HTS Hosting Blog https://www.htshosting.org/blog Best Web Hosting Blog | HTS Hosting Sat, 29 May 2021 08:48:51 +0000 en-US hourly 1 https://wordpress.org/?v=5.7.5 https://www.htshosting.org/blog/wp-content/uploads/2020/11/cropped-htslogosquare-32x32.png HTS Hosting Blog https://www.htshosting.org/blog 32 32 Resetting a cPanel Account Password https://www.htshosting.org/blog/2021/05/resetting-a-cpanel-account-password/ https://www.htshosting.org/blog/2021/05/resetting-a-cpanel-account-password/#respond Sat, 29 May 2021 08:45:06 +0000 http://htshosting.org/blog/?p=728 Do you want to reset the password for your cPanel account? It’s definitely possible. cPanel & WHM lets you reset the password for your cPanel account. You need to carry out the password reset process for resetting your cPanel account’s password. In it, a security code is sent to the contact email address in the […]

The post Resetting a cPanel Account Password appeared first on HTS Hosting Blog.

]]>
Do you want to reset the password for your cPanel account? It’s definitely possible. cPanel & WHM lets you reset the password for your cPanel account. You need to carry out the password reset process for resetting your cPanel account’s password. In it, a security code is sent to the contact email address in the Contact Information interface of cPanel. cPanel >> Home >> Preferences >> Contact Information.

Before describing the process for resetting a cPanel account password, let us know what a cPanel is, for the convenience of the readers.

cPanel

The term “cPanel” refers to a control panel software that has been developed for web hosting by cPanel LLC. It simplifies the process of web hosting for users, as it is equipped with an intuitive and easy to use GUI (Graphical User Interface) and automation tools.

cPanel is used to manage a single web hosting account, and it uses a standard web browser for enabling administration. Not only GUI but also command line and API-based access is there in cPanel. Hence, developers, web hosting companies, and third party software vendors are able to automate processes for standard system administration. Front-ends are provided by cPanel to its clients for various common operations. These include crontab tasks, management of PGP keys, mailing lists, mail and FTP accounts, etc. Moreover, there are many add-ons that can be availed by paying some additional fees. A cPanel user can access these add-ons after the server administrator enables these.

cPanel, as an efficient control panel, lets a user perform numerous tasks related to website and hosting management. It is the leading control panel for web hosting that is available these days. It has been designed to function on Linux OS (Operating System) but can be used for managing the hosting requirements of Joomla, WordPress, Drupal, etc. cPanel offers a suite of tools and functions that is unmatched. Let us have a look at some of its main features, which are mentioned below, in no particular order.

  • Email – The email tools of cPanel aid in managing one’s emails directly from within the control panel. These tools let a user add as well as remove email accounts, manage spam filters as well as global filters, and set up email forwarding along with auto-responders and mailing lists. Through these tools emails are encrypted for security. It makes it possible to read and compose mails from any place via Webmail.

  • FTP Manager – It manages FTP access to the server directories and files. It sets up FTP accounts, sets up anonymous FTP access and enables FTP session control.

  • File Manager – The File Manager enables the management of files directly from an interface in the cPanel.

  • Backup – cPanel comes with built-in backup functionality. This lets a user create a backup of his/her website easily and quickly, subsequently download it, and store it.

  • Domains – A user can have full control over his/her domains through cPanel. It lets a user manage his/her domains as well as DNS settings, publish domains, add new domains and subdomains, set up domain aliases and redirects.

  • Raw Access Log – cPanel enables one to download the raw access logs for any domain in one’s account. This information proves to be useful in tracking user movements.

  • Raw Log Manager – The way in which raw logs can be stored on a user’s hosting account can be chosen through the Raw Log Manager.

  • Error Log – The Error Log of cPanel aids a user in getting to the bottom of 404 errors. All the 404 errors are displayed by this log. Hence, a user can discover easily those files that are missing from his/her website, and replace them quickly or remove the broken links.

  • 2FA – 2FA stands for Two Factor Authentication. cPanel provides a 2FA tool. This ensures that none of the unauthorised users or brute force hackers can gain access to one’s control panel. In it, an additional method of verification is required besides the username and password, for anyone logging into one’s cPanel account.

  • MySQL Databases – The tool for MySQL Databases lets a user manage his/her databases as well as create new ones, and modify the existing ones. It is also used to create, manage and remove database users.

These are some of the main tools that are organized into easily navigable sections on cPanel.

cPanel is provided in web hosting, which is a service offered by web hosting companies. Through this professional and paid service, one can avail server space for storing the files of one’s website, along with the technologies and services that are needed to ensure website accessibility and to keep websites up and running uninterruptedly.

Web hosting service can be of various types, such as VPS, dedicated, shared, cloud, reseller, WordPress, etc. These are offered through different types of plans, all of which aim at ensuring high availability and fast page loading, along with data security, and the best quality of service. The popularity of any web hosting service provider depends on the quality of service provided by the company, and usually terms such as the “Best Website Hosting Company” or the “Best Windows Hosting Company” or the “Top Cloud Hosting Company”, etc. are used to refer to the top-tier service providers.

How to Reset a cPanel Account Password

You need to perform certain steps sequentially for resetting the account password of your cPanel. Before we proceed to describe the steps, it needs to be mentioned that significant changes have been made to the Reset Password feature’s behaviour in the version 56 of cPanel & WHM. You need to click the tab that corresponds with your version of cPanel & WHM.

The following steps need to be carried out for resetting a cPanel account’s password.

  • You need to navigate to the below-mentioned location in your browser. https://example.com:2083/

  • In it, your domain name is represented by “example.com”.

  • Click Reset Password.

  • You need to enter your cPanel username in the text box, Username.

  • Click Reset Password.

  • Now you have to enter your contact email address in the text box, Contact Email Address.

