Hello Folks, Today i am going to teach you how to install a ssl certificate via filezilla server.Before we start the tutorial i wan to share my previous thread link about the installation of a SSL Certificate.
Here is link of my previous thread about the Installation : How to install a SSL Certificate via Cpanel
Before we start the tutorial i want to mention some things we require in the installation of SSL/TLS via FTP.
We require a Certificate and a Private Key.We also require a FTP software.I mostly use FileZilla.
You need to download your SSL Certificate and Create a CSR for ftp client.So lets start.We need a software to create Certificate files for the installation.I use OpenSSL.So lets Start.
Creating a CSR for FileZilla
1st: Use terminal to login to your filezilla server.
2nd: Use the following command " openssl req –new –newkey rsa:2048 –nodes –keyout server.key –out server.csr " Make sure to replace server with your server,
3rd: When you use this command it will start creating two files a CSR file and a private key file.
4th: After this it will ask you to enter the domain name.You have to enter the full domain name.
5th: After completing the process.Open the created files with a Text editor and paste the SSL Details
Certificate = your_domain.pem
Code:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----Code:
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----1st: In the filezilla server click the " FileZilla Server Option " Select the Edit and Choose Settings.
2nd: In the " FileZilla Server Option " You have a menu left side of the window.Click the "SSL/TLS Settings"
3rd: In this menu click the Option " Enable FTP over SSL/TLS support.
4th: Browse the files we have created.
Private Key file : your_domain.key ( the file we created )
Certificate File : your_domain.pem ( the second file we created )
After Browsing the files click the button " generate the new certificate "
All is done. Restart your server and the SSL is installed successfully.
Thanks
Note: Sorry for bad English and if i made some mistake please reply i shall try to answer.I was in hurry but lost my almost done tutorial twice.
I'm curious. How many of us actually sit down and read the Terms and Conditions of Hosting (TOS) for our VPSs? Note: they have been posted with each VPS in the VPS Plan section of post4vps home page. How many of us have read the content of the VPS Plans that have been posted up in the VPS Plan Section and understand what they mean?
The TOS of each VPS is the most important document to read as it contains all of the rules of the VPS host. The VPS host assumes when you take ownership of the VPS that not only have you read all of the terms and conditions of hosting, but that you also understand what they mean. If you don't understand the terms and conditions of hosting the host fully expects that you should ask the staff of post4vps who should be able to explain those to you or find out for you. A good percentage of those rules are important not only for the safety and security of your VPS, but every one else's VPS on the same service.
As far as post4vps VPSs go, the hosts in overall assume you're a knowledgeable user and you're going to use your VPS the linux way. You'll be working from a command line, and you will be doing standard VPS common sense things with the VPS. However, if you have plans to do anything more than that, especially then you need to read through the TOS again to check how that affects what you want to do, and if it isn't covered, or you don't understand what it says, you need to ask the staff of Post4VPS who will know or find out for you BEFORE you apply for the VPS. Hence why the "what you are going to do with the VPS" question in the application of the VPS is so important and needs to be fully replied to.
So wonder what can be done to make sure owners have read and understand at least the important parts of the Terms and Conditions of Hosting of their VPS?
Suggestion 1: Highlight standard important rules of the TOS in each Plan section for each VPS? List the highlighted rules under the TOS of each plan.
1. Games (Games allowed or not allowed - check rules (linked))
2. Windows VPS (allowed or not allowed - check rules - manual verification needed (linked))
3. Mass mailing (allowed or not allowed - check rules (linked)
3. Etc
Suggestion 2: Add "IMPORTANT: Please read the TOS before you apply for the VPS." next to the TOS link of each VPS Plan. Maybe the latter could be repeated in the rules for application too. I.e. the importance of always reading and understanding the TOS BEFORE you apply for a VPS.
The TOS of each VPS is the most important document to read as it contains all of the rules of the VPS host. The VPS host assumes when you take ownership of the VPS that not only have you read all of the terms and conditions of hosting, but that you also understand what they mean. If you don't understand the terms and conditions of hosting the host fully expects that you should ask the staff of post4vps who should be able to explain those to you or find out for you. A good percentage of those rules are important not only for the safety and security of your VPS, but every one else's VPS on the same service.
