Jump to content

All Activity

This stream auto-updates     

  1. Earlier
  2. These instructions assume you've already exported your Outlook email, contacts, and calendar from another instance of Outlook, and now you want to import them to Outlook 2013, Outlook 2016, or your Office 365 mailbox. At the top of your Outlook 2016 or 2013 ribbon, choose File. If your ribbon doesn't have a File option in the top left corner, you aren't using an Outlook app installed on your computer. See What version of Outlook do I have? to find your version of Outlook and to get to right import steps. Choose Open & Export > Import/Export. This starts the wizard. Choose Import from another program or file, and then click Next. Choose Outlook Data File (.pst) and click Next. Browse to the .pst file you want to import. Under Options, choose how you want to deal with emails and contacts, then choose Next. If a password was assigned to the Outlook Data File (.pst), enter the password, and then click OK. If you're importing the contents of your .pst file into your Office 365 mailbox, choose that mailbox here. If you're NOT importing into your Office 365 mailbox, choose Import items into the current folder. This imports the data into the folder currently selected. Choose Finish. Outlook starts importing the contents of your .pst file immediately. It's finished when the progress box goes away. If you're importing your .pst file to your Office 365 mailbox, you may see a message that it's trying to connect with Office 365. This happens when the Internet connection is interrupted, even for a moment. Once your Internet connection is re-established, Outlook will continue importing the .pst file. TIP: If you want to retrieve only a few emails or contacts from an Outlook Data File (.pst), you can open the Outlook Data File, and then, in the navigation pane, drag and drop the emails and contacts from .pst file to your existing Outlook folders. View the full article
  3. 1. Using the CDP Server web interface you can browse the files and folders on your Agent's hard disk and select the files and folders to include in the backup. 2. You can optionally add complex rules to exclude files by a pattern. For example, *.log or *.mp3. 3. Your selected folders and exclude rules are communicated to the CDP Agent at the beginning of every backup operation. 4. CDP Agent (Windows and Linux) takes a point-in-time block level snapshot of the backup target. 5. The CDP Agent mounts the virtual snapshot device. For example, X: drive (Windows) or /mnt/snapshot (Linux). Note These mounted devices are invisible to users and do not conflict with other mount points or drives. 6. According to the selected files/folders and exclude rules the Agent proceeds to delete all excluded files and folders from the writable snapshot using simple userspace delete methods. Note This deleting is only done in your point-in-time snapshot and does not affect your real disk volume and data. View the full article
  4. OACI REST API Basics

    OACI REST API Basics The OACI RESTful API provides programmatic access to REST resources. Using the API you can obtain information about the resources and perform actions on them. For example, you can obtain a list of the existing servers, start or stop a server, modify server configuration, create a new or delete an existing server, and perform many other management tasks. This chapter provides an overview of the API and describes the basics of using it in your programs. Accessing a Resource A OACI resource is accessed by sending an HTTPS request to a OACI server. When the server receives a request, it processes it accordingly (performs actions or retrieves data) and sends back a response that can contain the data that you requested, an operation status code, or an error message. All OACI resources are accessed at the following base URL (referred to as baseURL in the API reference topics of this guide): https://{ip_address | hostname}:port/paci/version where: ip_address | hostname is the OACI server IP address or hostname. port is the port number on which the server is listening for REST requests paci must be typed exactly as shown version is the API version number Note: Ask your service provider for the values listed above (except the "paci" string) and then use them when composing the base URL in your code. Base URL example The following base URL sample contains the OACI server hostname ("paci-web"), port number (4465), the "paci" string, and the version number (v1.0). https://paci-web:4465/paci/v1.0 Resource path and parameters When accessing a particular resource, you append the following values to the base URL: The path that identifies the resource Optional resource-specific parameters (where available) Each resource is identified by a path within the base URL. An individual resource may have subresources within its own path, each of which is also identified by a path. For example, the following sample URL references the ve resource, which is "server" in general: https://paci-web:4465/paci/v1.0/ve The following sample URL references a specific server identified by its name, which in this instance is my-server-01: https://paci-web:4465/paci/v1.0/ve/my-server-01 Resource-specific parameters Some requests allow to specify additional (usually optional) parameters. For example, when obtaining the list of the operating system templates, you may add a filter to retrieve the templates for a particular operating system (e.g. a particular Linux distribution). Additional