Change the default SSH port on a Linux Server

Secure Shell (SSH) is a network protocol that allows users to access the server remotely. It also encrypts the communication between a client and a private server, making it more secure. However, using the standard Transmission Control Protocol (TCP) port 22 for SSH might be risky since it is vulnerable to many cyber threats, […]

Change the default RDP port on a Windows server

Here is a step-by-step guide on how you can change the port number using the Windows Registry: Log in to the Windows server with an account that has administrative privileges. Open the Registry Editor by typing “regedit” in the Start menu search box and selecting “Registry Editor” from the results. […]

Creating a protection plan in Acronis

A protection plan can be applied to multiple machines at the time of its creation, or later. When you create a plan, the system checks the operating system and the device type (for example, workstation, virtual machine, etc.) and shows only those plan modules that are applicable to your devices. […]

Acronis Backup Setup

Once you place an order for the Acronis Backup solution, you will receive an email on your registered email ID from Acronis. Kindly follow the instructions in the email for setting up the password of the Acronis console. Once you have set the password kindly log in to the Acronis […]

Less Secure app access-Google

Login to your email account Navigate to your Email account icon Click on “Manage your Google Account” 4. Go to the security option or you can visit the below link and directly access the less secure section: 5. Under security, Navigate to “Less secure app access” and turn “ON” […]

Steps to Install SSL on Cloud(plesk) server

Login to your Plesk Panel. Click on the domain on which you need to install the SSL certificate. Click on SSL/TLS certificates. 4. Click on manage 5. Click on +Add SSL/TLS Certificate. 6. Enter the details. You can refer to the below screenshot. 7. Click on request. 8. The CSR […]

Outlook settings for office365

As you are aware that Microsoft has disabled basic authentication for all users. This has resulted in a dis-connection for email accounts, which were configured as pop3/IMAP in the outlook mail-client application. Outlook for Windows does not support modern authentication with Exchange Online using POP or IMAP. The latest mail-clients […]

cPanel Track Delivery

This section allows you to track the emails sent and received by the users. You can view logs of all emails sent and received in the last 30 days. To track email delivery, you may follow below steps: Login to your cPanel account. Navigate to the Email section and select […]

How to set up recovery email ID in Gsuite

A. Recovery Set up via Admin Console. Sign in to your Google Admin console. From the Admin console Home page, go to Security. Go to Overview, scroll down to Account Recovery. To apply the setting to everyone, leave the top organizational unit selected. Click User account recovery. Click Allow users […]