Prev

Next

Welcome !Welcome ! I'm Subodh Manikoth, an entrepreneur and a web developer. When I decided to start a personal website, it was with a purpose in mind;  not merely to spout a bunch of loosely woven words with no coherent meaning. The purpose of this website is to give me a place to log things I don't want to forget, and to share these...

Read more

twitter

How to remove all frozen emails from the EXIM mail queue?

Category : Web Hosting

Exim is a mail transfer agent (MTA) used on Unix-like operating systems. It aims to be a general and flexible mailer with extensive facilities for checking incoming e-mail.

Frozen emails are the emails to invalid mail accounts that were undelivered to the address. If the mail can’t be delivered for an account, the mail will be added in the queue and exim will try a couple of times to deliver the mail. Sometimes it is necessary to remove all frozen messages in exim mail queue immediately.

Continue Reading

How to delete an entire directory via SSH

Category : Web Hosting

This is very commond knowledge. But I always end up googling for this command when I need to remove a directory with sub-directories/files from any of our servers. So I’m just writing down here to keep it handy and I hope it may be helpful for someone else there googling for the same.

Continue Reading

DDoS Attacks: How Vulnerable Is Your Site to the Threat?

Category : Web Hosting

Maintaining website security has become such a tremendously intricate process as technology seems to be forever evolving. The general perception is that you can protect your online business against current threats through analysis of past attacks, but remain clueless about security loopholes that might come into play as the Internet continues to develop and technology incessantly evolves. It’s like a vicious cycle where attackers and defenders skirmish to get the upper hand – each time a security breach is countered by expensive security measures, attackers dig up new vulnerabilities and/or enhance their tools to sidestep newly developed security systems. Hence, web hosting security tools that are applicable today may not hold ground the following year. Continue Reading