As far as post4vps VPSs go, the hosts in overall assume you're a knowledgeable user and you're going to use your VPS the linux way. You'll be working from a command line, and you will be doing standard VPS common sense things with the VPS. However, if you have plans to do anything more than that, especially then you need to read through the TOS again to check how that affects what you want to do, and if it isn't covered, or you don't understand what it says, you need to ask the staff of Post4VPS who will know or find out for you BEFORE you apply for the VPS. Hence why the "what you are going to do with the VPS" question in the application of the VPS is so important and needs to be fully replied to.
So wonder what can be done to make sure owners have read and understand at least the important parts of the Terms and Conditions of Hosting of their VPS?
Suggestion 1: Highlight standard important rules of the TOS in each Plan section for each VPS? List the highlighted rules under the TOS of each plan.
1. Games (Games allowed or not allowed - check rules (linked))
2. Windows VPS (allowed or not allowed - check rules - manual verification needed (linked))
3. Mass mailing (allowed or not allowed - check rules (linked)
3. Etc
Suggestion 2: Add "IMPORTANT: Please read the TOS before you apply for the VPS." next to the TOS link of each VPS Plan. Maybe the latter could be repeated in the rules for application too. I.e. the importance of always reading and understanding the TOS BEFORE you apply for a VPS.
Disclaimer: This tutorial has been written by me. It was firstly published on FreeVPS Club at this link. I'm reposting this solely to share knowledge. I'm not looking forward to request a VPS here.
How to turn off the PWR and ACT LEDs on the Raspberry Pi SBC
PWR = Power & ACT = Activity
PWR = Power & ACT = Activity
Hello and welcome to the world of SBCs*
This guide is meant to make your life easier and more comfortable while working with the Raspberry Pi SBC. It is a very brief and very easy to follow tutorial.
Since the first generation of the Raspberry Pi the stunning SBC has had a few LEDs that are working as indicators for a few important things (<- this is a link) such as power (power is connected and proper delivery is in place), activity (SD card write/read, CPU load, etc) and network activity. The network activity LEDs (link and activity) used to be a dedicated LEDs on the first generations of the board. Nowadays however the network activity LEDs are in the normal Ethernet network jack (<- this is a link) like on normal computers.
I have a few generations of the Raspberry Pi (B/B+/3 B/3 B+) and I generally use them for projects and other stuff in my room because I have no other room or dedicated place to host them. Projects that involve 24x7 operation mean that I'm always exposed to the light of the LEDs. The PWR LED is very bright and when activity is going on you constantly see a green light flashing. This is really annoying especially during the night. So I've been looking for a way to turn off the PWR and ACT LEDs somehow to reduce the amount of light caused by the Raspberry Pi so I can fall asleep normally.
I found a way to reduce the light caused by these two LEDs to zero/null. The LEDs are actually registered within the OS as devices and therefore can be controlled by editing the corresponding configuration files. Both LEDs have identifiers which are LED0 (ACT) and LED1 (PWR) and these are located in /sys/class/leds. Every LED has different configurations files and one of them is brightness located in /sys/class/leds/led<0/1>/brightness. It can contain a value between 0 and 255. The value 0 means no brightness (turned off) and 1 - 255 is simply for turned on (I didn't notice any brightness change when setting it to 1 and 255).
So to turn of these LEDs all you have to do is run the two commands below as root (sudo will NOT WORK!):
There is a little issue though and it is: once you reboot the values of these LEDs will be reset back to what they were before because the LEDs are reinitialized at startup or reboot. There is an easy fix for that though.
Open /etc/rc.local with a text editor like nano as root:
Add these lines at the end of the file but before exit 0:
Save the file with CTRL + V and ENTER. Close the text editor with CTRL + X.
Now whenever your start the Raspberry Pi or reboot it the LEDs will be turned off as soon as the OS starts booting.
That's it. This way it's much better. The network activity LEDs aren't so bright and therefore not even so annoying (imho).
* Single Board Computers
This guide is meant to make your life easier and more comfortable while working with the Raspberry Pi SBC. It is a very brief and very easy to follow tutorial.