  • Click Send Security Code. Here, it needs to be mentioned that if for any reason you need to resend the security code, then you should click Send Security Code Again. Moreover, you need to use the same browser session, which was used for initiating the request for password reset. You must also remember that if you had not specified a contact email address, then a fake contact email address will be displayed by the system when you try to reset the password.

  • Next you need to enter the security code that you have received. This has to be entered in the text box, Security Code.

  • Click Submit.

  • You should enter your password in the text box, New Password, and confirm it.

  • Click Set Password.

  • Click Log In to log in to your account.

Now you have successfully reset the password for your cPanel account.

The post Resetting a cPanel Account Password appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/resetting-a-cpanel-account-password/feed/ 0
Resetting a cPanel Subaccount Password https://www.htshosting.org/blog/2021/05/resetting-a-cpanel-subaccount-password/ https://www.htshosting.org/blog/2021/05/resetting-a-cpanel-subaccount-password/#respond Fri, 28 May 2021 03:54:55 +0000 http://htshosting.org/blog/?p=723 For the convenience of everyone who is looking for comprehensive information on how to reset a cPanel Subaccount password, detailed information has been put together here. But before we elaborate on it, let us touch upon cPanel for the benefit of the uninitiated reader. What is cPanel? cPanel, which has been developed by the cPanel […]

The post Resetting a cPanel Subaccount Password appeared first on HTS Hosting Blog.

]]>
For the convenience of everyone who is looking for comprehensive information on how to reset a cPanel Subaccount password, detailed information has been put together here. But before we elaborate on it, let us touch upon cPanel for the benefit of the uninitiated reader.

What is cPanel?

cPanel, which has been developed by the cPanel LLC., is a control panel software for web hosting. GUI (Graphical User Interface) and automation tools are present in it for simplifying the web hosting process for the user. A standard web browser is used to enable administration in it. cPanel is capable of managing a single web hosting account, whereas cPanel & WHM enables an entire server’s administration. Apart from GUI, cPanel has command line as well as API-based access. This lets web hosting companies, developers, and third party software vendors, automate processes that have to do with standard system administration.

cPanel provides front-ends to its clients for numerous common operations, which include but are not limited to, crontab tasks, PGP keys’ management, mailing lists, mail and FTP accounts, etc. One can avail many add-ons by paying a certain amount of additional fee for some of these add-ons. The server administrator needs to enable these add-ons, so that the cPanel user can access these.

Web Hosting

As already mentioned, cPanel is a control panel for web hosting. Now what is web hosting? It is the service provided by web hosting companies that is meant for rendering websites accessible, and for keeping them up and running properly without any hindrance. In web hosting server space is provided for storing the files of various websites. This service also makes available the technology that is involved in the process of enabling websites to be accessible over the Internet. Web hosting is primarily either shared or dedicated or VPS or reseller or WordPress or cloud. Various plans are provided by the professional web hosting companies to cater to the different requirements of websites’ owners, who use the service of web hosting. One might have come across terms, such as the “Best Linux Shared Hosting Company” or the “Best Windows Dedicated Hosting Company” or the “Top Cloud Hosting Company” etc. These terms refer to the most preferred web hosting companies, such as HTS Hosting, that offer top-notch services globally.

Now that you know about web hosting and cPanel, let us proceed to providing information on how to reset a cPanel Subaccount password.

Important Reminder

You are recommended to take into account the below-mentioned factors before carrying out the process.

  • cPanel & WHM version 56 or the later versions are required by the Reset Password feature for subaccounts.

  • You need to enable the Reset Password for Subaccounts option for using this feature. This option is in the System section of the Tweak Settings interface in WHM. You should contact your hosting service provider and seek assistance, if you are unable to access the WHM interface.

  • You have to provide a valid email address for using this feature. You need to enter an email address in the text box, Contact Email Address, in the User Manager interface of cPanel. You should contact your hosting service provider if you have forgotten the password, or did not set the Contact Email Address setting, or if you can’t log in to the cPanel interface.

  • If a contact email address is not specified by you, a fake email address is displayed by the system at the time when you attempt to reset your password. This aids in protecting users’ credentials on your account. This email address will appear as a hint in the text box, Contact Email Address, on the cPanel Login interface. You need to contact your hosting service provider and seek assistance, if you want to reset your password and you didn’t set your contact email address.

Resetting the Subaccount Password

cPanel & WHM enables you to reset your Subaccount password. A security code is sent during the password reset process, to the contact email address in the User Manager interface in cPanel. You need to carry out the below-mentioned steps in order to reset your Subaccount password.

  • Navigate in your browser to the location that is mentioned below.

  • https://example.com:2083/

In the above-mentioned link, your domain name is represented by example.com

  • Click Reset Password.

  • In the text box, Username, enter your Subaccount username.

  • Click Reset Password.

  • Enter your contact email address in the text box, Contact Email Address.

  • Click Send Security Code.

  • Click Send Security Code Again, if you need to resend the security code. It needs to be mentioned here that you must use the same browser session that you used for initiating the request for password reset.

  • Enter the security code received by you in the text box, Security Code.

  • Click Submit.

  •  Enter your password in the text box, New Password, and confirm your password.

  •  Click Set Password.

Now the process of Resetting a cPanel Subaccount Password comes to a successful conclusion.

The post Resetting a cPanel Subaccount Password appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/resetting-a-cpanel-subaccount-password/feed/ 0
How to Configure Google Drive as a Backup Additional Destination https://www.htshosting.org/blog/2021/05/how-to-configure-google-drive-as-a-backup-additional-destination/ https://www.htshosting.org/blog/2021/05/how-to-configure-google-drive-as-a-backup-additional-destination/#respond Tue, 25 May 2021 10:30:07 +0000 http://htshosting.org/blog/?p=714 If you are looking for information regarding configuring your Google Drive account to set it up as an Additional Destination in the Backup Configuration interface in WHM, then you have arrived at the right place. Let us provide you all the necessary information that will help you to conveniently and successfully carry out this task. […]

The post How to Configure Google Drive as a Backup Additional Destination appeared first on HTS Hosting Blog.

