Cpanel 11 User Manual

Total Page:16

File Type:pdf, Size:1020Kb

Cpanel 11 User Manual cPanel 11 User Manual Table Of Contents README FIRST ...................................................................................................1 README FIRST................................................................................................1 Common Questions ..............................................................................................3 Common Questions ..........................................................................................3 Advanced..............................................................................................................9 Apache Handlers ..............................................................................................9 Cron Jobs .......................................................................................................10 Error Pages ....................................................................................................12 Frontpage Extensions ....................................................................................14 Image Manager ..............................................................................................16 Index Manager ...............................................................................................20 MIME Types ...................................................................................................22 Network Tools ................................................................................................23 Virus Scanner .................................................................................................24 Databases...........................................................................................................27 Check DB (MySQL) ........................................................................................27 Create User (MySQL) .....................................................................................28 Create User (PostgreSQL) .............................................................................30 Creating A MySQL Database .........................................................................31 Creating A PostgreSQL Database ..................................................................35 Delete A MySQL Database ............................................................................38 Delete A PostgreSQL Database .....................................................................39 Delete User (MySQL) .....................................................................................40 Delete User (PostgreSQL) ..............................................................................42 phpMyAdmin ..................................................................................................44 phpPgAdmin ...................................................................................................45 Remote (MySQL) ...........................................................................................46 Repair DB (MySQL) .......................................................................................47 Domains..............................................................................................................49 Addon Domains ..............................................................................................49 Manage (Setup) Addon Domain Redirection ..................................................51 Manage (Setup) Subdomain Redirection .......................................................53 Parked Domains .............................................................................................55 Redirects ........................................................................................................56 Removing Addon Domains .............................................................................58 Removing Subdomains ..................................................................................59 Subdomains ...................................................................................................60 Files ....................................................................................................................63 Anonymous FTP Controls ..............................................................................63 Change Password (FTP) ................................................................................65 Creating Backups ...........................................................................................66 Creating FTP Accounts ..................................................................................68 Deleting FTP Accounts ...................................................................................70 Download Raw Access Log Files (FTP) .........................................................71 iii cPanel 11 User Manual Edit Disk Space Allocation (FTP) ...................................................................72 FTP Session Control ......................................................................................74 Using The File Manager .................................................................................75 Using Web Disk ..............................................................................................77 Viewing Disk Space Usage ............................................................................79 Logs ....................................................................................................................81 Awstats ...........................................................................................................81 Bandwidth Usage ...........................................................................................83 Choose Log Programs ...................................................................................86 Error Messages ..............................................................................................87 Analog Stats ...................................................................................................88 Latest Visitor Stats .........................................................................................90 Raw Access Logs ...........................................................................................91 Webalizer .......................................................................................................92 Mail .....................................................................................................................95 Add An Auto Responder .................................................................................95 Change Disk Quota (Email) ............................................................................96 Change Password (Email) ..............................................................................97 Check Mail Using Web Mail ...........................................................................98 Configure Mail Client ......................................................................................99 Create A Mailing List ....................................................................................101 Create A New Email Account .......................................................................102 Delete An Email Account ..............................................................................103 Domain Forwarders ......................................................................................104 Email Delivery Route ....................................................................................105 Email Filters ..................................................................................................106 Email Forwarders .........................................................................................108 Email Verification (BoxTrapper) ....................................................................110 Filter Spam (SpamAssassin) ........................................................................114 MX Entry Maintenance .................................................................................116 Setup A Catch-All Email ...............................................................................117 Preferences ......................................................................................................119 Change Language ........................................................................................119 Getting Started Wizard .................................................................................120 Change Look And Feel .................................................................................121 Change Password ........................................................................................122 Update Contact Info .....................................................................................123 Security.............................................................................................................125 GnuPG Keys ................................................................................................125 HotLink Protection ........................................................................................126 IP Deny Manager .........................................................................................127 Leech Protect ...............................................................................................129 Password Protect Directories .......................................................................131 SSH ..............................................................................................................134
Recommended publications
  • Ispconfig 3 Manual]
    [ISPConfig 3 Manual] ISPConfig 3 Manual Version 1.0 for ISPConfig 3.0.3 Author: Falko Timme <[email protected]> Last edited 09/30/2010 1 The ISPConfig 3 manual is protected by copyright. No part of the manual may be reproduced, adapted, translated, or made available to a third party in any form by any process (electronic or otherwise) without the written specific consent of projektfarm GmbH. You may keep backup copies of the manual in digital or printed form for your personal use. All rights reserved. This copy was issued to: Thomas CARTER - [email protected] - Date: 2010-11-20 [ISPConfig 3 Manual] ISPConfig 3 is an open source hosting control panel for Linux and is capable of managing multiple servers from one control panel. ISPConfig 3 is licensed under BSD license. Managed Services and Features • Manage one or more servers from one control panel (multiserver management) • Different permission levels (administrators, resellers and clients) + email user level provided by a roundcube plugin for ISPConfig • Httpd (virtual hosts, domain- and IP-based) • FTP, SFTP, SCP • WebDAV • DNS (A, AAAA, ALIAS, CNAME, HINFO, MX, NS, PTR, RP, SRV, TXT records) • POP3, IMAP • Email autoresponder • Server-based mail filtering • Advanced email spamfilter and antivirus filter • MySQL client-databases • Webalizer and/or AWStats statistics • Harddisk quota • Mail quota • Traffic limits and statistics • IP addresses 2 The ISPConfig 3 manual is protected by copyright. No part of the manual may be reproduced, adapted, translated, or made available to a third party in any form by any process (electronic or otherwise) without the written specific consent of projektfarm GmbH.
