RSS Feed
Knowledgebase
 

Attention developers! We fully support the usage of Git [1] on all Shared, Reseller, VPS, and Dedicated servers. For Shared and Reseller clients (with the exception of resold clients under your Reseller package), you will need to fill out the SSH Access Request [2] form before we can allow Git over SSH (we do not yet support git:// on Shared/Reseller servers). Once you do this, we will reply with the port information for access to SSH, and the Git configuration you'll need to setup a re...
To obtain a ClientExec license please fill out the following form: https://www.pacifichost.com/requests/billing-system.shtml [1] Once the license is provisioned, you can download and install ClientExec on the domain you requested be licensed. NOTE: We do not provide installation or general support for ClientExec. Like you, we are only users of the software ourselves. To obtain support regarding ClientExec, you can either purchase a support plan with the developers directly (http://www.clientex...
\N\N500 ERRORS & 403 ERRORS\N\N This section will cover 500 errors and some of their causes. General Causes These are some of the reasons for getting these errors. 1. You have not uploaded the files in the /cgi-bin/ in ASCII mode. 2. You have not set the correct permissions on the the files in the /cgi-bin/ (all should be CHMOD to 755) Plesk Control Panel - Suexec Related Errors If you are installing on a PLESK server and in a SUB-DIRECTORY, you may get 500 errors or 403 errors. bello...
Yes, emails on the server count towards your storage limit. This is one reason we recommend not storing e-mail on the server. Once you download and read your mail, you should ensure that your e-mail client deletes the mail from the server. In the configuration settings for your e-mail client, make sure that you do not have the option selected to "Leave mail on server" if you do not wish to store e-mail on the server.
Click here to view a video tutorial on how to create an addon domain. [1] STEP 1: To access the Addon Domains tool, click on the corresponding icon located on the main screen of your cPanel interface. STEP 2: Enter the name of the addon domain in the blank field next to New Domain Name. STEP 3: Enter the name of the directory which contains the subdomain that the addon domain will point to in the blank field next to Subdomain/FTP Username: (This directory will be the location for the...
We offer TLS/SSL support on port 21, passive but not required. FileZilla offers great support for this. Hit Ctrl+S in FileZilla, click "New Site" and select FTPES - FTP over explicit TLS/SSL Just use a "Normal" login, with your regular cPanel username and password.
Yes, you can host sites for your friends on your Web Hosting account, as long as you are not charging them money for hosting. However, if any of your friends need direct access to the databases or cPanel functions, they will need your cPanel login information. If you chose to get a Reseller account, then each friend will have their own cPanel. This is really a much better way to host multiple sites that do not have the same owner. Remember, shared Web Hosting accounts may not resell their host...
To point to your newly setup server or account you will need to adjust your host file. (This is required to inspect your website before changing the DNS of your domain to ensure the migration is complete) HOST FILE: The hosts file contains lines of text consisting of an IP address in the first text field followed by one or more host names. Each field is separated by white space - tabs are often preferred for historical reasons, but spaces are also used. Comment lines may be included; th...
Our servers are setup to protect themselves if they perceive a threat by blocking the IP. There are many things which can trigger a block on your server including: * Entering the wrong username or password multiple times within 5 minutes when logging into the control panel, email, or a password protected area on the website. * Opening too many connections to the server at one time. For FTP, we recommend setting you FTP program to open no more than 2-3 connections at a time. For email, ...
Having your web site's security breached is never a fun thing to wake up and find in the morning. It can be a pain to deal with, so with that in mind, here are some helpful tips and suggestions on the steps you should take to get your web site back to normal. If you can provide a URL that is hacked or a snippet of the hacker code, we can do a scan for you to get a list of files that are hacked. This may help if you choose to manually edit the hacked files to remove the code or want to know how i...
Most popular articles 
 
Newest articles