]]>
If you are looking for information regarding configuring your Google Drive account to set it up as an Additional Destination in the Backup Configuration interface in WHM, then you have arrived at the right place. Let us provide you all the necessary information that will help you to conveniently and successfully carry out this task.

Setting up Your Google Account’s Google Drive API

One important thing to mention before proceeding further is that if you want to create a Google Drive account, you need to visit the “Create you Google Account” page on Google.

Configuring the Google Drive API

You need to follow the below-mentioned steps in order to configure the Google Drive API for your Google account.

  • Visit the website fgor Google API Manager n

  • Click Library, that is present in the left navigation bar

  • Click GoogleDrive API, that is present under the G Suite heading

  • Click Create Project

  • Click Create

At this stage, you will find that a new menu has appeared. If the new menu does not appear, then follow the below-mentioned steps.

  • Click Credentials, that is present in the left navigation bar

  • Click Create

Now, you can carry on with the rest of the steps

  • Enter the new project name

  • Click Create

  • Click Enable

Increase Your Google Drive API Quota

As per Google’s documentation, it imposes quotas and limits on its APIs. This can result in errors when one backs up his/her server to Google Drive. In order to avert any error that might be caused by these limitations, you are recommended to carry out the below-mentioned steps, which will help in increasing your default quota settings.

  • Visit the website for Google API Manager

  • Click Google Drive API, that is present in the left side navigation bar

  • Click Quotas

  • Now, increase the value of the Queries per 100 seconds per user setting. Errors are usually resolved when a maximum value of 1000 is used. However, most of the errors can be resolved through a lower setting.

  • Click Done

Creation of Your Account Credentials

The below-mentioned steps need to be carried out for setting up Google Drive account credentials for backups.

  • Visit the website for Google API Manager

  • Click Credentials, that is present in the left side navigation bar

  • Click Create Credentials. If you already have Google Drive account credentials, click Create credentials, and then click Help me choose.

  • Select Google Drive API from the menu, Which API are you using?

  • Select Web Server from the menu, Where will you be calling the API from?

  • Select User Data from the menu, What data will you be accessing?

  • Click What credentials do I need?

  • Enter the desired name in the text box, Create an OAuth 2.0 client ID

  • Enter the https://hostname:2087/googledriveauth/callback link in the Authorized redirect URIs text box. In it, the hostname represents the hostname of your server. If you need to locate the hostname of your server, then you can perform either of the below-mentioned steps.

  • You can run the hostname command as the root user.

  • Alternatively, you can navigate to the Change Hostname interface of WHM. Here, the hostname of the server will appear under the Current Hostname heading.

  • Click Create. Your new client ID and client secret will be displayed by the interface

  • Click Done

Creating a Google Drive Transport

It needs to be mentioned that you need to disable popup blockers in your browser while you carry out these steps. This needs to be done to avert errors.

You need to follow the below-mentioned steps for creating a Google Drive transport.

  • Log in to WHM. This needs to be done as a root-enabled user.

  • Navigate to the Backup Configuration interface of WHM

  • Scroll to the Additional Destinations section

  • Select Google Drive from the Destination Type menu

  • Click Create new destination

  • Enter the desired destination name

  • Enter the desired folder in which backups need to be stored. If no folder is specified, the backups will be stored in the top-level folder by the system.

  • Enter your client ID and client secret

  • Click Generate Credentials for creating the credentials file. Now, you will find that a new tab will appear, which enables you to authorize access to your Google Drive data.

  • Click Authorize Access

  • Enter the desired timeout duration in the Timeout text box

  • Click Save Destination.

  • For validating your remote destination, you need to click Save and Validate Destination

  • This action will not be successful if you do not authorize access to your Google Drive data.

The information that has been provided here will prove to be useful for setting up your Google Drive account as an Additional Destination in the interface for Backup Configuration in WHM.

The post How to Configure Google Drive as a Backup Additional Destination appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/how-to-configure-google-drive-as-a-backup-additional-destination/feed/ 0
Importance of Uptime for Hosting Companies https://www.htshosting.org/blog/2021/05/importance-of-uptime-for-hosting-companies/ https://www.htshosting.org/blog/2021/05/importance-of-uptime-for-hosting-companies/#respond Tue, 25 May 2021 07:40:08 +0000 http://htshosting.org/blog/?p=710 Web Hosting has been referred to as a service that enables individuals and business organizations to publish their websites or web page on the Internet. Hosting companies, on the other hand, provides the infrastructure that allows a person or a company to publish a website or webpage on the Internet. However, websites are hosted on […]

The post Importance of Uptime for Hosting Companies appeared first on HTS Hosting Blog.

]]>
Web Hosting has been referred to as a service that enables individuals and business organizations to publish their websites or web page on the Internet.

Hosting companies, on the other hand, provides the infrastructure that allows a person or a company to publish a website or webpage on the Internet. However, websites are hosted on special computers known as servers.

Many hosting companies provide additional services in addition to web hosting, such as domain purchase, website builder, SSL certificates, Dedicated Hosting, Cloud Hosting, and so on.

Every hosting company’s who claims to be a good Hosting providers will always maintain there high uptime rate to avoid latency or downtime.

When it comes to choosing a hosting provider for your website or web page, one of the most important factors to consider is the uptime rate. The amount of time their server is operational or operating is referred to as uptime.

Uptime is critical for hosting firms as well as for individuals and businesses. The high uptime rates are a positive sign that their services are running smoothly. As a result, the website will be available for a longer period.