    [Show full text]
  • G7: RASC Halifax Centre Website Standard Operating Procedures (SOP) (Adopted November 2, 2019)
    Royal Astronomical Society of Canada (RASC), Halifax Centre Dedicated to the Advancement of Astronomy and Allied Sciences G7: RASC Halifax Centre Website Standard Operating Procedures (SOP) (Adopted November 2, 2019) Background: In October 2005, the standard operating procedures (SOP) for the RASC Halifax Centre website were developed and defined who was responsible for the various aspects of the Centre’s website and for making changes to it. During 2019, the Centre’s website was upgraded to use a new content management system. The SOP was consequently changed to reflect the changes made. Rationale: The SOP defines the assignment of responsibility for making changes to the site on an ongoing basis. Policies Relating to the RASC Halifax Centre Website Standard Operating Procedures: 1. The RASC Halifax Centre maintains a web page at http://halifax.rasc.ca on a server maintained by the Department of Astronomy & Physics, Saint Mary's University (SMUDA&P). Upload privileges are held by selected SMUDA&P staff, the RASC Halifax Centre webmaster, the RASC Halifax Vice-President, and the organizers of the annual Nova East Star Party. 2. The website is created using the Joomla content management system. All page editing is done using a web-based interface. The site for the centre (halifax.rasc.ca) and Nova East (novaeast.rasc.ca) are separate Joomla sites. These sites and associated email addresses and mailing lists are contained in a "Virtualmin" on the serverpluto.smu.ca. The login is at: https://halifax.rasc.ca:10000/ (password can be made available by SMUDA&P staff). 3. The Webmaster reports to the RASC Halifax Centre Board of Directors through the President and accepts new material for the web page from the Board.
    [Show full text]
  • Godaddy's Hosting Services System Description Updated
    GoDaddy’s Hosting Services System Description Background GoDaddy, based in Scottsdale, Arizona, provides a broad range of internet business software and services. GoDaddy’s hosting services refer to the housing, maintenance, and provision of internet service (bandwidth) to servers. GoDaddy offers the following hosting services which are covered by this system overview: • Web Hosting including cPanel for Linux, Parallels Plesk for Windows, and legacy Shared/Grid Hosting products (4GH) • WordPress Hosting • Servers – Dedicated and Virtual Private GoDaddy’s hosting services are housed in the following domestic and international data center locations, with the breakdown of hosting services as referenced in the table below: Data cPanel Plesk Legacy WordPress Dedicated Virtual Center Shared Private Virginia √ √ √ √ √ Arizona √ √ √ √ √ √ Netherlands √ √ √ √ √ Germany √ Singapore √ √ √ √ Infrastructure Shared web hosting services and WordPress hosting house multiple customers in a single server cluster, following a multi-tenant architecture. Customers interact with their hosting environment using the applicable control panel – cPanel for Linux, Parallels Plesk for Windows, and Hosting Control Center (HCC) for the legacy shared environment. Customers manage their own content including information stored on MySQL and MSSQL customer databases. Customers are also responsible for website setup and backups. GoDaddy manages system and hardware level security and patching. Updated: December 30, 2019 Page 1 GoDaddy’s Hosting Services System Description Dedicated servers in VA and AZ provide customers with an entire single-tenant virtual server housed on a single hypervisor1. Initial configuration is performed by provisioning code on the hypervisor based on customer elections made during the setup process. The customer manages system level access and is responsible for server setup, security, patching, and backups while GoDaddy manages hardware level security for all dedicated servers.