Since the first generation of the Raspberry Pi the stunning SBC has had a few LEDs that are working as indicators for a few important things (<- this is a link) such as power (power is connected and proper delivery is in place), activity (SD card write/read, CPU load, etc) and network activity. The network activity LEDs (link and activity) used to be a dedicated LEDs on the first generations of the board. Nowadays however the network activity LEDs are in the normal Ethernet network jack (<- this is a link) like on normal computers.
I have a few generations of the Raspberry Pi (B/B+/3 B/3 B+) and I generally use them for projects and other stuff in my room because I have no other room or dedicated place to host them. Projects that involve 24x7 operation mean that I'm always exposed to the light of the LEDs. The PWR LED is very bright and when activity is going on you constantly see a green light flashing. This is really annoying especially during the night. So I've been looking for a way to turn off the PWR and ACT LEDs somehow to reduce the amount of light caused by the Raspberry Pi so I can fall asleep normally.
I found a way to reduce the light caused by these two LEDs to zero/null. The LEDs are actually registered within the OS as devices and therefore can be controlled by editing the corresponding configuration files. Both LEDs have identifiers which are LED0 (ACT) and LED1 (PWR) and these are located in /sys/class/leds. Every LED has different configurations files and one of them is brightness located in /sys/class/leds/led<0/1>/brightness. It can contain a value between 0 and 255. The value 0 means no brightness (turned off) and 1 - 255 is simply for turned on (I didn't notice any brightness change when setting it to 1 and 255).
So to turn of these LEDs all you have to do is run the two commands below as root (sudo will NOT WORK!):
Code:
echo 0 > /sys/class/leds/led0/brightness
echo 0 > /sys/class/leds/led1/brightnessThere is a little issue though and it is: once you reboot the values of these LEDs will be reset back to what they were before because the LEDs are reinitialized at startup or reboot. There is an easy fix for that though.
Open /etc/rc.local with a text editor like nano as root:
Code:
nano /etc/rc.localAdd these lines at the end of the file but before exit 0:
Code:
echo 0 > /sys/class/leds/led0/brightness
echo 0 > /sys/class/leds/led1/brightnessSave the file with CTRL + V and ENTER. Close the text editor with CTRL + X.
Now whenever your start the Raspberry Pi or reboot it the LEDs will be turned off as soon as the OS starts booting.
That's it. This way it's much better. The network activity LEDs aren't so bright and therefore not even so annoying (imho).
* Single Board Computers
Disclaimer: This tutorial has been written by me. It was firstly published on FreeVPS Directory and Discussion at this link. I'm solely reposting my work on different places to keep it alive after FreeVPS will shutdown.
Table
A brief, detailed and easy to follow guide made out of 4 chapters.
1. Prologue
2. Installing the latest Certbot-auto client
3. Requesting your free wildcard certificate
4. Finale
Getting Let's Encrypt Wildcard Certificates
A guide to obtaining free wildcard *.yourdomain.ext certificates from Let's Encrypt on any Linux OS
A guide to obtaining free wildcard *.yourdomain.ext certificates from Let's Encrypt on any Linux OS
Table
- Prologue
- Installing the latest Certbot-auto client
- Requesting your free wildcard certificate
- Finale
A brief, detailed and easy to follow guide made out of 4 chapters.
1. Prologue
Hello!
A dream has come true. Let's Encrypt is the first real CA* (certificate authority) to provide absolutely free of charge wildcard domain validated certificates for your domains. This March with a delay of two months the Let's Encrypt team has finally published their new ACMEv2 API with a lot of improvements and enabled requests for wildcard certificates. Now, this is all still fairly new. Issues are to be expected.
What is this guide about? Well, simple: this is about getting yourself a wildcard certificate for your domain on any Linux OS. Since this is all still new most OSs don't even meet the minimum requirements to make use of the new features that ACMEv2 offers. This means you won't get a wildcard certificate if you follow the official documentation on certbot.eff.org or use the Certbot client from your OSs repos**. What you need is the latest client (at least the version number 0.22 or above) to make use of ACMEv2 and request wildcard certificates. So this is what this guide will help you with.
If you are interested in grabbing one of those neat wildcard certificates for your domains just continue reading. I'll try to make the guide as easy as possible and brief. Therefore I will include links for certain steps to other sites that explain certain parts better. If you have any questions feel free to post them down below.