parameters are included in the URL after the question mark (?). HTTP Request Headers When sending an HTTPS request, the request headers must contain authentication and content type information as described below. Authentication OACI REST API uses the basic authentication scheme as defined by RFC 1945 (Hypertext Transfer Protocol – HTTP/1.0). An HTTP request header must contain credentials in the form of user name and password separated by a colon and encoded using the Base64 encoding scheme. The following is an example of an authorization header: Authorization: Basic dG9ib3RyYXM6cTE= Please note that the password to be used in OACI REST API calls must be obtain from the Operations Automation customer's control panel as follows: In the customer's control panel, open the Cloud Infrastructure tab. Switch to the API Access tab and click the Generate API Access Key button. Your key appears in a message box. Use this key as the password in your API calls. Service providers can obtain the REST API access key using the provider's control panel. Please see the provider's guide for additional information. Content Type Input data is included in the OACI REST API request in the form of an XML document. Therefore, Content-type should be specified as "application/xml": Content-type: application/xml Callbacks OACI REST API provides a callback functionality that allows you to receive responses from OACI server asynchronously. To use a callback, the request header must include the "x-callback-url:" string followed by the URL at which your HTTP server listens for callbacks from OACI server. For example: x-callback-url: http://192.168.3.77:8081/bd6fsdb4-24sd-4a64-8fd1-403d1b11tf0a HTTP Methods REST requests are sent to the OACI server as HTTP POST, GET, PUT, and DELETE messages. In many cases different methods can be used on the same resource to achieve different goals. For example, you can obtain the information about a server using the GET method, modify its configuration using the PUT method, and delete it using the DELETEmethod. The resource (identified by a path) will be the same in all three instances, but each request parameters and input/output data will be different. In this guide, each API reference topic describes a particular operation and provides information about the HTTP method that must be used. Data Input and Output When sending or receiving data, it is included in a request or received from the OACI server as an XML document. Each request that sends or receives data has a corresponding XML specification that defines the XML document structure. When composing a request, the specification must be followed precisely. The validation of the request is performed on the server side against the XML specification. If a mandatory parameter is missing or an invalid parameter is passed, you will receive an HTTP error. An XML specification for each request and response is described in individual request topics of this guide. The sample XML document below contains a server information. A document like this is received when a server information is requested or is included in the request when a new server is created (or an existing server is modified). <?xml version="1.0" encoding="UTF-8"?> <ve> <name>my-server-01</name> <description>Test server</description> <cpu number="2" power="1600"/> <ram size="512"/> <disk local="true" size="1"/> <platform> <template-info name="ubuntu-9.10-x86_64"/> </platform> <backup-schedule name="daily"/> </ve> In general, the same XML specification is used in the API for input and output when dealing with the same resource type. Certain parameters, however, cannot be used in the input version and therefore must be omitted. The reference topics in this guide describe the input and output XML specifications separately. Error Handling If there's an error executing a OACI REST API request, an HTTP page containing the error information is returned to the caller. The page contains an HTTP code and the description of the error. HTTP error 406 usually means that there was an error in the request or the operation cannot be completed for other reasons. In this case, the error page will also contain a OACI REST API error code and a text describing the error. The following is an example of such code and description: P80100: Template [centos-6-x86_64] is already registered at the node ... The code in the example above (P80100) can be interpreted as follows: The first letter can be either P (permanent error) or T (transient error). The first digit after the letter means one of the following: 1 — internal error 2 — resource is in use 3 — resource is not available 4 — unsupported operation 5 — invalid modification 6 — the operation cannot be performed at this time 7 — the request is missing required information 8 — invalid data was passed in the request 9 — invalid operation The rest of the number is formed by multiplying the first digit by 10000 and adding an actual error code to it. In the example above, the actual error code is 100, therefore: 8 * 10000 + 100 = 80100. HTTP errors other than 406 could mean other, usually general, errors and will contain a proper description of the problem. Format and Conventions The baseURL convention The string "baseURL" is used in the API reference topics as a shorthand for the base URL at which the OACI resources can be accessed. When composing an HTTP request, the "baseURL" string must be substituted with the base URL specific to your OACI environment. API reference topics Each