the user to have access. Under Plesk Preferences, in the Username text box, type a username for the user. In the Password and Confirm password text boxes, type a password for the user. In the Plesk language list box, select the language for the user. Confirm the User is active check box is selected. Click OK. Plesk creates the user. MANAGING A USER To manage an existing user on your Plesk account, follow these steps: Log in to Plesk In the left sidebar, click Users: On the Users page, click the name of the user you want to manage. On the user account page, click Change Settings. Change the settings you want to modify, and then click OK. Plesk updates the user account. REMOVING A USER You can remove an existing user at any time if you no longer want them to have access to your account. To do this, follow these steps: Log in to Plesk. In the left sidebar, click Users: On the Users page, select the check box next to the name of the user you want to remove. Click Remove, and then click Yes. Plesk deletes the user account.
Read more

How to configure Dropbox backups in Plesk

This article describes how to configure Dropbox backups in Plesk. You can do manual Dropbox backups, or you can configure automatic daily backups. CONFIGURING DROPBOX BACKUPS To configure Dropbox backups for your account, follow these steps: Log in to Plesk. In the right sidebar, click Dropbox Backup: At the Dropbox login page, type your Dropbox e-mail and password. At the folder access page, click Allow: The Plesk Websites & Domains page appears: To create a backup immediately, click Back up Now. To view any tasks that are currently running, click the Current Tasks tab. To change Dropbox settings, click the Settings tab. To enable a scheduled backup, select the Enable Scheduled Backup check box, and then in the Scheduled Time (daily at) text box, type the time when you want the backup to run. Click OK.
Read more

How to use Plesk to protect directories with a password

This article describes how to use Plesk to protect specific directories with a password. Visitors to password-protected directories must enter a username and password to view the directory’s contents ADDING PASSWORD PROTECTION TO A DIRECTORY When you add password protection to a directory, site visitors are prompted for a username and password when they try to access it. They can only view the directory contents after typing a valid username and password. To add password protection to a directory, follow these steps: Log in to Plesk. In the left sidebar, click Websites & Domains: Click the Password-Protected Directories icon. Under Tools, click Add Protected Directory. Under Settings, in the Directory name text box, type the name of the directory you want to protect. In the Title of the protected area text box, you can optionally type a name for the protected directory. Click OK. Under Protected directories, click the name of the directory you specified in step 5. Under Tools, click Add a User. Under Protected directory user, in the Username text box, type a name for the user. In the New Password and Confirm Password text boxes, type the user’s password. Click OK. Password protection is now enabled for the directory. REMOVING PASSWORD PROTECTION FROM A DIRECTORY You can remove password protection from a directory if you no longer want to protect it with a password. To do this, follow these steps: Log in to Plesk Locate the directory for which you want to remove password protection, and then select the check box to the left of the directory name. Click Remove Protection. On the Removal Confirmation page, select the Confirm removal check box. Click OK. Plesk removes password protection for the directory.
Read more

How to Generate CSR in Webuzo

CSR Generation : Webuzo Overview This page will help you in Creating Certificate Signing Request (CSR) for your domain. Navigate to CSR Navigate to the Certificate Signing Request menu under the Security section in the Webuzo Enduser Panel.  Procedure You must have Private Key for the Domain for which you want to create the Certificate Signing Request (CSR). Populate the details for creating the Certificate Signing Request (CSR) Note : Certificate Signing Request (CSR) can be created without Pass Phrase as well.   Click on Create Button to Create a Certificate Signing Request (CSR).  Required Inputs Domain – Specify the domain for which the Certificate Signing Request(CSR) is to be created. Country Code – 2 letter abbreviation e.g. US or IN. State – Name of the State or Province. Locality – Name of the City or Town. Company Name – Name of your Company or Organisation. Company Branch – Name of the Organisation branch or Division. Email Address – Specify the email address to be assigned to the Certificate Signing Request(CSR). Pass Phrase – Pass Phrase is similar to a PASSWORD.
Read more

How to Set up Email Accounts in Webuzo

Overview This guide allows users to setup email for their Webuzo. It help to setup the PHP Mailer or SMTP server to suit the needs of the users. The Email settings can be found under the Settings Tab in the Admin Panel. Inputs Mailing Method defines the method to be used to send emails from Webuzo Enduser Panel. i.e either PHP’s mail() function or SMTP server setup SMTP Details : SMTP Server: – state the SMTP server to be used. For e.g smtp.example.com SMTP Port: – states the SMTP Port to be used. Username: – states the SMTP username to authenticate sending emails. Password: – states the password to authenticate the SMTP user.  
Read more
Cart

No products in the cart.