EnglishDeutschFrançaisMagyar
by Transposh - translation plugin for wordpress
+36703116133
Technical help
(06) 46-79-68-27

Clients were asked about

Ügyfelek által kérdezett tárhely, domain stb.. kérdések, answers.

Website setting up SSL for

Question: Why don't you go to the SSL service if it is switched on?

Response: This manually we need to set the .htaccess file.

If the URL-t http-HTTPS-re you want to redirect .htaccess using, follow the steps below:

.htaccess file editing:

Log in to your cpanel in credentials.
– If the .htaccess file is present, open the file.
– If the .htaccess file is not present, then click the new file to create.
– Right-click on the .htaccess file, then click edit and paste here the following redirect code:

RewriteEngine On
RewriteCond %{HTTPS} off
RewriteRule ^(.*)$ HTTPS://%{HTTP_HOST}%{REQUEST_URI} [(L),R=301]

– Save the changes and update your site.

Your site has successfully been moved to http http for the .htaccess file help.

Tagged
dkim

Mi az a DKIM kulcs és hogyan ellenőrizhetem?

The domain key, i.e. the domain key to the DNS record in, (is automatically created when you add a domain name in the control panel) key that serves, the fact that the email recipient can identify the sender. This prevents, false e-mail address from received email.

Check: http://dkimcore.org/tools/ and the control panel DNS zone copy the key so that shouldn't be in the ” ” symbol and copy and paste the http://dkimcore.org/tools/ website Check the dkim Core Key Record section.

You should see this after checking it: This is a valid DKIM key record

The domain keys cPanel and plesk under generated automatically no need for manual, manual update.

The dkim-about ' here: https://support.google.com/a/answer/174124?hl=hu

Tagged

Plesk interface MX record change

How do I change my MX record as well Plesk interface?

  1. Enter the Plesk hostingsing interface, the entry with the data.
  2. Navigate to the DNS Settings (DNS settings), you want to change domain field.

 

  1. The DNS records of find set the default MX record, which is in the mail.domain.en record show.
    The MX record for the correspondenceresponsible for, so if you only the mail you want somewhere else to use, the next act in a way that.

Two options are possible. The only MX record should be set (PL. Google mail) or another server IP address to set.

Let's look at the MX record modification:

Mail exchange server * – Want to use MX record
Specify the priority of the mail exchange server – MX record priority (the lower the score, the higher the priority of)

Mutatis mutandis, multiple MX records can be set, The Add record menu item in the new records up.

In the case of, if an IP address you can set the redirect, then the MX record don't touch, let's see the mail.domain.en value. And in the mail.domain.en The record should be amended.

The changes made will not be valid, if the Update button-I approve.

Attention! The DNA amendment update from the development of the practice 12-24 hours.

Tagged

How can I reach the storage operating domain name without?

Own computer you need to perform a simple modification:

Under Windows route: C:\windowssystem32driversetchosts

Mac OS X Leopard & Snow Leopard below: Terminal: sudo /Applications/TextEdit.app/Contents/MacOS/TextEdit /etc/hosts

Under Windows:

1, file manager find this file C:\WindowsSystem32driversetchosts

2, once click the file, then right mouse click and select edit with notepad (or that you use a text editor to pl. notepad) from the menu

(Probably administrator-level permission will be needed, so this can only be carried out who is the computer admin rights, compatibility has)

You will see this:

Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mapping of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# in place in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denon by the ‘#’ symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

# localhost name resolution is also handle you within DNA itself.
# 127.0.0.1 localhost
# ::1 localhost

The next line, type the ip address and the domain name, that registered.

For example:
195.56.100.66 ujdomain name.en

3, So this is how it will look in the hosts file:

Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mapping of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# in place in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denon by the ‘#’ symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host

# localhost name resolution is also handle you within DNA itself.
# 127.0.0.1 localhost
# ::1 localhost
195.56.100.66 I want to.en

4, This save and clear your browser history, after that, open the browser and enter the domain name that you set in the hosts file in.

Any domain name you set up on the server and the hosts file in the doesn't matter ... , if domain is not registered, it doesn't exist! This method works even, of course, only on the computer where this is set.

Email client Setup?