API reference topic in this guide provides information on how to compose an HTTP request that will perform a particular operation on a particular resource. Each entry contains the following information: An HTTP method (POST, GET, PUT, DELETE) used to access the resource. Depending on the type of the operation, different methods may be used to access the same resource. Each operation type has its own topic in this documentation. A full path to the resource in the form baseURL/resource_path. A description of the resource and the operation. A list of additional parameters that can be used with the request (where applicable). An XML specification of the input and/or output XML documents (included only with the requests that send and/or receive data). Use these specifications to compose an XML input and parse the XML output. Samples of HTTP request, HTTP response, and input/output XML documents. To compose an HTTP request that will perform a particular task on a particular resource, find the corresponding reference topic (each topic name contains the short task description) and follow the provided instructions. API reference format Each topic describing an HTTP request has the following sections: Description Explains the purpose of the request. Syntax Specifies which HTTP method is used with the request (GET, POST, PUT, DELETE) and the resource URL. Request Parameters Describes the XML specification used to specify the request parameters. Response For requests that don't output data, describes the HTTP message returned. For requests that return data, describes the XML Schema of the output XML document. Example Provides samples of HTTP request, HTTP response, and XML input/output. Testing code samples and creating your own programs You can test the samples provided in this guide using a REST client for a Web browser. For example, you can use a simple but effective RESTClient extension for Firefox or any other available REST plug-in and a browser of your choice. To write your own programs using the API, you will need a development tool that will allow you to make Web requests from the command line or from a program (e.g a program written in C or Python). One of the commonly used tools is cURL. With cURL you can use the API in a script or a C program. View the full article
  5. Steps 1. Login into the web interface of the cloud drive at https://drive.readyspace.com 2. Navigate to the patch from which the files were deleted. 3. Check the "deleted files" from the top menu. 4. Recently Deleted files and folders will be shown on the list marked with a little trashcan on the file icon. 5. By clicking/ or right-clicking the file, a menu/or pop-up will be shown and you can see history and you can undelete the file. Please refer to the screenshot attached for reference. Screenshot View the full article
  6. Steps 1. Login into the web interface of the cloud drive at https://drive.readyspace.com 2. Navigate to the patch from which the files were deleted. 3. Check the "deleted files" from the top menu. 4. Recently Deleted files and folders will be shown on the list marked with a little trashcan on the file icon. 5. By clicking/ or right-clicking the file, a menu/or pop-up will be shown and you can see history and you can undelete the file. Please refer to the screenshot attached for reference. Screenshot View the full article
  7. In order to keep the Backup Agent secure, connections are only accepted from specified Backup Managers. To authorize a Backup Manager to backup the Server, you must first add a key of the Backup Manager to the Backup Agent. The Windows Backup Agent Configuration Utility allows users to add an encryption key that allows the Backup Manager to connect to the Windows Backup Agent. Adding the Backup Manager public key to the Backup Agent means creating a text file on the server (Backup Agent machine). The default directory is C:\Program Files\Idera Server Backup\conf\server.allow. Follow the instructions below to add the Manager Public Key to the Backup Agent on your Server using the Windows Backup Agent Utility. Notice Make sure the Backup Manager is running and the Manager port (default 80) and Backup Agent port (default 1167) are not busy by other applications. 1. Run the Windows Backup Agent Utility. 2. The main window of the Windows Backup Agent Utility will be displayed. Switch over to the "Authorized Server Backup Managers" tab. 3. Click on the "Add..." button located on the right to authorize a Backup Manager. 4. The "Add Server Key" dialog will be displayed. 5. Enter the following information to inform the Utility how to contact the Backup Manager. Filename - Enter Host name that will be shown in the "Installed Keys" list. The file containing Encryption Key will have this name. Note There is a backup configuration setting IPAuthentication that allows the system to check if the Filename matches IP. If IPAuthentication is "0," then the "Filename" value can be different from the "Server Backup Manager" value. Protocol - Select "http" or "https" from the drop-down menu. Server Backup Manager - Enter the IP address or DNS Host Name that the Backup Manager uses. 6. Click on the "OK" button. 7. Once this information is entered and verified, the backup manager will be contacted to find its Public Key and the IP address that it will use for outbound connections. During this process, the Windows Backup Agent Configuration Utility uses the current Backup Agent port settings. If you have defined the appropriate Backup Manager properties, the Manager Key will be successfully added to the Backup Agent database and the requests from the Backup Manager will be allowed. The Key name will appear on the "Authorized Server Backup Managers" tab. Note After the Server Key is added, requests from the Backup Manager should be accepted. Note During the Key adding the following error message can appear. Eliminate issues connected for example with a firewall permissions and repeat the procedure. Feel free to contact us if you need any further assistance on this. View the full article
