Tricky errors like WordPress 500 Internal Server Error keep your site offline if they’re not fixed. Here’s how to solve this one.
The post Extended Life Support OSes Update appeared first on Plesk.
Tricky errors like WordPress 500 Internal Server Error keep your site offline if they’re not fixed. Here’s how to solve this one.
The post Extended Life Support OSes Update appeared first on Plesk.
Tricky errors like WordPress 500 Internal Server Error keep your site offline if they’re not fixed. Here’s how to solve this one.
The post WordPress 500 Internal Server Error: What to do appeared first on Plesk.
Securing your website with WordPress security headers is a crucial step towards safeguarding your online presence. These headers offer a robust defense mechanism, fortifying your web applications against potential threats. The best part about them is they don´t require any changes of your codebase. With a plethora of options available for enhancing website security, security headers emerge as a straightforward yet highly effective starting point. The Purpose Of HTTP Security Headers HTTP security headers protect your site against malicious intruders, and they’re an extra layer of security that you won’t find difficult to set up, even if you weren’t blessed…
The post WordPress Security Headers – A Simple Guide to Making Your Website Safer appeared first on Plesk.
If you wanted to know what you need to do to list all of the open ports within your Linux environment you’ve come to the right place. But first, let’s demystify the concept of ports and grasp why it’s crucial to maintain a comprehensive list of these access points. In essence, a port serves as a gateway through which your operating system communicates with other devices or servers, facilitating the flow of network traffic. It’s like designated lanes on a busy highway, ensuring that each type of traffic reaches its intended destination without confusion. When it comes to ports, two…
The post Easy Steps to List All Open Linux Ports appeared first on Plesk.
[vc_row][vc_column][vc_column_text css=”.vc_custom_1560792671923{margin-bottom: 0px !important;}”]Write sites and apps in any language and they’ll be versatile enough to fit the complicated requirements of most businesses. But for custom app builds, the extra effort’s time-consuming. So shorten deployment time of web services, apps, and APIs by using frameworks. You’ll be able to reuse code and simplify common tasks like database access and session management. Rasmus Lerdorf, PHP creator, never would have thought in 1994 that his scripting language would go on to be the most widely used server-side worldwide. Same for David Heinemeier Hansson, author of the Ruby on Rails framework that began…
The post Ruby on Rails vs PHP: Which one’s right for your needs? appeared first on Plesk.
A Content Delivery Network (CDN), also known as Content Distribution Network, is a system of interconnected servers based in different locations. Its role is to facilitate more efficient content delivery: it presents users with cached online content from the nearest network server instead of fresh content. By decreasing the amount of time required for users to receive rich media and content, a CDN can significantly enhance web performance. The majority of web traffic is served by CDNs today, including giants like Netflix and Facebook. Why do so many website owners use a CDN? Website owners and brands use Content Delivery…
The post What is a Content Delivery Network? (CDN) appeared first on Plesk.
Scaling a server to handle a rise in both traffic and demand can be difficult. Any seasoned developer knows that. Why is it such a challenge? Because it demands in-depth planning and evaluation of everything from pricing to potential growth in years to come. There are two main types of server scaling: horizontal and vertical. horizontal scaling (otherwise known as “scaling out”) requires that you increase the number of servers you use already. That can be compared to expanding a road with extra lanes to allow for more vehicles. Vertical scaling (“scaling up”) focuses on improving the capabilities of an…
The post Horizontal vs. Vertical Scaling: Understanding Key Differences, Advantages, and Limitations appeared first on Plesk.
A solid server infrastructure is crucial for countless companies worldwide, empowering them to deliver services in an efficient, reliable way. That’s why it’s so important for businesses to invest in reliable server maintenance. Maintaining servers well can improve security, increase their longevity, and minimize the risk of downtime. But what does effective server maintenance involve? How can you get yours right? In this guide, we’ll explore the best practices you need to know. What is server maintenance? What are the benefits of server maintenance? Server maintenance tips for optimal performance Avoid these server maintenance mistakes Server maintenance FAQ What is…
The post Server Maintenance Best Practices appeared first on Plesk.
