Jose Perez has written 11 articles

Affiliates

An affiliate is a member of our Hostwinds Affiliate Program. Members of this program will have the opportunity to earn income by leveraging their online presence to drive potential customers to Hostwinds. As a result of any new purchases will be receiving a percentage of the profits as commission. None of our affiliates are required…

Create a Strong SSH Key in Linux

SSH is a client/server protocol used for remote logins. Using cryptography for authentication, ssh provides an encrypted method to access your server. The two of the most popular methods of authentication are passwords based and public key based authentication. Public key authentication uses the cryptography system of key pairs that allows you to authenticate to…

Install Docker and WordPress On Ubuntu

What is Docker? Docker is a containerization platform that performs operating system level virtualization, which lets you run lightweight containers in isolation. The following document will take you through the steps to install Docker and run a WordPress & MySQL container.   Installing Docker   Install docker from from the official repository.

  Use…

Shared and Business Hosting Quick Start Guide

So you’ve purchased hosting and you are wondering what are the first steps are.  This guide will assist you on how to begin your journey by exploring cPanel and how to upload files for your website.  Prior to setting up the host, if you do not already have a domain name registered, you can check…

Common WordPress Issues – Problems

White screen of death If all you get when you go to your site is a blank white screen, this is what’s called the white screen of death and it’s a common WordPress problem. It’s normally caused by a fatal PHP error and if you don’t have error reporting turned on, you won’t see anything…

SSH Password vs Key Based Authentication

What are the benefits of key based authentication? Key based authentication provides two major benefits.  The first, you can login without a password (If you didn’t set it up to use password protection).  Second, the lack of using a password stops any unauthorized password uses or cracking attempts.     How do I setup key based…

  • Page 1 of 2
  • 1
  • 2