  8. In order to keep the Backup Agent secure, connections are only accepted from specified Backup Managers. To authorize a Backup Manager to backup the Server, you must first add a key of the Backup Manager to the Backup Agent. The Windows Backup Agent Configuration Utility allows users to add an encryption key that allows the Backup Manager to connect to the Windows Backup Agent. Adding the Backup Manager public key to the Backup Agent means creating a text file on the server (Backup Agent machine). The default directory is C:\Program Files\Idera Server Backup\conf\server.allow. Follow the instructions below to add the Manager Public Key to the Backup Agent on your Server using the Windows Backup Agent Utility. Notice Make sure the Backup Manager is running and the Manager port (default 80) and Backup Agent port (default 1167) are not busy by other applications. 1. Run the Windows Backup Agent Utility. 2. The main window of the Windows Backup Agent Utility will be displayed. Switch over to the "Authorized Server Backup Managers" tab. 3. Click on the "Add..." button located on the right to authorize a Backup Manager. 4. The "Add Server Key" dialog will be displayed. 5. Enter the following information to inform the Utility how to contact the Backup Manager. Filename - Enter Host name that will be shown in the "Installed Keys" list. The file containing Encryption Key will have this name. Note There is a backup configuration setting IPAuthentication that allows the system to check if the Filename matches IP. If IPAuthentication is "0," then the "Filename" value can be different from the "Server Backup Manager" value. Protocol - Select "http" or "https" from the drop-down menu. Server Backup Manager - Enter the IP address or DNS Host Name that the Backup Manager uses. 6. Click on the "OK" button. 7. Once this information is entered and verified, the backup manager will be contacted to find its Public Key and the IP address that it will use for outbound connections. During this process, the Windows Backup Agent Configuration Utility uses the current Backup Agent port settings. If you have defined the appropriate Backup Manager properties, the Manager Key will be successfully added to the Backup Agent database and the requests from the Backup Manager will be allowed. The Key name will appear on the "Authorized Server Backup Managers" tab. Note After the Server Key is added, requests from the Backup Manager should be accepted. Note During the Key adding the following error message can appear. Eliminate issues connected for example with a firewall permissions and repeat the procedure. Feel free to contact us if you need any further assistance on this. View the full article
  9. 1. Go to Customer Portal Webpage Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Links 2. Select the subscription from the list box which is situated at the upper right corner of the page. 3. Go to VPS tab. 4. Click the "Manage Plesk" button. 5. At the bottom of the page, you can see a button named "Change Administrator's Password". Click on that. 6. Type new administrator's password and click submit. View the full article
  10. 1. Go to Customer Portal Webpage Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Links 2. Select the subscription from the list box which is situated at the upper right corner of the page. 3. Go to VPS tab. 4. Click the "Manage Plesk" button. 5. At the bottom of the page, you can see a button named "Change Administrator's Password". Click on that. 6. Type new administrator's password and click submit. View the full article
  11. 1. Go to Customer Portal Webpage Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Links 2. Select the subscription from the list box which is situated at the upper right corner of the page. 3. Go to VPS tab. 4. Click the "edit credentials" button. 5. Enter the new password for the administrative user and click submit. View the full article
  12. Open Outlook 2007. Select Tools > Account Settings. Check for the account type option for the already added accounts, If it is POP/POP3, then you don't need to add the account again. If it's not, please proceed to the next steps. On the Email tab, select New. Select Microsoft Exchange, POP3, IMAP > Next > Manually configure server settings or additional server types > Next. Select Internet email > Next. Enter the required information and account type as "POP3". using your full email address as your user name.Then select Next. That's it. Select Finish to start using Outlook. Outlook will download all of your emails from the server. Backup emails from OUTLOOK In Outlook 2007, at the top of your ribbon choose File. If your ribbon doesn't have a File option in the top left corner, see What version of Outlook do I have? to determine your version of Outlook and to get to the right export instructions. Choose Import and Export. Select Export to a file, and then click Next. Click Personal File Folder (.pst), and