Softaculous provides a number of Project-Management software that you can use for your business. While the popular one within cPanel (and Softaculous) is WooCommerce by WordPress, there are a number of others that you can use as well. We will quickly review some of the major Project Management software that you can utilize within Softaculous […]
Ecommerce software on Softaculous
Softaculous provides a number of Ecommerce software that you can use for your business. While the popular one within cPanel (and Softaculous) is WooCommerce by WordPress, there are a number of others that you can use as well. We will quickly review some of the major Ecommerce software that you can utilize within Softaculous WooCommerce […]
How to Delete a Database Table with phpMyAdmin
phpMyAdmin is a popular application for databases management. While working on databases, users might have to delete the database and this article will guide the users to delete a table from databases using the phpMyAdmin database management tool First, you need to log in to your cPanel account (don’t know how? check our Knowledgebase article […]
How To Locate The .htaccess File In cPanel
.htaccess file is a configuration file that you can create or edit, to control some security settings or behavior for Apache-based websites. This file contains configuration rules and directives, that are being read by the webserver. A web server may have multiple .htaccess files but there should be only one per directory for each individual […]
How to Login to cPanel
There are two ways to login to cPanel for your hosting accounts: through the Client Area, or by visiting the cPanel login page. Client Area Login to the Client Area using the links below: UKHost4u: https://www.ukhost4u.com/billing/clientarea.php Here you can enter your login details and click Login. Once logged in, navigate to the “Services” icon. On this […]
How to Install an SSL Certificate on a Domain in cPanel
SSL (Secure Sockets Layer) is an encryption layer that encrypts information between a server and a visitor’s browser. This layer has set of protocols which protects against electronic eavesdroppers. This also protects sensitive information These protocols initiate a handshake and it includes a set of private and public keys. Computers use these keys to encrypt […]