In the dynamic world of web hosting and online services, staying informed about licensing changes of widely used software components is crucial. Redis team recently announced a significant shift in their licensing model that could impact many developers and hosting providers. What’s Changing with Redis? Redis, the high-performance, open-source cache server, is transitioning its license from BSD to Server Side Public License (SSPL) starting with version 7.4. This move is designed to prevent third-party vendors from offering services, competing with Redis without open-sourcing their entire stack under the same license. This change reflects a growing trend among open-source projects to…
The post Redis License Change: What Plesk Users Need to Know appeared first on Plesk.
As running a mail server brings numerous challenges, you need to analyze every detail with care to reach the right decision for you. The first factor you should bear in mind is the MTA (mail transfer agent): will it be relay-only or full-fledged? Relay-only (otherwise known as send-only) MTAs are capable of forwarding emails to another server, usually your ISP (Internet service provider’s) SMTP server. Some common relay-only MTAs you might recognize are msmtp, sSMTP, and nullmailer. This form of MTA is a solid option if you intend to send emails to your address (e.g. Gmail, Outlook). But consider these…
The post Choosing the Best MTA: Postfix vs Sendmail vs Exim: a Comprehensive Comparison appeared first on Plesk.
Cloud computing is increasingly prevalent in the digital age. It’s predicted that more than 80% of companies worldwide will use cloud computing as their main infrastructure by 2025. And as more and more businesses adopt cloud computing, the number of cloud-computing providers has grown too. If you’re looking to switch to cloud-based solutions, you have an extensive range of options to choose from. Hyperscaler Clouds Explained Popular Public Hyperscalers Hyperscaler Cloud Computing Advantages and Disadvantages How Do Hyperscalers Compare to Alternative Cloud Providers? Conclusion However, the cloud market is still dominated by hyperscaler clouds: these utilize a huge network of…
The post What is a Hyperscaler Cloud? appeared first on Plesk.
If users encounter a 405 Method Not Allowed message while visiting your website, a Hypertext Transfer Protocol (HTTP) error is usually responsible. This stops visitors from accessing the content on your site, and that may negatively affect how they perceive your brand. Unfortunately, the error message only states that something has gone wrong with your site without offering further detail. That means you might need to explore multiple solutions to fix the problem. In this guide, we’ll explore more than 10 possible solutions to the 405 Method Not Allowed error to help you, including removing plugins and restoring your website…
The post How to Fix the 405 Method Not Allowed Error? appeared first on Plesk.
If you receive a 504 Gateway Timeout error while browsing, it’s likely to be the result of a communication problem between your device and the server hosting the affected site. That may involve your internet service provider (ISP) too. But while a 504 Gateway Timeout error may disrupt your online experience, there are ways to fix it. In this guide, we’ll take a closer look at the 504 Gateway Timeout error, including what causes it and how to fix it. 504 Gateway Timeout Error Explained A 504 Gateway Timeout error occurs when a server that’s trying to load a particular…
The post 504 Gateway Timeout Error: Expert Tips to Fix It appeared first on Plesk.
Looking to migrate a website from one server to another? You’ve got options. One popular method involves downloading the entire site to your computer and then uploading it to the new server. Or you could use third-party FTP tools to access both servers and move files between them. But there’s a more efficient and secure approach you might not have considered: transferring files over Secure Shell (SSH). Let’s explore how this method works and why it might be the ideal solution for your migration needs. What is SSH? SSH is a secure network protocol that allows you to utilize network…
The post How To Transfer Files Between Servers Using SSH appeared first on Plesk.
As Google becomes more and more focused on improving the user’s experience of websites, web developers are paying attention. They know that user experience is boosted by fast loading times and good page speeds. These factors became significant search ranking factors several years ago. If you didn’t know that, then chances are you’ll be getting poor SERPs results, so time to get up to speed with it! With this in mind, we’re going to look at one of the quickest and simplest methods of improving the performance of your site – GZIP compression. This post walks you through the importance…
The post Boost Your Site Performance: Guide to Enabling WordPress GZIP Compression appeared first on Plesk.
Administrators typically rely on a command-line interface (CLI) when managing a Linux remote system (such as a virtual private server). Numerous Linux distros feature a graphical user interface (GUI), which some users may find more helpful than a CLI. However, entering commands tends to be smoother and more flexible via a CLI. For instance, you can use one command to replace certain entries across several files with a CLI, but that takes longer when using a GUI. As Linux has lots of commands for different tasks, though, it can be difficult to utilize Bash (Bourne Again Shell) shell. That’s why…
The post Most Important Linux Commands appeared first on Plesk.