Make sure you have full DNS access to your domains as you will be required to create TXT DNS records for domain ownership validation for the certificates!
* CloudFlare basically provides free wildcard certificates but a) they get them from Comodo, b) CloudFlare is a MITM (this is a security NO GO) so you shouldn't use it when you need TLS encryption and c) CloudFlare certificates are shared among many other domains (including bad domains). So I don't count them as a real CA (they simply aren't even though their sponsor Comodo is a CA) that would provide free wildcard certificates.
** According to the information at the Certbot documentation site at EFF CentOS/RHEL 7 is so far the only OS that has got the new Certbot client already in its repos. Debian for example only has 0.22.0 in their unstable repo for the upcoming Debian 10! Ubuntu doesn't seem to have it at all even in the latest version.
A dream has come true. Let's Encrypt is the first real CA* (certificate authority) to provide absolutely free of charge wildcard domain validated certificates for your domains. This March with a delay of two months the Let's Encrypt team has finally published their new ACMEv2 API with a lot of improvements and enabled requests for wildcard certificates. Now, this is all still fairly new. Issues are to be expected.
What is this guide about? Well, simple: this is about getting yourself a wildcard certificate for your domain on any Linux OS. Since this is all still new most OSs don't even meet the minimum requirements to make use of the new features that ACMEv2 offers. This means you won't get a wildcard certificate if you follow the official documentation on certbot.eff.org or use the Certbot client from your OSs repos**. What you need is the latest client (at least the version number 0.22 or above) to make use of ACMEv2 and request wildcard certificates. So this is what this guide will help you with.
If you are interested in grabbing one of those neat wildcard certificates for your domains just continue reading. I'll try to make the guide as easy as possible and brief. Therefore I will include links for certain steps to other sites that explain certain parts better. If you have any questions feel free to post them down below.
Make sure you have full DNS access to your domains as you will be required to create TXT DNS records for domain ownership validation for the certificates!
* CloudFlare basically provides free wildcard certificates but a) they get them from Comodo, b) CloudFlare is a MITM (this is a security NO GO) so you shouldn't use it when you need TLS encryption and c) CloudFlare certificates are shared among many other domains (including bad domains). So I don't count them as a real CA (they simply aren't even though their sponsor Comodo is a CA) that would provide free wildcard certificates.
** According to the information at the Certbot documentation site at EFF CentOS/RHEL 7 is so far the only OS that has got the new Certbot client already in its repos. Debian for example only has 0.22.0 in their unstable repo for the upcoming Debian 10! Ubuntu doesn't seem to have it at all even in the latest version.
2. Installing the latest Certbot-auto client
The Let's Encrypt team offers a script to install the latest available stable version of Cerbot-auto on pretty much any Linux OS. This script is what we're going to use to grab the latest version of the Certbot-auto client and install it on your server.
Certbot-auto is one of many Let's Encrypt clients. It has a huge advantage over some clients. As mentioned before it will install the latest version and all necessary other packages automatically. It also comes with all features but that said, some people might not really like the full feature client due to its size and the huge feature set of which the most will only use a small part.
This step will take some time depending on the performance of your server and the speed of your servers network. The latest version will be installed and all necessary additional packages. At the end of the installation, the script might throw an error regarding not being able to install a Apache 2 related addon. This usually happens when you don't use the Apache 2 web server. You can simply ignore this error.
If you get any other error feel free to post it here. I or the community might be able to help. You are also very welcome to join the Let's Encrypt community and ask there. They have the developer team onboard and so you will get direct support from the creators.
Don't delete the cerbot-auto file! This is what you will need or better said this is the file you will have to run when you want to request certificates, modify certificates, renew them and etc. This is the main executable of certbot-auto because the certbot-auto client is a wrapped and self-updating script.
* Here is how you can update your OS to the latest state on the most common Linux OSs.
The Ubuntu/Debian command can be used on all Linux OSs that are based on either Debian or Ubuntu. The same applies to the RHEL/CentOS/Fedora command.
For other Linux OSs please use Google to find instructions. The above listed OSs are the most common and the one I have used/had experience from before. I cannot cover everything.