All the mail client to use cpanel under, use the following procedure to configure the mail client:

1, use the settings on the client machine which is 99% working correctly, only email the name and address passwordt the rest is done by the client only ok button to press.

2, go to cpanelbe and email mailbox menu you find email options menu where all the popular client program to download the settings when you download just click on the downloaded file and automatically configures the client, There is no other thing.

3, The following ports manually, You can use the settings:

— Under Thunderbird —
1. 465/SSL option
Server name: galactica.xhu.hu
Port: 465
Encryption: SSL/TLS
Authentication method: normal password

2. 587/STARTTLS option
Server name: galactica.xhu.hu
Port: 587
Encryption: STARTTLS
Authentication method: normal password

— Under Outlook —
1. 465/SSL option
Port: 465
Encryption: SSL (or AUTOMATIC)

2. 587/STARTTLS option
Server name: galactica.xhu.hu
Port: 587
Encryption: TLS (or AUTOMATIC)

Also find this information in the cpanelben the email menu, and then click the settings.

PHP 7 version available?

Yes, the space available for up to PHP 7 version is, but the stable működészhez php 5.5 or php 5.6 We recommend version. Entering the cpanelbe, the php version can change the php version of the menu and activate the corresponding modules.

Issues relating to resource limit exceeded

Question:
In recent days several times this system error message I received:

Your space: xyz.com has reached and exceeded the maximum allowable space, set resource limit in the past 24 hours.
The maximum number of connections has been reached. Therefore, it was not available on the website of X times.

The space more parked domain can be found in. They could help, where can I find the error?

Response:

If you receive an email to this address: “Hosting account resources exceeded”, then the website has exceeded the hostingone of the resource constraint set's.

This means:

  • too much memory usage
  • too high CPU usage
  • too much HDD activity (I/O)
  • the sum of the number of processes running on too much EP limit

Causes may include:

1, The number of visitors continues to grow, and one day reach the storage limit of the resource.
Solution:
The, If you have multiple separate content, It is a high-traffic website space, It will have more space to share.
(B), VPS sale, details: https://www.xhu.hu/virtualis-szerver-vps-berles/

2, BOT, robot attack on the website. Nowadays it is quite common, However, these types of attacks usually are kept for a short time.

3, DOS or DDoS DOS attack

4, Faulty, outdated CMS extensions

5, Poorly written application

Malfunction, in the case of an attack on the solution:

Log in to Cpanel in, and click on the Resource usage (Resource Usage) icon, You can check the graphs, When and what resource limits came too, look at the graph you can see climaxes, I, to download the access log(raw access log), Apache, error logs, the highlight around the time. The icon in the Resource usage (Resource Usage) In addition, you will find the icon Known as the raw access logs (Raw Access Logs) find out with these, find out what is causing the problem.

The purpose of the resource constraint, to prevent the server from overloading the Server Web page too. If it weren't for resource limits, a badly written page (infinite loop), or you can make the Web page under attack by unavailable server, which, where appropriate, may be hundreds of Web hosting.

If more than one major resource website is, This may be caused by the large number of visitors is(but it is very rare). In this case, the person who created the website can help you find out, which application, the resources consumed by the page, analyzing the error-, Apache logs in all the problematic periods. This problem by optimizing the website applications, protection can be improved.

However, it is always worth the extra space made more pages, This avoids a similar problem.

Tagged

HTTPS issue

Question:

Hi there!
I operate several websites for your szervereiteken and raise the demand for more and more user-, go to an encrypted channel pages. So far I have not done this before and my question, How can I achieve this, We need to add on your part, cPanel option may, etc.? The pages in question Joomla 3.3.3-as versions, they should be set to HTTPS connection.

If you have the Joomla settings may experience I can wait, the Control Panel has been powered up once a SSL opportunity, na it did not come into the page, so this in itself seems to be insufficient! :)
Thank you in advance for your help!
Hi,

Response:

Dear Attila!

Several things need to be ssl option:
1, SSL certificate, details: http://www.xhu.hu/Tarhely/Webtarhely/ssl.html
2, dedicated IP address, details: http://URwww.xhu.hu/Tarhely/Webtarhely/fix-ip-cim.html
3, our licensing option
4, It is possible to change Your part of this may be application dependent, Joomla, the url in the config to change operating

Yours,
Customer service

Tagged

Control of Joomla and WordPress attack!