On Linux and other Unix systems, cron is a scheduler tool that enables you to set up automated tasks known as “cron jobs”. Tasks don’t need to be executed over and over again when you generate cron jobs, which can lead to better web development and improved management efficiency. Common examples of a cron job are automating file downloads (to back up important documents) and monitoring servers. But cron jobs go much deeper than this, and it can be a complex topic to explore, which is why we’ve written this guide. Read on as we cover cron job basics (from…
The post Cron Jobs: All You Need To Know appeared first on Plesk.
Often underestimated, .htaccess files have significant influence over server configurations, directly impacting website performance, security, and functionality. Whether you’re an experienced webmaster or a newcomer to web development, grasping the intricacies of .htaccess is essential for optimizing your online presence. This is why we created this ultimate resource for unlocking the potential of .htaccess files. In this in-depth guide, we explore all the key aspects of .htaccess and empower you to harness its capabilities effectively. Throughout this article, we delve into the origins and core functionalities of .htaccess. So, bookmark this .htaccess guide, and prepare to delve deep into the intricacies…
The post Your Complete .htaccess Guide: Including .htaccess Basics and More appeared first on Plesk.
Protecting your server from malicious attacks is paramount in today´s digital landscape. Fail2ban, a robust log-parsing application, serves as a vigilant guardian, monitoring system logs for signs of automated assaults on your VPS instance. As you delve into this tutorial, you’ll gain insights into harnessing Fail2ban’s capabilities to fortify your server’s defenses. How Fail2ban Works When Fail2ban identifies and locates an attempted compromise using your chosen parameters, it will add a new rule to iptables to block the IP address from which the attack originates. This restriction will stay in effect for a specific length of time or on a…
The post Using Fail2ban to Secure Your Server appeared first on Plesk.
NGINX is a web server designed for use cases involving high volumes of traffic. It’s a popular, lightweight, high-performance solution. One of its many impressive features is that it can serve static content (media files, HTML) efficiently. NGINX utilizes an asynchronous event-driven model, delivering reliable performance under significant loads. This web server hands dynamic content off to FastCGI, CGI, or alternative servers (including Apache), before it’s sent back to NGINX for delivery to clients. NGINX, renowned for its lightweight architecture and efficient handling of high traffic, contrasts with Apache, a longstanding and widely-used web server. While Apache excels in versatility…
The post NGINX Configuration Guide appeared first on Plesk.
When the DNS_PROBE_FINISHED_NXDOMAIN error occurs, you’ll see a message displayed on your computer screen to inform you that your browser is unable to locate the server IP address. That can be incredibly annoying, as it will stop you from visiting and using the website entirely. However, you can use one of the several straightforward methods to solve this issue. Join us as we explore the common causes for the DNS_PROBE_FINISHED_NXDOMAIN error, ways to identify them, and techniques to fix it. DNS_PROBE_FINISHED_NXDOMAIN Explained What Causes This Error? How to Fix the DNS_PROBE_FINISHED_NXDOMAIN Error The DNS_PROBE_FINISHED_NXDOMAIN Error Message on Different Internet Browsers…
The post DNS_PROBE_FINISHED_NXDOMAIN: What Is It And How To Fix The Problem appeared first on Plesk.
Does your business use Linux? If so, you’re not alone: countless other companies around the world rely on it daily too. One of the biggest benefits of using Linux is that Linux servers are open source, which makes them some of the most flexible and cost-effective servers available. Linux allows you to share resources and take part in its user community, which is particularly helpful for smaller businesses. It’s no surprise that Linux is a common choice for entrepreneurs launching new enterprises. However, as Linux is open source, it has its fair share of security flaws that you need to…
The post How to Secure Your Linux Server: A Detailed Guide appeared first on Plesk.
Despite the rapid technological advancements of recent years, one thing remains clear: email is here to stay. Amidst the proliferation of new communication channels and the disruption of the AI revolution, email continues to stand tall as the backbone of professional communication. With the rise of remote work and the need for seamless email management across multiple devices, choosing the right email client becomes paramount. That’s why webmail clients are so attractive: they make sending and receiving emails through remote and local mail servers easier than ever. And they provide this convenience through IMAP, SMTP, and POP3 protocols. Amidst the…
The post Top 10 Webmail Clients in 2024 appeared first on Plesk.
