How to transfer files using SCP (Secure Copy)

This article describes how to use SCP (Secure Copy Protocol) to transfer files quickly and securely from the command line.What is SCP? Secure Copy (SCP) is a protocol based on SSH (Secure Shell) that provides secure file transfers between two computers. With SCP, you can quickly transfer files using the command line, which is often faster and easier than ...

How to Access Your Windows Server Using Remote Desktop

In this article, we explain how to use Remote Desktop software to access your Windows server’s desktop from anywhere in the world. On a normal Windows computer, you have a keyboard, monitor, and mouse that allow you to interact with the machine. For Windows VPS servers hosted on the Internet, things are a bit different because your server could ...

What is the Default Password for PostgreSQL?

When connecting to PostgreSQL on Linux for the first time many admins have questions, especially if those admins are from the MySQL world. By default, when PostgreSQL is installed, a postgres user is also added. If you run the command: cat /etc/passwd … you’ll see the postgres user. postgres:x:26:26:PostgreSQL Server:/var/lib/pgsql:/bin/bash The first ...

How To Open Or Block Ports Using Windows Firewall

By default, UltaHost does not block any ports on your VPS. However, this article will discuss the Windows built-in firewall and how to open and close ports. This article is intended for UltaHost clients who need to open or block a port to their Windows VPS, and we will go over how to do this using this simple-to-follow guide with ...

How to generate a private key and CSR from the command line

This article describes how to generate a private key and CSR (Certificate Signing Request) from the command line. You may need to do this if you want to obtain an SSL certificate for a system that does not include cPanel access, such as a dedicated server or unmanaged VPS. If your account includes cPanel or Plesk access, you do not ...

How to configure a firewall using iptables

This article demonstrates how to configure a basic firewall using iptables. Using the iptables program, you can explicitly grant and deny access to selected services running on your server, as well as to selected IP addresses. The information in this article only applies to the products listed in the Article Details sidebar. You must have root access to the server ...

How to reset the WordPress administrator password

This article describes how to reset the WordPress administrator password. Normally, if you forget your password, you can use the WordPress password recovery feature to reset the password by e-mail. However, if this option is unavailable (for example, if e-mail on your site is not working correctly) you can use one of the following methods. Method #1: Reset the administrator password ...

How to fix mixing of secure and insecure content on a web page

This article describes an issue that occurs when visitors to your web site request a secure web page that contains insecure elements. Problem When visitors to your web site request a page using a secure https:// connection, a broken padlock icon may appear in the web browser's location bar. Additionally, they may receive a warning message in their browser: Mozilla ...

How to determine the OpenSSL version

This article describes how to check which OpenSSL version is installed on a server. You may need to do this to verify whether or not a particular feature is available, or check if the installed version is affected by a security issue (such as the Heartbleed bug). To check which OpenSSL version is installed on a Linux server, log in ...

How to reset the MySQL root password

This article describes how to reset the MySQL root password. You may need to do this, for example, if you have forgotten the password. You must have root access on the server to reset the MySQL root password. Resetting the MySQL root password To reset the root password for MySQL, follow these steps:     1.Log in to your account ...

General Data Protection Regulation | Ultahost Support

What is the GDPR?GDPR is short for the General Data Protection Regulation that went into effect on May 25, 2018. It was passed by the European Parliament to create a harmonized data privacy law across member states of the European Union (EU). Its purpose is to support privacy as a fundamental human right and therefore give EU residents rights over how ...

Basic and most common iptables rules

Iptables is basically a powerful firewall, which can allow a user to set specific rules to control incoming and outgoing traffic. You can use it to block specific port, IP addresses and much more. In this article we present most common uses of iptables. The iptables rules can be specified with 3 blocks, which are used for specific purpose (called Chains): ...

How to setup and use SSH keys

For security reasons it is recommended to use SSH keys instead of password for accessing server. The biggest advantage SSH keys provide is that its nearly impossible to be deciphered, while a password could be cracked or intercepted by brute-force password attacks. Furthermore, authentication by SSH keys is more convenient than using password, due to you will be able to ...

How To Remove McAfee SiteAdvisor Blacklist Warnings

McAfee blacklists thousands of websites every day. For most website owners, the various warnings McAfee can show about your website and dealing with them can seem like a challenging task. This knowledgebase article will help you understand what the cautionary message indicates and how to resolve this security warning. Important Note: This article covers McAfee SiteAdvisor Blacklists, not the warnings ...

Can I install a free SSL on UltaHost?

Everyone needs to have SSL! UltaHost clients are not an exception! The procedure of installing Free SSL is rather complicated, so alternatively, you can always purchase the SSL and we will install it for you! Lifetime SSL Security A high-security level forever! No annual fees - only one-time payment for activation. How cool is that? Pro SSL Security A professional ...

How to install my SSL which I have bought with UltaHost?

If you have bought an SSL certificate and activate it you should find it in the SSL section of the control panel area. 

How to Handle the Google Attack Page

What Is the Google Attack Page?Google has an automated system that searches for websites on which malicious activity is detected and creates a blacklist based on their findings. A user attempting to access a blacklisted site can be redirected to an "interstitial page" (the "Reported Attack Site!" page):Google will notify the owner of any site it adds to ...

My Website is Infected!

What is a Malware Infection?Malware, short for malicious software, is created by cybercriminals with the intent of causing harm to a website. It is used to steal sensitive customer information, hold websites for ransom, or even take control of the website itself. In many cases, victims of malware may not realize they’ve been attacked until it’s too ...

Why I cannot send/receive emails?

Do you encounter errors when you are trying to send or receive an email? Or is there any email bouncing back when you try to send an email to the mailbox hosted on our servers?  If you encountered these problems, please provide us with any error or bounce back emails you get on the ticket. If not, please provide ...