Further to that, uptime rates assist in the optimization of Google rankings, helping both individuals and companies, as well as the hosting company.

Furthermore, high uptime rates contribute to the overall revenue of the company, while downtime reduces revenue and harms the company’s image.

Loss of business and revenue necessitates continuous monitoring of uptime rates. As a result, an uptime monitoring solution is required, which not only increases business but also protects the website from hackers.

Many website plug-ins, such as Jetpack, AlertBot, Site24x7, and others can be used to track a website’s uptime rate. In general, a standard uptime percentage of five nines (99.999%) is regarded to be a high level of reliability.

Moreover, scheduled maintenance, hardware and software issues, server overloads, DNS issues, CMS troubles, natural calamities, and other unavoidable reasons can all cause the website to go down.

Even the best web hosting providers cannot prevent a website’s downtime.

While some triggers of downtime are beyond our control, there are some measures you can take to ensure your website has a high uptime rate, such as:

  • Choosing a dependable hosting provider aids in increasing a website uptime rate.

  • Regularly monitoring a website is also necessary.

  • In addition to the hosting provider, the hosting plan has an impact on the website uptime rate.

  • Using a content delivery network (CDN) improves website speed and reduces the risk of crash.

Furthermore, in addition to a high uptime rate, responsive and efficient customer support is required while selecting a hosting provider, as customer service is the backbone of any company or business.

The post Importance of Uptime for Hosting Companies appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/importance-of-uptime-for-hosting-companies/feed/ 0
Centos vs Cloud Linux https://www.htshosting.org/blog/2021/05/centos-vs-cloud-linux/ https://www.htshosting.org/blog/2021/05/centos-vs-cloud-linux/#respond Tue, 18 May 2021 07:11:16 +0000 http://htshosting.org/blog/?p=701 In order to understand the difference between Centos and Cloud Linux, one must be aware of the key features of both. Let us dive into the definition and differences between CentOS and Cloud Linux. CentOS CentOS, also known as Community Enterprise Operating System, is a community-driven free software that focuses on providing a robust open-source […]

The post Centos vs Cloud Linux appeared first on HTS Hosting Blog.

]]>
In order to understand the difference between Centos and Cloud Linux, one must be aware of the key features of both. Let us dive into the definition and differences between CentOS and Cloud Linux.

CentOS

CentOS, also known as Community Enterprise Operating System, is a community-driven free software that focuses on providing a robust open-source ecosystem.

Cloud Linux

CloudLinux Operating System is created for shared hosting providers. It partitions customers into LVE (Lightweight Virtualized Environment) which divides, allocates, and also limits the server resources.

While being in a shared hosting environment, it is essential to make sure that no single user overloads the systems with their applications. CloudLinux has been designed to fight all web hosting issues.

Centos vs Cloud Linux

Since we have a slight brief of CentOS and Cloud Linux definition, let us get into the differences between the two.

Easy Use

The important part of setting up the server is the maintenance. If the server is poorly maintained, it is likely to be hacked frequently. CentOS has a plethora of application updates as well you also get an option to automate the package updates.

However, in CloudLinux, it has its own packages. They offer a bunch of features to make web hosting pretty easy.

Stability

Stability is of utmost importance when it comes to Web Hosting servers. CentOS is comparatively old in this industry and it is quite efficient in handling the websites that demand high resource usage.

However, CloudLinux servers have an option to limit the resources that are allocated to a specific user. It is beneficial if there are multiple websites being hosted on the same server.

Cost

The cost is a major factor in any business. Therefore, before making an investment, one must know what they are getting into. CentOS is free of cost. So, you don’t need to invest a penny in installing CentOS.

But, CloudLinux demands a license. However, you can get various discounts in order to get licenses in a bulk.

Usage Tracking

In CentOS servers, you won’t have any in-built system for the purpose of user resource usage tracking. You will have to install applications, such as monit, psacct, etc for usage tracking of every website

CloudLinux tracks the resource usage for every user. Also, CloudLinux is able to cPanel (domain management panel) to offer the users the exact brief graphs on their application usage.

Security

In CentOS, the security systems are pretty easy to install. The developers constantly work on security updates to defend attackers and ensure a smooth flow.

On the other hand, Cloud Linux uses CageFS technology. In this technology, one user is not allowed to view another user’s files. This is a beneficial service as the hacking of one account won’t affect others.

Conclusion:

Choosing between CentOS and CloudLinux is very much dependent on the purpose of the server. Therefore, before picking the server, figure out the needs of the business and take an action. If you need to host fewer websites, then CentOS is good to go. But, for the purpose of shared hosting, Cloud Linux is a better option.

The post Centos vs Cloud Linux appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/centos-vs-cloud-linux/feed/ 0
How to Install cPanel on Linux Servers https://www.htshosting.org/blog/2021/05/how-to-install-cpanel-on-linux-servers/ https://www.htshosting.org/blog/2021/05/how-to-install-cpanel-on-linux-servers/#respond Tue, 18 May 2021 04:59:36 +0000 http://htshosting.org/blog/?p=698 Have you been searching high and low for information regarding the installation of cPanel on Linux servers? We understand the importance of relevant and accurate information, and have ensured to provide detailed information on the installation of cPanel on Linux servers, through the content of this blog. All you need to do is to follow […]

The post How to Install cPanel on Linux Servers appeared first on HTS Hosting Blog.

]]>
Have you been searching high and low for information regarding the installation of cPanel on Linux servers? We understand the importance of relevant and accurate information, and have ensured to provide detailed information on the installation of cPanel on Linux servers, through the content of this blog. All you need to do is to follow the steps that are being mentioned here.

In order to install Cpanel on your Linux server, you need to run the below-mentioned command:

cd /home && curl -o latest -L https://securedownloads.cpanel.net/latest  && sh latest

Your session is changed to the home directory by the above-mentioned command. Additionally, it downloads the most recent version of cPanel, and runs the script for installation.