Linux is one of the most commonly used operating systems, serving as the backbone for a diverse array of devices, from personal computers to servers and mobile phones. Linux has been around since the 1990s, and it has since established a global presence, seamlessly integrating into virtually every imaginable application and industry. While the versatility of the Linux operating system is well known, many remain unaware of how ubiquitous it is. In addition to supporting much of the internet, Linux OS is powering anything from TV sticks to large appliances like refrigerators and elevators. In this comprehensive introductory guide, we…
The post What is Linux? An in-depth introduction appeared first on Plesk.
Plesk Obsidian is the new generation of the very popular Plesk control panel for website hosts. Plesk Obsidian has numerous advanced features and includes support for the latest tech, including Git, AutoSSL and Docker. Plesk Hardware Requirements As any other complex software solution, Plesk Obsidian is dependent on hardware resources. Plesk Minimum Requirements The minimum amount of RAM required for installing and running Plesk on Linux is 1 GB + 1 GB swap. On Windows – 2 GB of RAM. The minimum amount of free disk space required for installing and running Plesk is 20 GB on Linux and 32…
The post Plesk Requirements – Hardware & Software appeared first on Plesk.
Anyone with a WordPress website knows how important effective security is, both to protect your site from threats and to ensure your users stay safe. However, a lax approach to WordPress security could lead to penalization: thousands of websites are blacklisted by Google daily due to the presence of malware or phishing. With all that in mind, it’s crucial that you stay up to date on the latest WordPress security methods and innovations. And that’s why we have written this comprehensive guide to WordPress security. Ultimately, WordPress is a secure platform at its core, and numerous developers run regular audits…
The post The Ultimate WordPress Security Guide – Step by Step appeared first on Plesk.
Web server security is a broad term covering the processes and solutions that keep web servers secure. Web server security encompasses three elements: host, network, and physical. For example, a comprehensive firewall can protect network connections, while unauthorized users are prevented from accessing a network by specific hardware or software components. When discussing web server security, we can look at two key areas: Securing a web server’s data Securing the services that run on a web server Access controls and operating system security protect a web server’s data, while antivirus software and firewalls safeguard the services that run on said…
The post Web Server Security – Beginner’s Guide appeared first on Plesk.
In this guide we will help you to understand better what is the difference between MariaDB and MongoDB. What is MariaDB? MariaDB, emerging in 2009, stands as a significant fork of the widely-used open-source database system, MySQL. The inception of MariaDB was primarily influenced by the acquisition of MySQL AB by Oracle Corporation, leading to concerns within the MySQL community regarding the future of the project’s open-source commitment. Developed by Monty Widenius, one of the original creators of MySQL, MariaDB was designed to be a drop-in replacement for MySQL, ensuring compatibility and ease of transition for existing MySQL users. The…
The post MariaDB vs MongoDB: Which One To Choose? appeared first on Plesk.
PHP-FastCGI Process Manager (or PHP-FPM) is widely used on sites that use WordPress, a hugely popular content management system. PHP-FPM is a processor for PHP, one of the most common scripting languages, that enables WordPress sites to handle a greater volume of web traffic without relying on as many server resources as when using alternative PHP processors. How does PHP-FPM work? What security does it offer? And how easy is it to set up? We’ll cover all this and more in this guide to PHP-FPM. The Structure of PHP-FPM PHP is a high-level programming language. As a result, PHP scripts…
The post PHP-FPM: The Future of PHP Handling appeared first on Plesk.
When you entrust a company with hosting your website, you essentially handing over the keys to your business future. You’re outsourcing the expertise needed to support the existence of your business’s presence on the web to a third party, but since there is so much competition between providers, some will try to compete on cost but not be able to back it up with expertise. Imagine your business growing and then your web host being unable to configure your site to manage the additional traffic. Not good! This is why it’s important to invest in web hosting security, which keeps…
The post Web Hosting Security – Core Factor for Any Website’s Success appeared first on Plesk.
60 queries. 8.75 mb Memory usage. 0.598 seconds.