ASP Component
Sunday, January 31st, 2010ASPJPEG- Registration key: 01418-70782-10915
references
http://support.persits.com/show.asp?code=PS080519170
ASPJPEG- Registration key: 01418-70782-10915
references
http://support.persits.com/show.asp?code=PS080519170
Then there are two ways to delete domain if the domain is not removing from plesk.
———————
1.you have to tried to delete specific domain from my sql
under PSA database .
2.Run the following commands in command prompt:
cd %plesk_bin%
mchk –all –fix=all
———————
And then try to delete the domain from plesk .
That’s all
I have tried and success 100%
References
http://www.host.co.in/forums/f23/cannot-delete-domain-492/
cd sysconfig
cd network_scripts
vi eth0
then change
to fix above error
refer to the Url below
http://www.phoca.cz/forum/viewtopic.php?f=31&t=3101
http://www.phoca.cz/documents/2-phoca-gallery-component/203-installation-problem-solving
Refer to the following URL
http://download1.parallels.com/SiteBuilder/Windows/docs/4.5/en_US/sitebuilder-4.5-win-installation-guide/index.htm?fileName=installing_sitebuilder.htm
Thank you.
Config File: C:\Users\me\Documents\wwwroot\httpdocs\web.config
To fix this problem, we need to grant the read permission to IIS_IUSRS on ‘httdocs’ folder.
References
http://kenno.wordpress.com/2008/10/23/iis7-cannot-read-configuration-file-due-to-insufficient-permissions/
Thank you.
refer to below URL
http://www.zen-cart.com/index.php?main_page=product_contrib_info&products_id=860
is not available in helm server, only in plesk
Thank you
Installation
step 1 ) nano /etc/pure-ftpd.conf
Edit /etc/pure-ftpd.conf and set
CallUploadScript yes
step 2 ) nano /etc/init.d/pure-ftpd
Edit /etc/init.d/pure-ftpd
Look for $DAEMONIZE $fullpath /etc/pure-ftpd.conf -O clf:/var/log/xferlog $OPTIONS –daemonize
Under this add
$DAEMONIZE /usr/sbin/pure-uploadscript -B -r /root/ftp_clamscan.php
Next look for kill $(cat /var/run/pure-ftpd.pid)
Under this add
kill $(cat /var/run/pure-ftpd/pure-uploadscript.pid)
step 3 ) download file ( anti_gumblar.tar.gz )
wget http://www.oxio.net/anti_gumblar/anti_gumblar.tar.gz
step 4 ) extract tar file to /root directory
tar -zxvf anti_gumblar.tar.gz
step 5 ) give execution right to ftp_clamscan.php
chmod +x ftp_clamscan.php
or
chmod +x /root/ftp_clamscan.php
step 6 ) open ftp_clamscan_config.php file and edit needed lines.
nano /root/ftp_clamscan_config.php
step 7 ) create directory for quarantine files
mkdir /quarantine
mkdir /quarantine/clamav
References
http://anti-gumblar.oxio.net/installation/
The script will help to prevent Dark Mailer being uploaded into the server.
Thank you.
for customer side, he need to SSh to his account and use the following command
vi access-logs
for administrator side use the follwoing command
vi /etc/httpd/conf/httpd.conf
Thank you.