It is recommended that the installation command be run within a Linux screen session. The creation of a shell session is enabled by the Linux screen command. This remains active even if there is any network disruption.

You need to run the which screen command for determining whether your OS (Operating System) contains screen, and to ascertain that it exists in your path. If the screen exists in your system, the system will return /usr/bin/screen.

In the event that your system doesn’t contain screen, it can be installed with the yum install screen command.

You need to enter the screen command for running a screen session. Next, you need to run the installation command. If, for any reason your session disconnects, you should log again into your server, and subsequently run the screen -r command. This connects you once again to your screen session.

It needs to be mentioned here that cPanel L.L.C designs software that cater to commercial hosting. Hence, it only licenses those IP addresses, which are static and publicly visible. It does not license IP addresses that are internal, dynamic, sticky or reserved. Moreover, it does not provide an uninstaller. In order to remove its software, you need to reformat your server.

You should install cPanel on an operating system that has been freshly installed. You need to log into the server as a root user to ensure the installation of cPanel. If you lack root-level access, you need to contact your hosting service provider or your system administrator, and seek assistance. Now you are aware of all the information that you needed to have in order to install cPanel on your Linux server successfully.

To digress, in the context of hosting service providers, these are web hosting companies that provide the necessary services and technology, along with server space, to website owners for ensuring that their websites remain accessible online at all times. The service through which websites are made accessible over the Internet, is known as web hosting. The most sought-after web hosting services are referred to as the “Best Website Hosting”, the“Top Cloud Hosting”, the “Best Windows Hosting” etc.

The post How to Install cPanel on Linux Servers appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/how-to-install-cpanel-on-linux-servers/feed/ 0
How to Activate Remote Desktop Services in Windows Server 2019 https://www.htshosting.org/blog/2021/05/how-to-activate-remote-desktop-services-in-windows-server-2019/ https://www.htshosting.org/blog/2021/05/how-to-activate-remote-desktop-services-in-windows-server-2019/#respond Sat, 15 May 2021 09:26:07 +0000 http://htshosting.org/blog/?p=622 A comprehensive guide has been put together to ensure the convenience of those who need information on activating Remote Desktop Services in Windows Server 2019. Let us run you through the necessary steps involved in activating Remote Desktop Services in Windows Server 2019. First you need to log on to the Domain Controller Right-click on […]

The post How to Activate Remote Desktop Services in Windows Server 2019 appeared first on HTS Hosting Blog.

]]>
A comprehensive guide has been put together to ensure the convenience of those who need information on activating Remote Desktop Services in Windows Server 2019. Let us run you through the necessary steps involved in activating Remote Desktop Services in Windows Server 2019.

  • First you need to log on to the Domain Controller

  • Right-click on the “All Servers” option in Server Manager

  • Add the second server using the “Add Servers” command or select the “All

  • Servers” node, then click “Manage” and click “Add Servers”

  • Now click “Manage”, and click “Add Roles & Features”.

  • Click on the option “Before You Begin”

  • Click “Next”

  • Select “Installation Type”

  • Select “Remote Desktop Services installation”

  • Click Next

  • Select “Deployment Type”

  • Keep the default selection

  • Click “Next”

  • Select “Deployment Scenario”

  • Select “Session-based desktop deployment”

  • Click “Next”

  • Select “Role Services” in “Review role services”

  • Review the services that will be installed

  • Click “Next”

  • Select “RD Connection Broker” in “Specify RD Connection Broker server”

  • Click the member server and click the Add button.

  • Click “Next”

  • Select “RD Web Access” in “Specify RD Web Access server”

  • Check “Install the RD Web Access role service on the RD Connection Broker server”

  • Click “Next”

  • Select “RD Session Host” in “Specify RD Session Host servers”

  • Click the member server and click the Add button

  • Click “Next”

  • Select “Confirmation” in “Confirm selections”

  • Check “Restart the destination server automatically if required”

  • Click “Deploy”

  • You need to wait until all role services have been deployed and the member server restarts

  • Click “Close”
  • In Server Manager click Remote Desktop Services and scroll down to the “Overview”

  • Click the Add “RD Licensing” server button

  • Select a server

  • Click the domain controller and click the Add button

  • Click “Next”

  • Confirm selections

  • Click Add

  • View progress

  • Wait until the role service is deployed. No need to restart.

  • Click Close

  • Click the Add RD Gateway server button

  • Select a server

  • Click the member server and click the Add button

  • Click Next

  • Name the self-signed SSL certificate

  • Enter the external Fully Qualified Domain Name which you will also use for the Web Access URL

  • Click Next

  • Confirm selections

  • Wait until the role service has been deployed. Again, no need to restart.

  • Click Close.

Let us have a quick look at the configuration that we have so far

In Server Manager, Remote Desktop Services, Overview, click Tasks and click Edit Deployment Properties.

Configure the deployment

  • Review the RD Gateway settings and notice what settings are available

  • Click RD Licensing

Configure the deployment

Notice, an RD License server is available, but no license type is selected yet.

  • Select a type

  • Click RD Web Access

Configure the deployment

By default the RD Web Access IIS application is installed in /RdWeb.

  • Click Certificates

Configure the deployment

Notice it, the certificate level currently has a status of “Not Configured”.

Certificates are used for different goals within the deployment.

  • Change the internal FQDN for the Connection Broker to an external FQDN

  • Click OK

Changing the Connection Broker FQDN to an externally resolvable FQDN

  • Open DNS Manager on the domain controller and browse to Forward Lookup Zones.