    [Show full text]
  • For Your Linux Server
    cPanel // Linux Server Getting Started Guide cPanel for your Linux Server AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1 cPanel // Linux Server Getting Started Guide: cPanel, Linux Server Version 2.2 (1.6.2012) © Copyright 2012. All rights reserved. Distribution of this work or derivative of this work is prohibited unless prior written permission is obtained from the copyright holder. Trademarks used in this book Linux® is a registered trademark of Linus Torvalds. cPanel® is a registered trademark of cPanel, Inc. SSH® and Secure Shell® are trademarks of SSH Communications Security, Inc. RedHat® and Fedora® are registered trademarks of Red Hat Software, Inc. Mac® is a registered trademark of Apple Computer, Inc. UNIX® is a registered trademark of The Open Group. Windows XP®, Entourage®, and Outlook® are registered trademarks of Microsoft Corporation in the United States and/or other countries. Thunderbird™ is an unregistered trademark of the Mozilla Foundation. All other trademarks and copyrights are the property of their respective owners. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 2 cPanel // Linux Server Table of Contents Introduction 5 SECURITY INFORMATION! 5 REPROVISIONING YOUR SERVER! 6 GETTING HELP! 7 OTHER RESOURCES! 9 Setting Up Your Dedicated Server 10 CHOOSING A HOST NAME, USER ID, AND PASSWORD! 10 LOGGING IN TO YOUR MANAGER FOR THE FIRST TIME! 13 Connecting to Your Dedicated Server 14 CONNECTING TO YOUR SERVER USING WHM! 15 CONNECTING TO YOUR SERVER USING SSH! 20 GAINING ROOT ACCESS ON YOUR SERVER! 22 AKJZNAzsqknsxxkjnsjx
    [Show full text]
  • Webmaster - Web Designer
    Webmaster - Web Designer (INTERNATIONAL LOGISTICS – GLOBAL SUPPLY CHAIN) Baltimore, MD 21230 (Locust Point, McHenry Row) O Web Designer, Webmaster, wherefore art thou creative website guru? In a world facing new challenges, a nimble but steady ship is more important than ever. Is there a seat on our boat for you? Want a career, not a job? Find out. In a modern era where expertise is often devalued, Shapiro stands strong at 105-years old. We’re so compliant that US Customs learns from us! Our headquarters was named as a “Best Place to Work.” Shapiro is not your grandpa’s shipping company. We have a track record of transparency, developing employees, and investing in our environment like office space and now…work-from-home technology. At Shapiro, our Web Designer/Webmaster is an integral member of Shapiro's marketing team. Responsibilities include bringing Shapiro's digital website strategy to life across all digital touchpoints. You will also own the shapiro.com web platform to expand our brand presence, maintain our website content, and ensure security. JOB DESCRIPTION Responsibilities include: • Design website pages that are user-friendly, attractive, and engaging while remaining loyal to the company brand and promoting the company image and values. Excellent internal customer service in an engaging environment. • Add new site elements and update content on existing pages to keep the website fresh and exciting. • Ensure all content is optimized for search engines (SEO) to drive traffic to pages. • Track and analyze all website visitors and create regular analytics reports to show increases and decreases in traffic/conversions.
    [Show full text]
  • How to Install Webmin/Virtualmin in Linux (Centos 7)
    Advanced Network/System Administration and Security Workshop ECE Building, Building, BUET, Dhaka Date: 10-12 December 2019 How to Install Webmin/Virtualmin in Linux (CentOS 7) What Is Virtualmin? Virtualmin is a Webmin module that is typically used to manage multiple virtual hosts through a single interface, similar to cPanel. It supports multiple functions such as creating/managing Apache virtual hosts, MySQL database creation/management, generating DNS zones, managing mailboxes, and much more. How Do I Install Virtualmin On CentOS 7? This guide implies that you’re using the root account on Cloud, VPS or Dedicated Server to perform the installation and that you have a basic working knowledge of a Linux shell. We highly suggest taking a backup of your server prior to proceeding with this script. Although this document is written for CentOS 7, Virtualmin offers an automated installation script for the following distros: • CentOS/RHEL/Scientific Linux 7 on x86_64 • CentOS/RHEL/Scientific Linux 5 and 6 on i386 or x86_64 • Debian 6, 7, and 8 on i386 or amd64 • Ubuntu 12.04 LTS, 14.04 LTS, and 16.04 LTS on i386 or amd64 (non-LTS releases are not supported) The following steps can be utilized to install Virtualmin in a CentOS 7 (RHEL 7) environment on a fresh OS installation. 1. Ensure your server is up to date sudo yum update -y 2. Download the Virtualmin installer script using wget sudo wget http://software.virtualmin.com/gpl/scripts/install.sh 3. Execute the install script Md. Ariful Islam Manager (Data & Transmission Network), BdREN E-mail: [email protected] Advanced Network/System Administration and Security Workshop ECE Building, Building, BUET, Dhaka Date: 10-12 December 2019 sudo sh install.sh As per the warning when the script is executed ensure that your OS is listed and type “y” then press “Enter” to continue with the installation If prompted you may need to enter in a fully qualified hostname.
