How to Change Your Password in Windows Server 2012

How Do I Change My Server Password Using Windows 2012? The following guide will show you how to change the password for Windows Server 2012 in two different ways. If you're unable to log in, please contact our support department for assistance. Changing your Windows Server 2012 password through the Command Line This is the fastest and most reliable method for changing your ...

How to Install and Configure OpenSSH (Windows Server 2016)

You might find it useful to install OpenSSH on your Windows server. Running SSH on your Windows server means that you can transfer files using Secure Copy (SCP) or SFTP. Aside from SCP and SFTP, you can open a secure Powershell shell or a Bash shell if Windows Subsystem for Linux (WSL) is enabled on your Windows server. By default, ...

How To Open Or Block Ports Using Windows Firewall

By default, UltaHost does not block any ports on your VPS. However, this article will discuss the Windows built-in firewall and how to open and close ports. This article is intended for UltaHost clients who need to open or block a port to their Windows VPS, and we will go over how to do this using this simple-to-follow guide with ...

How to transfer files using SCP (Secure Copy)

This article describes how to use SCP (Secure Copy Protocol) to transfer files quickly and securely from the command line.What is SCP? Secure Copy (SCP) is a protocol based on SSH (Secure Shell) that provides secure file transfers between two computers. With SCP, you can quickly transfer files using the command line, which is often faster and easier than ...

How to Access Your Windows Server Using Remote Desktop

In this article, we explain how to use Remote Desktop software to access your Windows server’s desktop from anywhere in the world. On a normal Windows computer, you have a keyboard, monitor, and mouse that allow you to interact with the machine. For Windows VPS servers hosted on the Internet, things are a bit different because your server could ...

What is the Default Password for PostgreSQL?

When connecting to PostgreSQL on Linux for the first time many admins have questions, especially if those admins are from the MySQL world. By default, when PostgreSQL is installed, a postgres user is also added. If you run the command:cat /etc/passwd… you’ll see the postgres user.postgres:x:26:26:PostgreSQL Server:/var/lib/pgsql:/bin/bashThe first question ...

How To Open Or Block Ports Using Windows Firewall

By default, UltaHost does not block any ports on your VPS. However, this article will discuss the Windows built-in firewall and how to open and close ports. This article is intended for UltaHost clients who need to open or block a port to their Windows VPS, and we will go over how to do this using this simple-to-follow guide with ...

How to generate a private key and CSR from the command line

This article describes how to generate a private key and CSR (Certificate Signing Request) from the command line. You may need to do this if you want to obtain an SSL certificate for a system that does not include cPanel access, such as a dedicated server or unmanaged VPS. If your account includes cPanel or Plesk access, you do not ...

How to configure a firewall using iptables

This article demonstrates how to configure a basic firewall using iptables. Using the iptables program, you can explicitly grant and deny access to selected services running on your server, as well as to selected IP addresses. The information in this article only applies to the products listed in the Article Details sidebar. You must have root access to the server ...

How to reset the WordPress administrator password

This article describes how to reset the WordPress administrator password. Normally, if you forget your password, you can use the WordPress password recovery feature to reset the password by e-mail. However, if this option is unavailable (for example, if e-mail on your site is not working correctly) you can use one of the following methods. Method #1: Reset the administrator password ...

How to fix mixing of secure and insecure content on a web page

This article describes an issue that occurs when visitors to your web site request a secure web page that contains insecure elements. Problem When visitors to your web site request a page using a secure https:// connection, a broken padlock icon may appear in the web browser's location bar. Additionally, they may receive a warning message in their browser: Mozilla ...

How to determine the OpenSSL version

This article describes how to check which OpenSSL version is installed on a server. You may need to do this to verify whether or not a particular feature is available, or check if the installed version is affected by a security issue (such as the Heartbleed bug). To check which OpenSSL version is installed on a Linux server, log in ...

How to reset the MySQL root password

This article describes how to reset the MySQL root password. You may need to do this, for example, if you have forgotten the password. You must have root access on the server to reset the MySQL root password. Resetting the MySQL root password To reset the root password for MySQL, follow these steps:     1.Log in to your account ...

General Data Protection Regulation | Ultahost Support

What is the GDPR?GDPR is short for the General Data Protection Regulation that went into effect on May 25, 2018. It was passed by the European Parliament to create a harmonized data privacy law across member states of the European Union (EU). Its purpose is to support privacy as a fundamental human right and therefore give EU residents rights over how ...

Basic and most common iptables rules

Iptables is basically a powerful firewall, which can allow a user to set specific rules to control incoming and outgoing traffic. You can use it to block specific port, IP addresses and much more. In this article we present most common uses of iptables. The iptables rules can be specified with 3 blocks, which are used for specific purpose (called Chains): ...

How to setup and use SSH keys

For security reasons it is recommended to use SSH keys instead of password for accessing server. The biggest advantage SSH keys provide is that its nearly impossible to be deciphered, while a password could be cracked or intercepted by brute-force password attacks. Furthermore, authentication by SSH keys is more convenient than using password, due to you will be able to ...

How To Remove McAfee SiteAdvisor Blacklist Warnings

McAfee blacklists thousands of websites every day. For most website owners, the various warnings McAfee can show about your website and dealing with them can seem like a challenging task. This knowledgebase article will help you understand what the cautionary message indicates and how to resolve this security warning. Important Note: This article covers McAfee SiteAdvisor Blacklists, not the warnings ...

Can I install a free SSL on UltaHost?

Everyone needs to have SSL! UltaHost clients are not an exception! The procedure of installing Free SSL is rather complicated, so alternatively, you can always purchase the SSL and we will install it for you! Lifetime SSL Security A high-security level forever! No annual fees - only one-time payment for activation. How cool is that? Pro SSL Security A professional ...

How to install my SSL which I have bought with UltaHost?

If you have bought an SSL certificate and activate it you should find it in the SSL section of the control panel area. 

How to Handle the Google Attack Page

What Is the Google Attack Page?Google has an automated system that searches for websites on which malicious activity is detected and creates a blacklist based on their findings. A user attempting to access a blacklisted site can be redirected to an "interstitial page" (the "Reported Attack Site!" page):Google will notify the owner of any site it adds to ...