** Here is how you can install the ca certificates bundle on the most common Linux OSs.
The Ubuntu/Debian command can be used on all Linux OSs that are based on either Debian or Ubuntu. The same applies to the RHEL/CentOS/Fedora command.
For other Linux OSs please use Google to find instructions. The above listed OSs are the most common and the one I have used/had experience from before. I cannot cover everything.
Certbot-auto is one of many Let's Encrypt clients. It has a huge advantage over some clients. As mentioned before it will install the latest version and all necessary other packages automatically. It also comes with all features but that said, some people might not really like the full feature client due to its size and the huge feature set of which the most will only use a small part.
- Login into your server as root as you will be needing administrative permissions.
- Update your OS to the latest state to prevent issues with dependencies and software versions.*
- Download the certbot-auto script to your server with the command below.
(If you have trouble and get an error regarding the TLS certificate make sure you have installed the ca certificate bundle package.)**Code:wget https://dl.eff.org/certbot-auto
- Set execution permission for the script so it can be executed with the command below.
Code:chmod a+x certbot-auto
- Run the certbot-auto script to install the latest version with the command below.
Code:./certbot-auto
This step will take some time depending on the performance of your server and the speed of your servers network. The latest version will be installed and all necessary additional packages. At the end of the installation, the script might throw an error regarding not being able to install a Apache 2 related addon. This usually happens when you don't use the Apache 2 web server. You can simply ignore this error.
If you get any other error feel free to post it here. I or the community might be able to help. You are also very welcome to join the Let's Encrypt community and ask there. They have the developer team onboard and so you will get direct support from the creators.
Don't delete the cerbot-auto file! This is what you will need or better said this is the file you will have to run when you want to request certificates, modify certificates, renew them and etc. This is the main executable of certbot-auto because the certbot-auto client is a wrapped and self-updating script.
* Here is how you can update your OS to the latest state on the most common Linux OSs.
Quote:Debian/Ubuntu:
apt-get update && apt-get upgrade -y
RHEL/CentOS/Fedora:
yum update -y
Arch Linux:
pacman -Syu
The Ubuntu/Debian command can be used on all Linux OSs that are based on either Debian or Ubuntu. The same applies to the RHEL/CentOS/Fedora command.
For other Linux OSs please use Google to find instructions. The above listed OSs are the most common and the one I have used/had experience from before. I cannot cover everything.
** Here is how you can install the ca certificates bundle on the most common Linux OSs.
Quote:Ubuntu/Debian:
apt-get install ca-certificates
RHEL/CentOS/Fedora:
yum install ca-certificates
Arch Linux:
pacman -S ca-certificates ca-certificates-mozilla ca-certificates-utils
The Ubuntu/Debian command can be used on all Linux OSs that are based on either Debian or Ubuntu. The same applies to the RHEL/CentOS/Fedora command.
For other Linux OSs please use Google to find instructions. The above listed OSs are the most common and the one I have used/had experience from before. I cannot cover everything.
3. Requesting your free wildcard certificate
Once chapter 2 of this guide has been completed and the latest version of the certbot-auto client has been installed you can start with requesting your wildcard certificate from Let's Encrypt over the new ACMEv2 API with the new TXT DNS record domain ownership validation.
Congratulations! You have received your wildcard certificate from Let's Encrypt for your main domains and all subdomains of your main domains. If you also requested one for subdomains of subdomains it will also cover that. So far so good.
As mentioned in the final output the certificate files and the private key are stored in the following location:
In general, you will need the three files from the list below when installing the requested certificate in your websites vHosts for your web server.
- Run the command below to request the wildcard certificate for your domain that covers all subdomains.
(Replace *.yourdomain.ext/yourdomain.ext with your actual domain name.)Code:./certbot-auto certonly --server https://acme-v02.api.letsencrypt.org/directory --manual --preferred-challenges dns -d *.yourdomain.ext -d yourdomain.ext
It is necessary to include the main domain yourdomain.ext to cover it because the domain *.yourdomain.ext will only cover all subdomains of your main domain like subdomain1.yourdomain.ext, subdomain2.yourdomain.ext and so on. A bit weird but unfortunately *.yourdomain.ext doesn't cover the main domain. That's just how it is. So don't forget to include the main domain when requesting wildcard certificates anywhere.