ID 10088163

In recent weeks a lot of brute force attack of the type we have seen WordPress and Joomla Admin pages.

Unfortunately we cannot fully eliminate because there are many hundreds of different IP coming from the attack and there is no clear pattern of attack. The creator of this website must be resolved and secure website.


How to notice if there is a problem? The case is almost certain to attack website:
-If it is significantly slowing down website
-a lot of registration, I forgot my password email to arrive
-suddenly fills up the space
-If you already have installed the security component may indicate
-cPanel-in the left pane of the Statistics the cpu, memory and entry process is already in the Red, because of greatly increased the hosting resource the need for

What can you do in such a case?
Update the framework to be always up to date. Securing the admin interfaces, only the right to have access to.

In the case of the control for Joomla: The/administrator directory to password protection, This cpanelbe the passwordwith proprietary menu you can. Another solution might be to use the htacess you only trusted ip addresses allow the/administrator directory. If neither appropriate, then you can choose to FTP cpanel file manager, or simply disable the/administrator directory (0755-available from the 0000 law takes off) and when you need it will let you edit it back to the right until. This solves the problem.

For more tips, see the joomla admin control here: http://anything-digital.com/blog/security-updates/3-joomla-security-tips-to-protect-against-brute-force-attacks.html

Other add-ons joomla protection: http://extensions.joomla.org/extensions/access-a-security/site-security/login-protection

In the case of the WordPress control: In the URwp-login.php file are almost always attack, This can protect you, to simply remove all right about it and when you need it by setting the rights back to 0644-re. We do not recommend the installation of the Wordfence Security application! One method of ip restrictions, the htaccess Defense. Create a .htaccess file and put in the following code:

RewriteEngine on
RewriteCond %{REQUEST_URI} ^/wp-login.php(.*)$ [Or]
RewriteCond %{REQUEST_URI} ^/wp-admin $
RewriteCond %{REMOTE_ADDR} !^ 123.123.123.123 $
RewriteRule ^(.*)$ – [R = 4, L]

The last line before the 123 your ip address or ip range, I replace the pictures, so only you can access the admin section.

From here you can download the htaccess file, just rename it to .htaccess name after uploading!

In such a case, the Council of WordPress.org: http://codex.wordpress.org/Brute_Force_Attacks

The WP Admin Protection (by SiteGuarding.com) plugin for wp-login attack works well, because the wp-login cannot be called direct will be able to change the wp-login to access!

Other forms of attack against the worpress the URxmlrpc.php post attack, in this case the htaccess file put in the following code:

The Files/Files and before there is a break, I clear out!

< Files “URxmlrpc.php”>
Order Allow,Deny
Deny from all
< /Files>

From here you can download the htaccess file, just rename it and then after uploading the .htaccess name!

You can install the xmlrpc attack against the following plugin: Remove XMLRPC.PHP Pingback Ping

For more solutions to be found in the Forum: http://wordpress.org/support/topic/xmlrpcphp-attack-on-wordpress-38

as well as this site: http://blog.spiderlabs.com/2014/03/wordpress-xml-rpc-pingback-vulnerability-analysis.html

Another useful site: http://perishablepress.com/wordpress-xmlrpc-pingback vulnerability/comment-page-1/

The best, in order to optimize the operation always update your applications, frame system, speed up your website, This may be the solutions: cache, gzip, CSS compression, pictures, video(k) to optimize web etc.….Dramatically accelerate the website and ease the resource when.

Their own WP pages use these plugins, In addition to the appropriate setting, without any problem:
Akismet
Country Code Failed Login
Google CAPTCHA
Wordfence Security

Please note that the application is running on your space, You must provide for the safe operation of, If this does not happen, then without, immediately suspend page, to protect our, our users.

If you have additional questions you may have, Please call us and we'll help you.

Tagged

If you don't want a search engine indexelné is one of the space in the directory, page

If you want to exclude only search a page, the easiest way to create the meta head section added the following code:

The hassle to get into the search engine index page.

