Currently set to Index
Currently set to Follow
×

Blog

How To Raise A Support Ticket In Ideastack

In our everyday life, all of us come across numerous troubles, some issues we control on our own however to address a few, we want some kind of help or guidance within the form of assistance.

the same goes actually for our professional lives. when we encounter any issue related to products- software program, hardware or services that immediately affects our business or working, we expect prompt help and assistance from the service company.

For the service company, “support” is its organizational backbone as it’s far from the system which helps it gain customers’ belief and appreciation with the aid of assisting them out rapidly in hard & urgent conditions.

Most companies offer a couple of modes of support for customer difficulty resolution. Ideastack gives three prompt support structures –live chat, cellphone and support ticket.

Follow Steps 1-2 if you want to login to client area

Follow Steps 1-8 if you want to create a support ticket

Step 1 : Visit your client area By going to https://ideastack.com/ or by using this URL: https://ideastack.com/order/clientarea.php           

Step 2 : Login with your registered email & password

Step 3: Click on open ticket

Step 4: Select the type of department you want to get help from , kindly select the relevant ticket type this will help us to assign a relevant support member.

Step 5: fill the relevant information related to your problem & Select the Related product you want to send the support ticket for  select the priority settings too (High level=2 hrs, Middle level=2 to 4 hrs, Low level=4 to 6 hrs)

step 6: if possible attach a screenshot of your issue as well this will help our support team understand your issue more clearly and get a resolution on the same.

step 7: Submit the ticket– Once you have filled in all the details to raise the ticket,do recheck the details and click the tab-Submit Ticket.

step 8: Support Ticket is generated– After you click Submit Ticket, a new support ticket is generated which automatically moves to the relevant department and admins start looking into it to resolve the issue ASAP.

 

INSTALL SSL IN CWP PANEL

Install SSL in CWP with help of Below Steps:-

 

⦁ The first step is to download your SSL Certificate and KEY from the server to your local computer.(Login to CWP panel > SECURITY>Go to SSL generator >Generate csr private key)

⦁ Don’t forget to check if your Apache is Listening on port 443!!!

Ideastack SSl

⦁ In the second step you will get SSL output and now you will need to buy SSL Certificate providing an output of “BEGIN CERTIFICATE REQUEST” to SSL seller company.

⦁ In the third step, you have received new SSL Certificate from the valid seller you can install it by clicking on “Browse installed SSL Certificates”.

Ideastack SSl

⦁ Now after that edit file “/etc/pki/tls/certs/DOMAIN.COM.cert” !!!

⦁ At last, go to SSL Manager and install this Certificate for the user and path in which you need it.

⦁ Finally, Now You Have installed a Valid SSL Certificate for the selected time period.

For More Information Visit Our Website  Ideastack

How to Reset Your Forgotten Domain Admin Password on Server 2008 R2.

2- Restart the server and chose the boot option from CD.

2-click NEXT and click on repair mode your COMPUTER.

Windows Server

3-click on NEXT and SELECT COMMAND PROMT on NEXT and SELECT COMMAND PROMT.

Cheap windows vps

4-.x:\SOURCES>dir ENTER (ALL COMMAND GIVEN BELOW)

c:
Dir (file not found)
D:
dir (file found Like-windows)
MOVE C:\Windows\System32\Utilman.exe C:\Windows\System32\Utilman.exe.bak

Windows vps

COPY C:\Windows\System32\cmd.exe C:\Windows\System32\Utilman.exe

5 – Now you can go ahead and reboot your machine. When it’s done booting up again and you are at the Logon screen, click on the Ease of accessibility icon.

Best Windows vps

6 – use below command for password change net user administrator *
And then set the password which you want. Close cmd and log on.-

Windows 2008 R2

How to install RAID 10 in centos7?

How to install RAID 10 in centos7?

Once you done with other setting go to INSTALLATION DESTINATION

Ideastack

Select all disks present on the system for raid 10 minimum 4 disks required. If re-installing operating system having RAID configured before go to How to reinstall RAID?

Select I will configure partition

Centos vps

Click here to create them, automatically this will create partitions

Select Device Type: RAID, Select RAID Level: RAID10 and File System: xfs


Centos vps

Can select swap to DEVICE Type: RAID and RAID Level: RAID0 File System: swap

Linux vps

We can verify RAID configuration using df -l command or mdadm

raid 10 vps

Slingshot malware attacking router-connected devices since 2012 without detection 

Researchers from Kaspersky Lab uncover exposed a malicious loader named Slingshot, which is vigorously attacking clients through routers for the past six years without even being detected.

Characteristically, the routers download and function many DLL (dynamic link library) documents from the devices. The hackers used routers to devise a malicious DLL to the package of another rightful DLLs. These malevolent DLLs cooperate with the connected devices by targeting the memory.

Malware Attacking

The liabilities were uncovered in routers made by MikroTik. The clients of MikroTik routers run WinBox Loader software for router connectivity. When this software is made functional, the device is then connected to an isolated server to download the Slingshot virus. Researchers say that this malware involves two modules called Canada and GollumApp, which enable data theft.

Canada is a seed mode module that deals with the complete and overall control of the affected computer to the attacker with no limits. It can carry out harmful code in the scheme without causing a blue screen.

GollumApp is a consumer mode module that contains around 1500 user-code functions. Using these modules, Slingshot can crop screenshots, keyboard data, network data, passwords, and desktop activities.

encrypted file system

What makes Slingshot dangerous is the numerous tricks its actors use to avoid detection. It can even shut down its components when it detects signs that might indicate forensic research. Furthermore, Slingshot uses its an encrypted file system on an unused part of a hard drive,” as was noted by the researchers of Kaspersky.

These researchers have also stated that Slingshot is a complicated malware and developers who founded it might have spent a huge amount of time and money. “Its infection vector is remarkable – the best of our knowledge.”

For more information, you can visit: Ideastack