The wildcard domain *.yourdomain.ext in the certificate will not cover subdomains of subdomains like subdomain1.subdomain1.yourdomain.ext! To achieve this you will have to include additional domains to the command above like below.
Code:[...] -d *.subdomain1.yourdomain.ext
- The script will ask you to confirm and accept a few agreements and some information. So please do confirm and/or accept if asked to do so to continue.
- You will now be asked to create TXT DNS records for your domains like in the following example output.
Quote:-------------------------------------------------------------------------------
Please deploy a DNS TXT record under the name
_acme-challenge.yourdomain.ext with the following value:
5GFgEqWd7AQrvHteRtfT5V-XXXXXXXXXXXXXX
Before continuing, verify the record is deployed.
-------------------------------------------------------------------------------
Press Enter to Continue
-------------------------------------------------------------------------------
Please deploy a DNS TXT record under the name
_acme-challenge.yourdomain.ext with the following value:
5ACgSpWd7AQrvHvkRsl9A-XXXXXXXXXXXXXX
Before continuing, verify the record is deployed.
-------------------------------------------------------------------------------
Press Enter to Continue
Go to your domain DNS control panel and create both TXT DNS records with the name as shown in the output of certbot-auto and the value as shown there. Before hitting ENTER to continue, wait a little bit and give the DNS propagation a bit of time. You can use https://www.whatsmydns.net/ to check how well the TXT DNS records have updated all over the world already.
- When everything is in order hit the ENTER button on your keyboard and certbot-auto will start to verify the ownership of your domains by looking for the created TXT DNS records and compare them. If everything is good you will see the message below.
Quote:IMPORTANT NOTES:
- Congratulations! Your certificate and chain have been saved at:
/etc/letsencrypt/live/yourdomain.ext/fullchain.pem
Your key file has been saved at:
/etc/letsencrypt/live/yourdomain.ext/privkey.pem
Your cert will expire on 2018-06-20. To obtain a new or tweaked
version of this certificate in the future, simply run certbot-auto
again. To non-interactively renew *all* of your certificates, run
"certbot-auto renew"
- If you like Certbot, please consider supporting our work by:
Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate
Donating to EFF: https://eff.org/donate-le
Congratulations! You have received your wildcard certificate from Let's Encrypt for your main domains and all subdomains of your main domains. If you also requested one for subdomains of subdomains it will also cover that. So far so good.
As mentioned in the final output the certificate files and the private key are stored in the following location:
Code:
/etc/letsencrypt/live/yourdomain.ext/In general, you will need the three files from the list below when installing the requested certificate in your websites vHosts for your web server.
- fullchain.pem (CA cert - intermediate certs - your certificate)
- privkey.pem (private key file for your certificate)
- chain.pem (CA cert - intermediate certs)
4. Finale
So that's it. It looks like a lot, right? In fact, it's not that much. Just a few commands for the certbot-auto client installation and finally the request to get the certificate. And you have your wildcard certificate from Let's Encrypt free of charge if everything went well.
All you have to do now is to install the certificate in the vHosts of your websites on your web server. I will not cover this. There are good guides available at through Google for your web server. I personally use Nginx and generate the vHost files from zero by myself along with the Mozilla SSL Configuration Creator.
If you have already operated a web server you will probably already know how to install TLS certificates or know where to get the right guides for your web server. So I see no point it covering something that has a lot of documentation available already and that everyone might do differently. Apart from that I really only use Nginx so I wouldn't be able to cover Apache, IIS or another web server. Sorry about that.
Enjoy your free Let's Encrypt wildcard certificates.
All you have to do now is to install the certificate in the vHosts of your websites on your web server. I will not cover this. There are good guides available at through Google for your web server. I personally use Nginx and generate the vHost files from zero by myself along with the Mozilla SSL Configuration Creator.
If you have already operated a web server you will probably already know how to install TLS certificates or know where to get the right guides for your web server. So I see no point it covering something that has a lot of documentation available already and that everyone might do differently. Apart from that I really only use Nginx so I wouldn't be able to cover Apache, IIS or another web server. Sorry about that.