If you want to exclude a directory search is the easiest way to do it using URrobot.txt:
Just create a file called URrobot.txt and enter the model into the directory, that you want to exclude the robots front, example:

User-agent: *
Disallow: /Administrator/
Disallow: /cache/
Disallow: /components/
Disallow: /images/
Disallow: /includes/
Disallow: /installation/

And then upload the public_html folder. In the example above to read directories and their content are not included in the search index.

For further advice, contact the creator of this website.

How it looks from DDOS attack?

The following is an example only:, Fortunately, in practice very rarely!

This video illustrates a normal server service:

This videoand you can see when website is suffering from DDOS attack:

In this case, the server is not able to serve, Therefore, the website does not load!

Tagged

Constantly interrupted the email contact, unexciting none

Why do I sometimes and then excluded from the unexciting is not available?! May not be the IP address fails to do?

Dear Valued Customer!

Have been excluded from the indicated ip, faulty POP3/SMTP login attempts due to. You and not us to server side fix, set, It's like a bad you try to open a door key and asks the Lakatos, to convert You to the door lock, who can open!

You will be disqualified if the login 15 times messed up/ip, so it is completely reasonable to block, If you do not disable and the machine e.g.. virus suffering from an infection, You can smoothly by breaking the traditional mailbox password brute force method!

Log in problem: Failed POP3 login from xxxxxxxxxx

So I propose, that there, on the ip address solve the problem, to set the email clients, password/user help. If you are not sure, the correct password, You can test webmailen or change the cPanel email mailbox menu.

Tagged

550 Sender verify failed

The sender verify function is an important setting for server side, because if this would not be active, then anyone can send false, not working email address letter to you, so many hundreds of daily spam Letter to deliver! Therefore, globally we will not switch off, It's in your interest to!

Why can't I get my mail xy.com domain to be able to, email address? This error is returned to the sender: 550 Sender verify failed

This happens, When the sender's email address, domain name, DNS not appropriate, Server hostname, etc.. is not configured correctly, It is not possible to check back, because the host server is not able to visszaellenőrizni the sender's e-mail address, to be real, is there a.

Solution: The sending party, ask your provider, to correct your dns, MX errors! So the error is not on the receiver side, This can be checked by using the below mentioned two.

We recommend a tool to verify the MX record: http://mxtoolbox.com/diagnostic.aspx
Another tool is the DNS settings: http://www.intodns.com/

Unfortunately it happens, to send an email newsletter from, which is not a fully traceable, for example, does not work. noreply@akarmi.hu in this case, we recommend, to specify the sender's IP We caught the address and.

Tagged

Telnet licensing, use under windows

What good is the Telnet?

If a particular service, We reach the port, not the server example. correspondence of the 465 you want to find the cause of the port and, You can use the telnet program. So we can conclude, that the computer can connect to the server on port problem, If not then it is probably your firewall or router will not let me out of the server, in this case, you can use another port or the firewall to add this port as an exception.

How to use the telnet program?

The first step is to enable the telnet client for windows on your computer:

1, Start menu>Control Panel>Programs menu, and then click programs and features, menu, locate the windows features on- on and off menu.

telnet1

2, click it, before long to bring up a window that lists windows services, Locate the telnet client service, and select and then press ok to activate the service.

telnet2

3, If you have not already done so, You can open the URcmd.exe program: Start menu>run>You must type, to URcmd.exe and enter.

4, To bring up a window and type, that: Telnet and then use the following command: Open IP address port such as: Open 195.56.100.88 465

telnet3

If the following message appears, the connection successful, so your host can communicate with the specified port on the specified server:

telnet4

If you receive a failed message, You can try a different port such as. 587 or send an e-mail in this matter.

 

Tagged

301 redirect to domain parking

If more than one domain name, but a content and that the search engine does not punish because of duplication of content worth of domain names 301 redirect to redirect the use of the domain that you want to use. Thus, any domain name you type into your browser, and then always “átdobja” the correct WWW domain name with a prefix.

