Plesk

How Do I See What Apps Are Installed In My Plesk Reseller Account

Posted on

This guide will teach you how to see What Apps Are Installed In My Plesk Reseller Account 1. Enter into the Plesk control panel.                                                                                                 2. Click on “Tool and Settings” from the drop-down menu on the left-hand side. 3. Click on ‘Application Vault’ in the new window that appears. 4. There are two options in […]

SQL

How to Customize the version of MySQL database in cPanel

Posted on
How to Customize the version of MySQL database in cPanel

In this article, you will find the procedure of Customizing the version of the MySQL database, when installing cPanel for the first time. It is possible to preconfigure a cPanel installation so that your desired version of MySQL is installed from the start. Let’s follow the Procedure to Customize the version of the MySQL database […]

Plesk

How to Setup Scheduled Tasks in Plesk?

Posted on
How to Setup Scheduled Tasks in Plesk

In this article, you will find how to Setup Scheduled Tasks in Plesk. If you need to run scripts on your server at a specified time, you can use your server’s task scheduler to have the system run the scripts for you. Let’s follow the steps to set Scheduled Task in Plesk: 1. Log in […]

Domain Name

How To Create a Sub-Domain In Plesk

Posted on
Suddomain plesk

This tutorial will teach you how to create a Sub-Domain in Plesk. A subdomain is a part of your main domain that appears before the domain name and extension. It’s based on a prefix you choose. For instance, see in this example, primary domain is ‘xyz’ and subdomain prefix is ‘kb2’ and ‘.com’ is TLD. To […]

Web Security

What is a DMARC record and its uses?

Posted on
DMARC

Here, in this tutorial, you will understand what exactly is a DMARC record. Let us know what is a DMARC record. DMARC (Domain-based Message Authentication Reporting and Conformance) is an email validation barrier that protects your company’s email domain from being misused for email spoofing, phishing frauds, and other kinds of cybercrime.  The existing email […]