Tag: Windows
Pre-Flight Check
- This article is specifically intended for generating a Certificate Signing Request and installing a standard SSL certificate on a Windows server running Plesk.
- We’ll walk through ordering the SSL via Liquid Web’s Manage interface, but you can use the CSR you generate in Plesk to purchase an SSL from the vendor of your choice.
- If your Windows server is running Plesk 12.5 or higher, you can check out our tutorial on Using Let’s Encrypt SSL Certificates with Plesk 12.5.
How to Set Up and Use Cloud Block Storage
What is Cloud Block Storage?
Cloud Block Storage provides additional hard drive space for your Private Cloud Hosted Server with just a few clicks. The space is not pre-formatted but rather, it is a raw block device. The simplicity of providing a raw block device on the cloud means that you can mount and format the space on your server however you would like, with whatever filesystem is appropriate for your needs. This does entail a small amount of work getting the space into a usable state which we will address in this article.
If you ever need to upgrade the hardware on your Windows server with the Plesk interface, Liquid Web’s Windows team is happy to help you through the migration. While it is not the simplest process you will ever be a part of, keeping in communication with our Heroic Support will make things go smoothly.
A Virtual Private Network (VPN) can be extremely useful when administering your servers, which is why Liquid Web offers a Cisco VPN with our firewalls. Logging in to the device can vary among operating systems. Here are some instructions for logging into a VPN from Windows systems:
Logging into Plesk
One of the common questions new users have when they get a fully managed dedicated server is “How do I log in to my control panel?” This article will show you how to login to your Plesk control panel. cPanel’s users should check out the article on logging into cPanel.
How To Flush Your Local DNS Cache
If your computer has trouble reaching a certain website or server this may be due to a corrupt local DNS cache. This guide will show you how to clear your local DNS cache (“flush” it) for several operating systems.
Full email message headers provide invaluable information when trying to track down a problem. Just a few of the items included in the headers are:
The Whois command is used to collect information about a domain including who owns the domain, basic contact information for the domain owner, and the nameservers that the domain is using.
When you attempt to add or remove users from file and folder permissions within Windows Explorer, a login box appears and does not accept your administrator username and password. This may prevent you from modifying the permissions.
Configuring an Alternate Port for Outgoing Mail Traffic
Many large ISPs restrict the access to port 25 on their networks to attempt to stem the tide of spam sent out from compromised computers. If your ISP is restricting access to port 25 you will not be able to send e-mail through your server, but by enabling SMTP (Simple Mail Transfer Protocol) on a different port, like 26, it may be possible to circumvent the restriction.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.