Use:

1, Open a new document in any program, best of the URnotepad.exe (all windows are)

2, copy the codes, the domain name is, of course, replace the below mentioned example.:

Példa 2 domain esetében:

# mod_rewrite in use

RewriteEngine On

######## Start Domain redirection
## This code redirects NON-WWW URLs to WWW URLs
## This helps prevent duplicate content
##RewriteCond %{HTTP_HOST} ^tartalommalrendlekződomain.hu
##RewriteRule (.*) http://www.tartalommalrendlekződomain.hu/$1 [R=301,L]
RewriteCond %{HTTP_HOST} ^parkoltdomainnincstartalma.hu$ [Or]
RewriteCond %{HTTP_HOST} ^www.parkoltdomainnincstartalma.hu$
RewriteRule (.*)$ http://www.tartalommalrendlekződomain.hu/$1 [R=301,L]

######## END Redirect domain redirection

Példa 1 domain esetében 301 redirect a www verzióra:

# mod_rewrite in use

RewriteEngine On

######## Start Domain redirection
## This code redirects NON-WWW URLs to WWW URLs
## This helps prevent duplicate content
RewriteCond %{HTTP_HOST} ^azöndomainneve.hu
RewriteRule (.*) http://www.azöndomainneve.hu/$1 [R=301,L]
######## END Redirect domain redirection

3, mentse le a fájlt mint htaccess.txt és másolja fel a gyökér (public_html) Directory and then rename the file to .htaccess re! Then you must now run the redirection.

The “tartalommalrendlekződomain” the domain which I'll use as the main domain ‘ parkoltdomainnincstartalma’ is that hozzáakar give as parked domain.

If you have problems setting, Please contact the creator of this website, because this task they have to perform.

Tagged

Using tracert

Unexciting, email address does not work! Was blocked for IP address? It is possible to!

Review:
1. check out the IP addressfind information about: Navigate to the website http://IP.xhu.hu make a note of your ip address!

2. Windows machine: Open the URcmd.exe program in start menu>>run>>type, to URcmd.exe, and then a black screen with blinking cursor.

3, Here is the following type: tracert domain name e.g.. tarcert xhu.hu when you reach the destination the request is launched, you do not have your ip address blocked. The problem lies elsewhere.

4, If you cannot reach somewhere you get stuck you can send it to us together with the ip address and it is dissolved or. We look at the block the reason for, 99.9% blocked is because it incorrectly, incorrect user/password trying to enter email-, FTP-or even the cPanel-check-in.

cmdexe

Tagged

Not getting email no longer access the server

Dear Valued Customer!

This happens, If incorrect user/password is trying to connect to the server, the reason for the ban is possible, Enter the incorrect data entry:
-FTP
-email
-cPanel

interface.

Solution: If 3-4 time fails to enter, do not try to read more, because then you will not, Please contact us and we will give you a new passwordthe cpanelhez, FTP. If email password problems, You can go to cpanelbe and change your password, then of course the MTAs must be modified.

If they had banned himself from the server, send email or wait for 20percet and then the Hungarian IP address is removed from the tiltásból.

Tagged

Domain registration, through registration,Add,parking technical condition!

1. Must be running without error domain.en technical control.

2. You must set the HOST server for a postmaster @ email address

For example.; cPanel in the case of: öndomainneve.hu, domain hostingthe process to add the öndomainneve.com domains with you:

the cpanel system, for the first time Add the given domain, and then the e-mail póstafiókoknál to create (a) the postmaster@öndomainneve.com ot!

The technical review is perfect as it is necessary to run!

 

Tagged

Scan for viruses on your space. CPanel

1. Go to CPanelbe (www.ondomainneve.hu/cpanel)

2. Navigate to the applications installed on the Virus Scanner icon, and then click on it.

3. The next option, you can choose, that you want to control what parts of your space!

4. After the scan selection.

If the scanner shows no infected files, then space is not infected.

5. The scan after running the program will show you the infected files.

6. In the next window, You can choose what you want to do in that infected file!

Quarantines, delete, you replace it.

IT is IMPORTANT to! If you move to quarantine, delete a file that can have serious consequences!

(PL; if you delete a website .index.html side, because infected then side are unavailable!)

In any case the infected file, You must remove the space! You may want to backup the entire page and upload again!

Manual Backup creation CPanelben.

Website for viruses – Site Inspector!

Tagged