  • Right click Forward Lookup Zones

  • Click New Zone

  • Go through this wizard accepting the defaults until you have to enter a Zone Name

  • Enter the external FQDN which will also be used by the Connection Broker

  • Finish the rest of the wizard accepting the defaults

  • Browse to the newly created zone

  • Right click the newly created zone and click New Host (A or AAAA)…

  • New Host

  • Leave the Name field blank, but enter the member server’s (holding the RD Connection Broker role) IPv4 address

  • Click Add Host

  • Create a new Global Security Group called “RD Connection Brokers” and add the computer account for the member server to it as a group member

  • Reboot the member server to let it know it’s a member of the RDS Connection Brokers security group

  • The next steps in re-configuring the RD Connection Broker depend on an SQL database shared by all Connection Brokers in the deployment. Without this configuration the RD Connection Broker will rely on the Windows Internal Database that was created during the initial deployment of the roles

  • Install SQL Express on the Domain Controller (or use an existing SQL Server if you already have one)

Here’s a list of needed features:

  • Click Default, and do not leave the wizard’s selection on Named instance: SQLEXPRESS

Set the SQL Service to start using SYSTEM because the default account of SQLSERVER cannot be used on a Domain Controller.

When the installation is done, open SQL Configuration manager and browse to Client Protocols under SQL Native Client 11.0 Configuration.

Check if TCP/IP is enabled under Client Protocols. SQL Express install enables this by default, but check it just to be sure, especially if you use an existing SQL Server.

Browse to Protocols for MSSQLSERVER, under SQL Server Network Configuration.

Enable TCP/IP. If this is a new SQL installation, this will be disabled by default.

Restart the SQL Server service if you changed this setting.

On the SQL Server, make sure port 1433 is not being blocked by Windows Firewall.

Add the SQL Server executable to the exception list to allow all inbound traffic, but TCP 1433 inbound should suffice.

If you installed SQL Server using the default folder locations, the sqlservr.exe executable is found in “C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\Binn”.

  • Open SQL Server Management Studio, connect to the default instance on the Domain Controller and browse to Logins under Security.

Remember the Management Studio is no longer available with the SQL Server download, but is a different download.

  • Right click Logins and click New Login…

Login – New

  • Click Search…

  • Select User, Service Account, or Group

  • Click Object Types… and select Group

  • Type the RDS Connection Brokers security group name and click Check Names

  • Click OK

  • Login – New

  • Click Server Roles and select dbcreator

  • Click OK

The RDS Connection Broker server now has the right to create databases.

  • Install the SQL Native Client on the member server (Client Components only). If you used the member server in this setup to install the SQL Management Studio, you can skip this step because the Native Client was installed with installing the Management Studio.

In Server Manager click Remote Desktop Services and scroll down to the “Overview”.

  • Right click RD Connection Broker and click Configure High Availability

Before you begin

Look at the pre-requisites.

If you have more than one RD Connection Broker they need to be configured using DNS Round Robin.

  • Click Next

  • Configure RD Connection Broker for High Availability

  • leave the default selected

  • Click Next

Configure RD Connection Broker for High Availability

DNS name for the RD Connection Broker cluster:

The DNS Zone name we configured in DNS earlier: rds.it-worxx.nl

Connection string:

DRIVER=SQL Server Native Client 11.0;SERVER=ITWDC;Trusted_Connection=Yes;APP=Remote Desktop Services Connection Broker;DATABASE=ITWRDCB

Folder to store database files:

C:\Program Files\Microsoft SQL Server\MSSQL14.MSSQLSERVER\MSSQL\DATA

I used the instance default folder.

  • Click Next

  • Confirmation

If you get an error before this page:

  • Check if TCP/IP is enabled in client protocols and for your instance

  • Check if you can reach port 1433 on the SQL Server from the member server

  • Click Configure

Progress

If you get an error on this page:

Check SQL permissions for the security group

  • Check if the database path you entered is correct

  • Click Close

The RD Connection Broker is now in High Availability Mode, and configured as “rds.it-worxx.nl” and we are finally ready to complete the configuration.

Configuring Certificates

In Server Manager, Remote Desktop Services, Overview, click Tasks and click Edit Deployment Properties, then click Certificates.

Configure the deployment

  • Click RD Connection Broker – Enable Single Sign On and click Select Existing certificate

  • Browse to the .pfx file, enter its password, and check Allow the certificate..

  • Click OK

  • Click Apply. This takes a little while, be patient.

Configure the deployment

  • Click RD Connection Broker – Publishing and click Select Existing certificate

  • Browse to the .pfx file, enter its password, and check Allow the certificate..

  • Click OK.

  • Click Apply. This again takes a little while, be a little more patient.

Configure the deployment

  • Click RD Web Access and click Select Existing certificate

  • Browse to the .pfx file, enter its password, and check Allow the certificate..

  • Click OK

  • Click Apply again. This takes another little while longer, be slightly more patient

Configure the deployment

  • Click RD Gateway

  • Click Select Existing certificate

  • Browse to the .pfx file, enter its password, and check Allow the certificate..

  • Click OK.

  • Click OK to apply the final certificate step

Configured all servers, configured certificates..

One thing left to do: Tell our RDS environment exactly what to publish.

Publishing resources to your users

In fact you can use this setup to either provide full desktop sessions on the Session Host, or you can choose to publish only applications on the Session Host.

Let’s publish full desktop sessions.

In Server Manager, Remote Desktop Services, Session Collections, click Tasks and click Create Session Collection.

Before you begin

Review the requirements. This won’t be an issue in this setup, but you could restrict access to this collection by selecting a select group of people.

  • Click Next

Name the collection

Enter a descriptive name. This name will be displayed under its icon in the Web Access interface.

  • Click Next

Specify RD Session Host servers

  • Click the member server and click the Add button

  • Click Next

Specify user groups

You can limit access to the resource here if you want to do that.

  • Click Next

Specify user profile disks

  • Uncheck Enable user profile disks for now

  • Click Next

Confirm selections

Review the information and click Create.