then click Next. Select the name of the email account to export, as shown in the picture below. Only information for one account can be exported information at a time. Make sure that the Include subfolders check box is selected. This way everything in the account will be exported: Calendar, Contacts, and Inbox. Choose Next. Click Browse to select where you want to save the Outlook Data File (.pst) and to enter a file name. Click OK to continue. NOTE: If you have previously used the export feature, the previous folder location and file name appear. Make sure that you change the file name if you want to create a new file instead of using the existing file. If you are exporting to an existing Outlook Data File (.pst), under Options, specify what to do when exporting items that already exist in the file. Click Finish. The export begins immediately ... unless you're creating a new Outlook Data File (.pst) or you're exporting is to an existing .pst file that is password protected. In those cases you'll get this dialog box: Choose OK if you don't want to password protect your file. Otherwise: If you want to password protect your .pst file: enter the password in the Password and Verify Password boxes, and then click OK. In the Outlook Data File Password dialog box, enter the password, and then click OK. If you are exporting to an existing Personal File Folder (.pst) that is password protected, in the Outlook Data File Password dialog box, enter the password, and then click OK. Now that your Outlook data is in a .pst file, it's portable. For example, you can save the .pst file to OneDrive, and then download it to your new computer. Or you can save it to a usb flash drive, plug the drive into your new computer, and then import your email, contacts, and calendar to Outlook. Restore emails to OUTLOOK from a backup file At the top of our Outlook 2007 ribbon, choose File. If your ribbon doesn't have a File option in the top left corner, you aren't using a version of Outlook installed on your computer. See What version of Outlook do I have? to find your version of Outlook and to get to right import steps. Choose Import and Export. This starts the wizard. In the Import and Export Wizard, click Import from another program or file, and then click Next. Click Personal Folders File (.pst), and then click Next. Click Browse, and then choose the file to import. NOTE: Under Options, it is recommended that you click Do not import duplicates unless you want the imported information to replace or duplicate items already in Outlook. Click Next. If a password was assigned to the Personal Folders file (.pst), you are prompted to enter the password, and then click OK. Set the options for importing items. The default settings usually don’t need to be changed. The top folder — usually Personal Folders or your email address — is selected automatically. Include subfolders is selected by default. All folders under the folder selected will be imported. Select one of the destination options: Import items into the current folder - this imports the data into the folder currently selected. Import items into the same folder in - this imports the data into the destination folder of the same name as the source folder, e.g., from Inbox to Inbox. If a folder doesn’t exist in Outlook, it will be created. Click Finish. View the full article
  13. Open Outlook 2007. Select Tools > Account Settings. Check for the account type option for the already added accounts, If it is POP/POP3, then you don't need to add the account again. If it's not, please proceed to the next steps. On the Email tab, select New. Select Microsoft Exchange, POP3, IMAP > Next > Manually configure server settings or additional server types > Next. Select Internet email > Next. Enter the required information and account type as "POP3". using your full email address as your user name.Then select Next. That's it. Select Finish to start using Outlook. Outlook will download all of your emails from the server. Backup emails from OUTLOOK In Outlook 2007, at the top of your ribbon choose File. If your ribbon doesn't have a File option in the top left corner, see What version of Outlook do I have? to determine your version of Outlook and to get to the right export instructions. Choose Import and Export. Select Export to a file, and then click Next. Click Personal File Folder (.pst), and then click Next. Select the name of the email account to export, as shown in the picture below. Only information for one account can be exported information at a time. Make sure that the Include subfolders check box is selected. This way everything in the account will be exported: Calendar, Contacts, and Inbox. Choose Next. Click Browse to select where you want to save the Outlook Data File (.pst) and to enter a file name. Click OK to continue. NOTE: If you have previously used the export feature, the previous folder location and file name appear. Make sure that you change the file name if you want to create a new file instead of using the existing file. If you are exporting to an existing Outlook Data File (.pst), under Options, specify what to do when exporting items that already exist in the file. Click Finish. The export begins immediately ... unless you're creating a new Outlook Data File (.pst) or you're exporting is to an existing .pst file that is password protected. In those cases you'll get this dialog box: Choose OK if you don't want to password protect your file. Otherwise: If you want to password protect your .pst file: enter the password in the Password and Verify Password boxes, and then click OK. In the Outlook Data File Password dialog box, enter the password, and then click OK. If you are exporting to an existing Personal File Folder (.pst) that is password protected, in the Outlook Data File Password dialog box, enter the password, and then click OK. Now that your Outlook data is in a .pst file, it's portable. For example, you can save the .pst file to OneDrive, and then download it to your new computer. Or you can save it to a usb flash drive, plug the drive into your new computer, and then import your email, contacts, and calendar to Outlook. Restore emails to OUTLOOK from a backup file At the top of our Outlook 2007 ribbon, choose File. If your ribbon doesn't have a File option in the top left corner, you aren't using a version of Outlook installed on your computer. See What version of Outlook do I have? to find your version of Outlook and to get to right import steps. Choose Import and Export. This starts the wizard. In the Import and Export Wizard, click Import from another program or file, and then click Next. Click Personal Folders File (.pst), and then click Next. Click Browse, and then choose the file to import. NOTE: Under Options, it is recommended that you click Do not import duplicates unless you want the imported information to replace or duplicate items already in Outlook. Click Next. If a password was assigned to the Personal Folders file (.pst), you are prompted to enter the password, and then click OK. Set the options for importing items. The default settings usually don’t need to be changed. The top folder — usually Personal Folders or your email address — is selected automatically. Include subfolders is selected by default. All folders under the folder selected will be imported. Select one of the destination options: Import items into the current folder - this imports the data into the folder currently selected. Import items into the same folder in - this imports the data into the destination folder of the same name as the source folder, e.g., from Inbox to Inbox. If a folder doesn’t exist in Outlook, it will be created. Click Finish. View the full article
  14. Re-Installation of Rushfiles

    Re-Installation of Rushfiles Before the re-installation, you need to confirm that you have the valid log-in details of the RushFile. You can uninstall RushFiles from your computer by using the Add/Remove Program feature in the Window's Control Panel. On the Start menu (for Windows 8, right-click the screen's bottom-left corner), click Control Panel, and then, under Programs, do one of the following: Windows Vista/7/8: Click Uninstall a Program. Windows XP: Click Add or Remove Programs. When you find the program RushFiles, click it, and then do one of the following: Windows Vista/7/8: Click Uninstall. Windows XP: Click the Remove or Change/Remove tab (to the right of the program). Follow the prompts. A progress bar shows you how long it will take to remove RushFiles After that, you can re-install the same by downloading the .exe file from "http://rushfiles.com/download/". View the full article
  15. 1. Login to your Customer portal 2 Select appropriate subscription from the drop down menu (located at top right of the interface). 3. Select your Cloud Server subscription and click on "VPS" tab. 4.You can find the "restart" button just under the server name. View the full article
  16. Create Trash folder on Horde Webmail ================================ By default, Horde does not come with a “Trash” folder so this must be created before you are allowed to delete mail. please follow the below instruction to create Trash folder under the mail accounts. ++++++++++++++ 1) Login into your mail account and click on “New Messages” 2) Click on the “Folder Actions” and select “Create Mailbox” 3) Name the new mailbox “Trash” and create 4) In the same “Folder Action” dropdown, select “Rebuild folder list” 5) Go to the Gear Icon in the top menu bar >> preferences >> mail 6) Select the link “Deleting and moving messages” 7) Click the options, as per your requirement 8) Select the created folder “Trash” from the dropdown “Trash mailbox” 9) Save ++++++++++++++++ Now all deleted email will be sent to your trash folder. You can have Horde Delete this automatically if you have a time frame set or you can manually delete them in the interface. View the full article
  17. 1. Go to Customer Portal Webpage Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Links 2. Click the OfficeMail/SpamExperts subscription. 3. Click the SpamExperts tab. 4. Click the LOGIN button next to your desired domain. 5. Goto bottom of the page and click the "Sender blacklist" option. 6. Here, under "Sender" option enter the email address to be blocked. [NOTE: To blacklist a full domain, simply add the domain name without @. To blacklist an entire TLD use "*" as a wildcard (e.g. for anything from .nl add "*.nl", without the quotes). ] 7. Click Add. Feel free to contact us if you have any other queries. View the full article