    [Show full text]
  • Fuzzy Attacks on Web Logs
    Institut für Technische Informatik und Kommunikationsnetze Laura Peer Fuzzy Attacks on Web Logs Group Thesis (GA)-2011-09 August 2011 to September 2011 Tutor: David Gugelmann Co-Tutor: Dr. Stephan Neuhaus Supervisor: Prof. Dr. Bernhard Plattner 2 Abstract Oftentimes, weaknesses in web applications arise because input is not properly validated. Web programmers can make mistakes or may simply not conceive of every possible input scenario provided to their application. In this thesis we use the method of fuzzing, the automated process of feeding pseudo random input data to a program, to test web applications for bugs. Our target applications are web logs. With the help of a small program which was written for our specific task, we have discovered a number of problems and vulnerabilities. 3 4 Contents 1 Introduction 7 1.1 Motivation........................................7 1.2 The Task........................................7 1.3 Related Work......................................8 1.4 Overview........................................9 2 Background 11 2.1 Fuzzing......................................... 11 2.1.1 The Fuzzing Process............................. 11 2.1.2 Random Data Generation........................... 11 2.1.3 Vulnerabilities.................................. 12 2.2 Fuzzing the HTTP Protocol.............................. 16 2.2.1 Client to Server Transmission Analysis.................... 16 2.2.2 Server Response and Detection Methods.................. 18 2.3 Web Application Input................................. 19 3 Design 21 3.1 Analyzing the Web Log with a Web Crawler..................... 23 3.2 The HTTP Communication Interface......................... 23 3.3 Fuzzed Data Generation................................ 24 3.4 The Main Program Loop................................ 24 3.4.1 Working with the Web Sniffer Output..................... 24 3.4.2 The FuzzField Class.............................. 25 3.5 Error Detection Mechanisms............................
    [Show full text]
  • Projects on the Move
    LINUXCOVERCOMMUNITY USERSTORY SchlagwortSchlagwortFree Software sollte sollte Projectshier hier stehen stehen Schlagwort sollte hier stehen COVER STORY An up-to-date look at free software and its makers PROJECTS ON THE MOVE Free software covers such a diverse range of utilities, applications, and assorted projects that it is sometimes difficult to find the perfect tool. We pick the best of the bunch. This month we cover blogging – the latest buzz, the latest on the DPL elections, and more trouble at Debian. BY MARTIN LOSCHWITZ he EU is entering the second use, install, and configure. For example, extensible. B2 Evolution also has themes round of the battle over software administrators do not need to create a to allow users to design their own blogs. Tpatents. While supporters have database or waste time trying to set one Like the other solutions, Serendipity successfully had the directive passed by up, as Blosxom uses simple text files. [3] aims for ease of use. Themes and the EU Council of Ministers, opponents Entries can be created in the web inter- skins allow users to modify the blog soft- of patents are increasing the pressure face and uploaded via FTP or WebDAV. ware’s appearance. Version 0.8, which is prior to the second reading. The number Plugins add all kinds of functionality to still under development, even supports of pages warning about the danger of Blosxom. The default package supports Smarty framework [4] templates. software patents continues to grow. And RSS feeding of blog entries, and themes Serendipity can also manage multiple it appears unlikely – although by no give the Blosxom blog a pleasing appear- user accounts.
