Web Hosting Questions and Answers
We can allow some trusted IP addresses to make sure that they are not getting blacklisted even if it notices some failed attempts etc. Usually we whitelist our own static IPs to make sure that we are not completely getting blocked.
The disk space stands for the allocated space to store our data.
CGI scripts do not function when uploaded in BINARY mode. Also, the file permissions are set in the right manner. Do not set it to the read, write and execute for everyone mode and change it to make them readable on the web server and client browser.
Web Host Manager (WHM) provides administrative control of your servers. You use WebHost Manager to create individual accounts, add domains to your server, manage to host features, and performing basic system and control panel maintenance.
Both platforms have their won unique features. The applications running on PHP, MySQL database, etc need Unix/Linux Hosting while those running on ASP .net, MS SQL database needs Windows Hosting. Based on cost, Unix/Linux hosting is cheaper than Windows hosting.
Yes, if it supports Linux or Windows OS, you can run it on your own VPS.
Domain parking is the process of hosting additional domains on your account which display the same website as your primary domain and share web statistics as well; however, you can give the parked domain its own email boxes.
Full-service web hosting provides additional features in addition to providing web space, domain transfer and emails for a website. It includes 24/7 toll-free phone support, web design services, or web site content maintenance also.
Web files can be upload using the File manager option in the control panel or you can use File Transfer Protocol to upload a file into the home directory public_html in usual Linux based hosting and htdocs folder in Windows-based hosting servers.
Uptime means the amount of time the server is stayed up and running.
A domain name is simply a Website name. In definition, the Domain name is a unique address on the internet to identify a single IP address or group of IP addresses.
The computer uses IP address, it is difficult for humans to remember those IP address, that’s why they developed domains
Virtual web hosting refers to the process of running multiple “virtual" web servers on a single host computer. Using this technique, a single computer can host thousands of independent web sites, sometimes on the same IP address.
The primary programming language used for developing cPanel & WHM is Perl.
For Windows DNS, the default folder for the zone files is %systemroot%system32dns.
And for using BIND, the location of the zone file for each zone is specified in the BIND configuration file /etc/ named.conf.
A Shell is a user program which provides an interface to communicate with Linux operating systems. Shell accepts the commands, programs and shell scripts execute by the users in a human-readable format and convert them to a program which Kernel can understand.
A Shell script is a sequence of commands arranged in a format and stored in a file that is run by the Shell.
Kernel is the core part of an Operating systems. It manages the I/O requests and translates them into data instructions for the CPU and other components. Simply, it establishes a connection between Software part and Hardware part.
Pipe is used to combine two or more commands. The output of the first command will be the input for the second command and so on.
The Bash which stands for‘Bourne-Again Shell’ is the shell or a command language interpreter, for the operating system. It is basically a command processor that typically runs in a text window, allowing the user to type commands that cause certain actions. It can read commands from a file, called a script which can be used for more automation techniques.
A Linux process can be in a number of different states. The most common state codes you’ll see are:
• R: running, it is just waiting for the CPU to process it.
• S: Interruptible sleep, waiting for an event to complete, such as input from the terminal.
• D: Uninterruptible sleep, processes that cannot be killed or interrupted with a signal, usually to make them go away you have to reboot to fix the issue.
• Z: Zombie, zombies are terminated processes that are waiting to have their statuses collected.
• T: Stopped, a process that has been suspended/stopped
We can use the ls command to list the information about files and directories within the file system. The ls command is one of the basic commands that any Linux user should know. There are some command line options to get more details about the file such as permissions, ownership, modified date, modified time, etc. The basic syntax to display the files inside a folder is provided below:
By default, the ls command will not show hidden files. In Linux, a hidden file is any file that begins with a dot (.).
To display all files including the hidden files use the -a option:
# ls -la
In order to kill a process, you need to locate the details of the process. Depending upon the situation, you can use any of the following commands for this purpose :
top, ps, pidof and pgrep.
There are different commands you can use to kill a process – kill, killall, pkill and top.
SSHis a protocol used to securely log onto remote systems via command line. It is the most common way to access remote Linux or Unix based servers. When comparing to Telnet, SSH is more secure since the client /server connection is authenticated using a digital certificate and passwords are encrypted.
The syntax to log into a remote Unix/Linux machine using SSH is
# [email protected] or hostname75
A file-system is a way of storing information on a computer that usually consists of a hierarchy of directories that is used to organize files. There are multiple types of file systems, including FAT32, and NTFS for devices under Windows OS, Ext3, Ext4, XFS, and Btrfs for devices under Linux, HFS/HFS+ for storage media in Mac OS X.
• Internal Commands: Those are commands that directly executed by the Linux shell. No separate process will be there to run these commands. For all the shell built-in commands, the execution of the same is fast since there is no need to check for the exact path and also no process is being created for the same as well.
Examples: cd, pwd, echo
• External Commands: The commands that are executed by the kernel are known as external commands. Each command will have a unique process id. When an external command needs to be executed, the shell looks for its path given in PATH variable and also a new process has to be spawned and the command gets executed. Those scripts are usually located in /bin or /usr/bin.
Examples: ls, cat. mv
RAM, short for ‘Random-Access Memory’, is a type of data storage used for holding program instructions that are frequently used, with the purpose of increasing the system’s general speed. RAM is used to store temporary data created. Therefore, when you turn off your machine, the data held in RAM will be lost. This is why it’s called a “volatile memory”.
ROM, short for ‘Read-Only Memory’, is a non-volatile memory that cannot be altered or reprogrammed easily. Data stored in ROM is not lost when power is removed. One example of ROM is the BIOS in your machine – a chip that holds the instructions needed for your computer to begin the initial start-up process.
Cache memory also called as CPU memory. It is a random access memory that the computer microprocessor can access more quickly than regular RAM. It integrated directly on-chip or placed on the dedicated chip which is interconnected with the processor. Basic function of cache memory is to store the program data which are frequently referenced by software. So it increases the overall speed of applications
A computer stores data using several different methods. Therefore, there are different levels of data storage, which may be referred to as primary and secondary storage. A machine’s internal hard drive is often considered a primary storage device, while external hard drives and other external media are considered secondary storage devices.
NFS stands for Network File System which is commonly used for management and sharing of files across a network. It is a secure way to manage your important files. This enables local users to access and manage their remote data and files in the same way they are accessed locally even if they are away.
Purpose of NFS:
• Secure way to share and manage your important files remotely.
• Data can be stored on a single machine and still remain accessible to others over the same network which provides better security and less space consumption.