Enjoy your free Let's Encrypt wildcard certificates.
For me it is a close tie between the new elder scroll and the Cyberpunk from the Witcher guys.
Also MS is trying hard to not be completely obsolete.
Thoughts?
Also MS is trying hard to not be completely obsolete.
Thoughts?
hello Admins @[b]Dynamo[/b] @[b]TrK[/b] @[b]perryoo11[/b]
VPS-9 down. i am not confirm the time but now i check to do some work and its not connecting via ssh or sftp. even no ping. please check
VPS-9 down. i am not confirm the time but now i check to do some work and its not connecting via ssh or sftp. even no ping. please check
i have a question, ive been looking for other vps providers in the Free VPS Providers, and most of them are closed or ended. can someone post here a website that still provide vps?
EDIT: i have another question, when i had vps 1 i saw that i can use only linux... now someone says
now when i checked the vps plans i saw vps 1 Virtualization: KVM
Now can someone explain it to me? why i wasnt able to change to windows?
EDIT: i have another question, when i had vps 1 i saw that i can use only linux... now someone says
Quote:Only KVM, XEN and vmWare servers are capable of running Windows
now when i checked the vps plans i saw vps 1 Virtualization: KVM
Now can someone explain it to me? why i wasnt able to change to windows?
| Welcome, Guest |
|
You have to register before you can post on our site. |
| Search Forums |
|
(Advanced Search) |
| Forum Statistics |
|
» Members: 2,271 » Latest member: orzpainter » Forum threads: 3,100 » Forum posts: 34,783 Full Statistics |
| Online Users |
|
There are currently 316 online users. » 0 Member(s) | 313 Guest(s) Bing, Applebot, Yandex |
| Latest Threads |
|
⚡ EnjoyVPS.Com : 35+ Glob...
Forum: Others Last Post: RIYAD 01-06-2026, 01:21 AM » Replies: 0 » Views: 703 |
|
Get LLHOST Netherlands Fe...
Forum: Others Last Post: LLHOST 09-29-2025, 03:02 AM » Replies: 0 » Views: 1,029 |
|
Super Fast LLHOST Netherl...
Forum: Value VPS Providers Last Post: LLHOST 09-16-2025, 05:01 AM » Replies: 0 » Views: 740 |
|
Get LLHOST Netherlands Fe...
Forum: Cheap Providers Last Post: LLHOST 09-08-2025, 01:33 PM » Replies: 0 » Views: 897 |
|
Windows VPS @ $31.5/Year ...
Forum: Cheap Providers Last Post: DewlanceHosting 08-16-2025, 03:12 AM » Replies: 0 » Views: 987 |
|
Buy DemoTiger Videos on c...
Forum: Others Last Post: DewlanceHosting 08-16-2025, 03:10 AM » Replies: 8 » Views: 6,636 |
|
Budget Dedicated Servers ...
Forum: Others Last Post: HostNamaste 08-13-2025, 04:54 AM » Replies: 2 » Views: 2,044 |
|
☁️ How to Use VCCPRO Virt...
Forum: Cheap Providers Last Post: bestadvisor 07-13-2025, 09:36 AM » Replies: 0 » Views: 1,502 |
|
[Promo] 30% Discount – VP...
Forum: Cheap Providers Last Post: LLHOST 07-11-2025, 12:56 PM » Replies: 0 » Views: 1,040 |
|
✅ Affordable VPS Hosting ...
Forum: Cheap VPS Providers Last Post: RIYAD 07-02-2025, 03:02 AM » Replies: 0 » Views: 2,356 |
![[Image: lOxmMxh.jpg]](https://i.imgur.com/lOxmMxh.jpg)
![[Image: il72X7N.jpg]](https://i.imgur.com/il72X7N.jpg)
![[Image: B3tR9e5.jpg]](https://i.imgur.com/B3tR9e5.jpg)
![[Image: 26G7HuS.jpg]](https://i.imgur.com/26G7HuS.jpg)
![[Image: rRogeEz.jpg]](https://i.imgur.com/rRogeEz.jpg)
![[Image: jglFGD5.jpg]](https://i.imgur.com/jglFGD5.jpg)