  18. To Download. 1. Log into webmail of your mail account from customer portal. (Select "Email tab" >> Click mail account >> Webmail >> Open >> you will directly redirect to webmail of the mail account) 2. Move to "folders". 3. Select the folder (put a tick mark) which you want to backup/download. 4. Choose the option "Download" from "choose action" [.zip format]. The selected folder will download to your local end as .zip format. To import mail to your account. 1. Log into webmail of your mail account from customer portal. 2. Move to "folders". 3. Select the folder (put a tick mark) which you want to import from the backup mail. (Please note, you can only import the extracted file of the downloaded zip file. You can extract the zip file by using any online tools). 4. Choose the option "import" from "choose action" >> choose file (select file from your local end) >> import. After that, you can see the imported file in your specified folder.View the full article
  19. To, backup emails from your webmail interface, select all, click on three dashes icon and select Save as option. select all, click on three dashes icon and select Save as an option. The email will be saved in .eml format to your computer. In this case, all selected emails will be compressed into a .zip archive and downloaded to your computer. In order to import emails to App Suite webmail select them and then drag-n-drop to the required folder. NOTE: you can import only emails saved in .eml format. Once the transfer is completed, you will see all imported emails as unread ones. Please verify, I am attaching the screenshot for your review. Kindly verify the details from your end and update us if need further assistance. Screenshots: Feel free to contact us if you need any assistance on this. View the full article
  20. 1. Log in to Customer Portal. Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Link 2. Select your subscription ( Cloud Infrastructure or Cloud Server ) 3. Select the VPS tab or Cloud Infrastructure tab. 4. Select the console tab. ( Select the server first and you can see the console tab, in the case of Cloud Infrastructure) Feel free to contact us if you need any assistance. View the full article
  21. 1. Log in to Customer Portal. Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Link 2. Select your subscription ( Cloud Infrastructure or Cloud Server ) 3. Select the VPS tab or Cloud Infrastructure tab. 4. Select the console tab. ( Select the server first and you can see the console tab, in the case of Cloud Infrastructure) Feel free to contact us if you need any assistance. View the full article
  22. 1. Login to your customer portal 2 Select appropriate subscription from drop down menu (located at top right of the interface) 3. Click on E-mail tab 4. Click on the desired email address. 5. Click on the Webmail tab. 6. Now click on "Open WebMail link" to access the webmail. Feel free to revert us if you need any further assistance. View the full article
  23. 1. Login to your customer portal Different ReadySpace Branch have their own customer portal link, please refer to Customer Portal Links 2. Click the appropriate Plesk server subscription. 3. Click on VPS tab. 4. Click the "Manage Plesk" button under maintenance section of the page. 5. Now click at the "Manage DNS Zones" button present at the bottom of the page. 6. Here you can find the domains which are associated with the current subscription. 7. Here you can manually enable/disable the sync for each and every domain which was added to the Plesk. Feel free to contact us if you need any further assistance on this. View the full article
  24. Warning : when recreating your VPS with a different OS, your backup(s) and installed application(s) will be removed. The set of available applications depends on the selected OS. 1. Login to your Customer Portal 2. Select the appropriate subscription. 3. Go to VPS tab. 4. Click on Recreate Server. 5. Select your new operating system and enter your new password for the new server. 6. Click on Destroy and Create New Server --------------------------------------------------------------------------- Feel free to contact us if you need any assistance on this. View the full article
  25. 1. Login to your Customer Portal. 2. Select "Websites" tab. 3. Click the website name that you want to create the FTP account for. 4. Select FTP access 5. From the page, you can either edit the existing FTP account details or create a new one from the users tab. View the full article
  26. Powerful, Virtualized Security and Protection The Snapt Web Application Firewall (WAF) is an intelligent layer 7 firewall for HTTP and HTTPS traffic. It provides DoS protection, intrusion prevention, IP and GeoIP blocking and more to ensure that your site is online and secure. WAF Features Unlimited number of websites can be added Full HTTP and HTTPS proxy Layer 7 threat and intrusion prevention Free blacklist subscriptions to prevent spam, attackers, C&C Automatic configuration replication to slaves Live monitor blocks, packets-per-second and more Full GeoIP support for blocking countries Hotlink prevention and HTTP method restricting DoS prevention, request and session limits and more Active/Passive mode for disaster recovery (DR) requirements Full Snapt platform support Full API support Benefits of on-site WAF Snapt WAF is a complementary service to existing cloud firewall systems such as CloudFlare or Sucuri. These CDN-like services provide security and optimization at the edge, while Snapt provides them directly in-line. Snapt WAF means: No direct connections are possible to your upstreams On-site DoS prevention for smart-attacks Custom control of rulesets, locations, URLs - prevent false-positives Ability to only allow CDN traffic to your servers Full proxy for SSL traffic to prevent SSL exploits Full control of your traffic and DNS More detailed traffic information and monitoring
  1. Load more activity
×