  • View Progress

  • Wait until the collection is created and the server is added to the collection

  • Click Close

The post How to Activate Remote Desktop Services in Windows Server 2019 appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/how-to-activate-remote-desktop-services-in-windows-server-2019/feed/ 0
What Are Cloud Computing And The Benefits Of It? https://www.htshosting.org/blog/2021/05/what-are-cloud-computing-and-the-benefits-of-it/ https://www.htshosting.org/blog/2021/05/what-are-cloud-computing-and-the-benefits-of-it/#respond Thu, 13 May 2021 12:26:50 +0000 http://htshosting.org/blog/?p=618 In a general sense, the cloud refers to something which is very divine and present in the sky. It is a planetary body, a blessing from the almighty from heaven. In a similar manner, cloud and cloud computing could be understood. From a technology perspective, “Cloud” are the servers which are servers that are accessed […]

The post What Are Cloud Computing And The Benefits Of It? appeared first on HTS Hosting Blog.

]]>
In a general sense, the cloud refers to something which is very divine and present in the sky. It is a planetary body, a blessing from the almighty from heaven. In a similar manner, cloud and cloud computing could be understood. From a technology perspective, “Cloud” are the servers which are servers that are accessed through the internet and hardware and software run on those servers. Simply put, through cloud computing, an individual or a company can run the software and other applications without the need for physical servers.

So, individuals and companies switching to cloud networking or computing reduce IT costs and other database maintenance costs. As they use borrowed servers, the vendors of those servers will update and maintain them, it reduces the burden to maintain and upgrade the servers, and it is a cost-effective process. As some small scale business and companies cannot servers, they essentially use the cloud to store and can be accessed from any part of the world.

The shift to cloud computing from the traditional mainframe computing and servers are seen as a boon to the IT revolution. Some of the benefits of cloud computing are

  • Cost:  To a large extend, cloud has reduced the capital expenditure of buying mainframe computers and large servers. Previously not all business could afford to buy those large servers. Moreover, it saved costs in terms of one-time installation cost and timely up-gradation costs. The benefit it does to businesses is that IT experts manage and maintain the cloud servers around the clock and ensure 24/7 electricity and colling of those clouds. It becomes hassle-free for the user.

  • Global Reach: The benefit of cloud servers and services is that it can be scalable and has a global reach and outlook. A business owner or an individual sitting at a remote location and access the cloud servers at any part of the world. It also offers the user more storage and bandwidth, faster computing speed and geographical advantage.

  • Performance: It is needless to say that large cloud servers are run on extremely safe and secured data centres. These wide networks of data centres are regularly upgraded and use the latest computer hardware version that is fast and efficient. It offers an added advantage over a single data centre. It improves latency and achieves more significant economies of scale.

  • Security: Almost all cloud servers are highly secured, and a stringent set of policies governs all these cloud servers. The technologies that these servers use are technologically modernised, which controls and maintains the cybersecurity protocol overall, thereby protecting the data and applications from potential cyber threats and crimes.

The post What Are Cloud Computing And The Benefits Of It? appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/what-are-cloud-computing-and-the-benefits-of-it/feed/ 0
The Difference between a VPS and a Dedicated Server https://www.htshosting.org/blog/2021/05/the-difference-between-a-vps-and-a-dedicated-server/ https://www.htshosting.org/blog/2021/05/the-difference-between-a-vps-and-a-dedicated-server/#respond Wed, 12 May 2021 11:45:00 +0000 http://htshosting.org/blog/?p=615 “Server”, a term that most of us have heard frequently, has become an important IT component in the infrastructure of most enterprises these days as businesses rely heavily on technology to carry out their operations in this global business world. Now, what exactly is a server? A server can either be software or it can […]

The post The Difference between a VPS and a Dedicated Server appeared first on HTS Hosting Blog.

]]>
“Server”, a term that most of us have heard frequently, has become an important IT component in the infrastructure of most enterprises these days as businesses rely heavily on technology to carry out their operations in this global business world. Now, what exactly is a server?

A server can either be software or it can be a hardware device, which is meant to accept and then appropriately respond to requests that are made over the Internet. Devices that generate requests and receive servers’ responses are known as clients. Functionality, which is known as a service, is provided by servers (hardware or software) to these clients (devices or programs). The client-server model is used for this purpose. Servers can be of various types, such as print servers, database servers, file servers, mail servers, application servers, game servers, proxy servers, web servers etc.

Let us take the example of web servers to further understand the role of a server. Web servers are used and provided by web hosting companies for storing the files of websites in order to deliver the service of web hosting. Web hosting is the service that renders different websites accessible over the Internet. When the files of websites that are stored on web servers, are delivered over the Internet, to the Internet connected devices of users, then websites become accessible to those users.

A web server essentially caters to accepting and fulfilling the requests of clients with regard to the content of websites (images, videos, HTML pages etc.). The usual “clients” of web servers are browsers or mobile applications. The requests that are generated are in the form of Hypertext Transfer Protocol messages (HTTP) and the web servers’ responses to these requests are also in the form of HTTP messages. In the context of web hosting companies, which provide these servers, the most competent web hosting service providers are referred to as the “Best VPS Hosting Company”, the “Best Linux Dedicated Hosting Company”, the “Top Cloud Hosting Company” etc.

Servers, along with other essential network equipment, are usually kept in a glass house or a closet. This is meant for isolating these important IT resources from unauthorized access. Servers that are not hosted on-site are present in data centers that make these servers available for use.

It is essential for servers to remain functional at all times because these provide such services that are required constantly. Enterprises use servers for many functions, which include but are not limited to hosting websites, applications, emails, data storage etc.

In this blog our focus is on VPS (Virtual Private Server) and dedicated servers. These are two types of servers that are used by web hosting companies for the purpose of web hosting. VPS hosting involves the use of VPS and dedicated hosting involves the use of dedicated servers. Let us elaborate on these two types of servers, and shed light on their differences.