    [Show full text]
  • Control Panels
    Control Panels cPanel Plesk Direct Admin Other Control Panels Docker cPanel Intro CrossBox for cPanel is one of our most popular control panel integrations. It's Plug-and-Play in its core, covering 95% of all cPanel setups out of the box. Our deep integration with cPanel hooks and APIs enables an automated and fine- tuned experience for both the end-user and service provider. All data and computing are 100% hosted/done on the cPanel server. Benefits End-users: Easy access either via cPanel's webmail system or direct URL No complicated IMAP/SMTP/POP3 configuration, only email address, and password are required Instant access to Email Chat Audio/video calls Conferences Files Contacts And many other features, directly integrated with a cPanel hosting account Real-time push notifications Change password within CrossBox Recover access to an email account Service Providers: Provide users with a modern communication suite that is deeply integrated with and running on a cPanel server Easier customer onboarding Better brand exposure No changes to the cPanel server, services, or configuration files needed Everything is 100% hosted on the cPanel server itself cPanel account quota support WHM Feature List support Automatic cPanel Integration MTA/Mail Server CrossBox supports Exim and Dovecot out of the box, and won't make any changes to your existing MTA/mail server configuration. From standard Exim configurations to smart external relays, CrossBox supports any configuration. Webmail cPanel users can choose CrossBox as their Webmail Application of choice when accessing cPanel's Webmail. Note that if you have a Branding Addon purchased, the cPanel Webmail interface will show your custom App Logo.
    [Show full text]
  • New Business Models in the Digital Age
    New business models in the digital age A dosdoce.com study sponsored by CEDRO 0. INTRODUCTION ...................................................... 3 1. DIGITAL BUSINESS MODELS ........................................... 5 1.1. Micropayments. Fragmented Content .....................................................6 1.2. Pay-Per-Use. Streaming/Pay-Per-View ...................................................11 1.3. Subscription .......................................................................17 1.4. Membership .......................................................................24 1.5. Freemium/Premium ..................................................................25 1.6. Embedded advertising ................................................................28 1.7. Open Access .......................................................................29 1.8. P2P – MOOCs ......................................................................32 2. NEW MODELS: SOMEWHERE BETWEEN EXPERIMENTING AND RATIONALIZATION .............................................. 36 2.1. Pay-what-you-want ..................................................................37 2.2. Bundling ..........................................................................39 2.3. Crowdfunding ......................................................................41 2.4. Gamification .......................................................................46 2.5. Direct selling .......................................................................49 2.6. Self-publishing ......................................................................53
    [Show full text]
  • 30-Minute Social Media Marketing
    30-MINUTE SOCIAL MEDIA MARKETING Step-by-Step Techniques to Spread the Word About Your Business FAST AND FREE Susan Gunelius New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto To Scott, for supporting every new opportunity I pursue on and off the social Web and for sending me blog post ideas when I’m too busy to think straight. And to my family and friends for remembering me and welcoming me with open arms when I eventually emerge from behind my computer. Copyright © 2011 by Susan Gunelius. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-174865-0 MHID: 0-07-174865-2 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-174381-5, MHID: 0-07-174381-2. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every oc- currence of a trademarked name, we use names in an editorial fashion only, and to the benefi t of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs.
    [Show full text]
  • Editing Control Panel Instances
    R1Soft Continuous Data Protection®, Documentation, Version 3.18.2 Editing Control Panel Instances Follow the instructions below to edit a Control Panel Instance in CDP. 1. Click on "Policy" in the Main Menu to access the "Policies" page. Advanced Edition Enterprise Edition 2. Find the necessary Policy in the "Policies" list and click on the "Edit" icon in the "Actions" column for this Policy. Tip To find a Policy, you can use the Basic and Advanced List Filters. See Customizing the Policies List. 3. The "Edit Policy" window will open. 1 R1Soft Continuous Data Protection®, Documentation, Version 3.18.2 4. Choose the "Control Panels" tab. 5. Then you will access the "Control Panel Instance" list on the "Control Panels" tab. 6. Find the necessary Instance in the "Control Panel Instance" list and click on the "Edit" icon in the "Actions" column for this Instance. 2 R1Soft Continuous Data Protection®, Documentation, Version 3.18.2 7. The "Edit Control Panel Instance" window will appear. Familiarize yourself with the introductory information and click "Next" to proceed with adding the Instance. 8. On the following "Instance Details" screen you can change options for your Control Panel Instance: Enabled - Use this checkbox to enable or disable the Control Panel Instance. If an instance is disabled, it will not be discovered during replication, and control panel users will not be able to access their data from any recovery points created while the instance is disabled. Name - Define a new name for the Control Panel Instance to identify it. A control panel instance's name must be unique to its policy, meaning no more than one instance associated with a policy can have a certain name.
    [Show full text]