VPS

VPS is the abbreviation for Virtual Private Server. It is a type of server that uses virtualization technology to ensure that every user of a VPS has access to dedicated (private) resources that exist on a shared server hosting multiple clients. In a Virtual Private Server, multiple clients utilize the isolated instances on the same parent server. A VPS delivers enhanced security, performance and stability at a much lesser price than that which is needed for renting an entire server and its resources (dedicated server). Hence, a VPS offers one of the best solutions to those whose requirements have exceeded that which could be effectively catered to by shared hosting but are not at that level which requires them to invest in a dedicated server.

A Virtual Private Server is capable of successfully emulating a dedicated hardware by mimicking virtually a dedicated server’s environment within a shared server, which is called the parent server/host. In this way, it offers functionality similar to that of a physical server. By virtue of being software-defined, a VPS can be created as well as configured easily. In it, virtualization technology is used for delivering dedicated resources to the virtual servers that exist within the host/parent server. A VPS runs its own copy of an operating system. The multiple virtual servers that exist within a parent server remain separated from each other. Software called Hypervisor is used in order to implement a virtual layer atop the OS (operating system) for segmenting the virtual servers. This segregation enables each VPS to have its own OS and software installed, resulting in the creation of individual private servers. The installation of custom software and the creation of isolated development environments are enabled by a VPS. It aids in isolating multiple digital service offerings. A VPS can either be managed or unmanaged, when it is availed from a service provider.

Dedicated Servers

A dedicated server is a type of a server, wherein the entire server and its resources are used by a single tenant. This type of hosting service is known as dedicated hosting or single-tenant hosting. In it, the user has exclusive access to all the resources of the server, which are not shared with any other user, as the entire server belongs to a single entity. Hence, one is able to configure it entirely based on one’s requirements. A dedicated server delivers enhanced speed, flexibility and security and lets its user have full control over the server set up, which includes hardware configuration as well as options for custom software.

Dedicated servers are known to deliver the highest levels of performance and present one of the best solutions for business critical applications, revenue-generating online stores, enterprises, websites that need enhanced security and customization, experience a lot of traffic, and/or those sites that anticipate rapid growth.

Conclusion

Virtual Private Servers and Dedicated servers, both are very efficient types of servers and opting for either of these servers depends on one’s requirements and budget. Availing a dedicated server is usually more expensive than availing a VPS but in a dedicated server one has total control over the physical hardware and the server’s software, and it offers enhanced speed and security. Unless one has the requirement for a dedicated server in particular, a VPS proves to be an extremely viable alternative.

The post The Difference between a VPS and a Dedicated Server appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/the-difference-between-a-vps-and-a-dedicated-server/feed/ 0
Know More about Securing your Website and Get it Protected from Hackers https://www.htshosting.org/blog/2021/05/know-more-about-securing-your-website-and-get-it-protected-from-hackers/ https://www.htshosting.org/blog/2021/05/know-more-about-securing-your-website-and-get-it-protected-from-hackers/#respond Tue, 11 May 2021 06:34:37 +0000 http://htshosting.org/blog/?p=612 Whether you own a small or big business, your each and every effort is significant in your business. It is a most horrifying thing to get your whole website wiped out and hacked by some hacker. You give your everything to your  business and you just can’t let it hacked. If you read in the […]

The post Know More about Securing your Website and Get it Protected from Hackers appeared first on HTS Hosting Blog.

]]>
Whether you own a small or big business, your each and every effort is significant in your business. It is a most horrifying thing to get your whole website wiped out and hacked by some hacker. You give your everything to your  business and you just can’t let it hacked. If you read in the news you will see many reports of data breaching. Don’t think that if you own a small business, no hacker will check your website. Be prudent and secure your website with these easy steps you will read in this article.

  • Use security software or plugins: Just like protecting your computer with an antivirus program, it’s wise to protect your website with security software. There are several different website firewalls to which you can subscribe for constant protection, and website hosting services like WordPress often offer security plugins as well.

  • Use HTTPS encryption: It is also a wisest way to secure your website. An HTTPS certificate must be renewed every year. Once you’ve installed an SSL certificate, your website should qualify for HTTPS encryption; you can usually activate the HTTPS encryption by installing your SSL certificate to your website’s “Certificates” section.

  • Secure your site with complicated passwords: You need to come up with complicated, random passwords which aren’t replicated anywhere else and store their key somewhere outside of the website’s directory or may be offline in a note pad. Using unique passwords is not just enough in a world where cyber crime is so frequent.

  • Hide your admin folders: Naming your website’s sensitive files’ folder “admin” or “root” is convenient. Changing these files’ location’s name to something boring “New folder (2)” or “history” can make it harder for would-be attackers to locate your files. Don’t make anything easy for your hacker. Give him a tough time.

  • Keep error messages simple: Sometimes the website owners gives away too much information regarding error messages that it becomes easier for  hackers and malware to exploit the information to find and gain access to things like your website’s root directory.

  • Keep your website up to date: Keeping your website up to date is also a way to save your website from attacks of intruders. Failing to update your website’s software, security, and scripts when necessary is a sure way to allow intruders and malware to take advantage of your site. Whenever an update for your website is available, install it as immediately as possible.

  • Install an SSL certificate: When choosing an SSL certificate, you have three options: domain validation, business validation, and extended validation. An SSL certificate essentially confirms that your website is secure and able to transfer encrypted information back and forth between your server and a person’s browser.

The post Know More about Securing your Website and Get it Protected from Hackers appeared first on HTS Hosting Blog.

]]>
https://www.htshosting.org/blog/2021/05/know-more-about-securing-your-website-and-get-it-protected-from-hackers/feed/ 0