Extract Part Rars Using Unrar On Centos4?

Sep 27, 2007

Is it possible to extract part rars using unrar (or other programs) on centos4?

If so, how and what command to use?

View 0 Replies


ADVERTISEMENT

Curses RPM For CENTOS4.4 Required

Jul 11, 2007

I am using CentOS release 4.4 (Final) with Plesk 8 Hosting Control Panel. I want to install MTOP for MySQL monitoring which requires Curses.

[root@cll mtop-0.6.6]# perl Makefile.PL
Warning: prerequisite Curses 0 not found.
Writing Makefile for mtop

I need Curses rpm for CentOS 4.4, please give me that rpm so I can proceed next.

I also need Term::ReadKey 2.1 rpm for CENTOS4.4

View 2 Replies View Related

Compiling Mod_perl On X64 CentOS4.5 Gives An Error

Jul 6, 2007

Compiling mod_perl 1.30 on x64 CentOS4.5 gives an error when make:

(cd ./apaci && PERL5LIB=/home/.cpan/build/mod_perl-1.30-bUyCBp/lib: make)
make[1]: Entering directory `/home/.cpan/build/mod_perl-1.30-bUyCBp/apaci'
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c mod_perl.c && mv mod_perl.o mod_perl.lo
/usr/bin/perl -MExtUtils::Embed -e xsinit -- -o perlxsi.c -std Apache Apache::Constants Apache::ModuleConfig Apache::Log Apache::URI Apache::Util Apache::Connection Apache:erver Apache::File Apache::Table
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c perlxsi.c && mv perlxsi.o perlxsi.lo
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c perl_config.c && mv perl_config.o perl_config.lo
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c perl_util.c && mv perl_util.o perl_util.lo
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c perlio.c && mv perlio.o perlio.lo
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c mod_perl_opmask.c && mv mod_perl_opmask.o mod_perl_opmask.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap Apache.xs >Apache.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c Apache.c && mv Apache.o Apache.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap Constants.xs >Constants.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c Constants.c && mv Constants.o Constants.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap ModuleConfig.xs >ModuleConfig.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c ModuleConfig.c && mv ModuleConfig.o ModuleConfig.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap Log.xs >Log.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c Log.c && mv Log.o Log.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap URI.xs >URI.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c URI.c && mv URI.o URI.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap Util.xs >Util.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c Util.c && mv Util.o Util.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap Connection.xs >Connection.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c Connection.c && mv Connection.o Connection.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap Server.xs >Server.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c Server.c && mv Server.o Server.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap File.xs >File.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c File.c && mv File.o File.lo
/usr/bin/perl /usr/lib/perl5/5.8.8/ExtUtils/xsubpp -nolinenumbers -typemap /usr/lib/perl5/5.8.8/ExtUtils/typemap Table.xs >Table.c
cc -fpic -O2 -I/usr/lib/perl5/5.8.8/x86_64-linux/CORE -fno-strict-aliasing -pipe -Wdeclaration-after-statement -I/usr/local/include -I/usr/include/gdbm -DMOD_PERL_VERSION="1.30" -DMOD_PERL_STRING_VERSION="mod_perl/1.30" -I/usr/local/apache/include -DMOD_PERL -DLINUX=22 -DHAVE_SET_DUMPABLE -I/usr/include/gdbm -DMOD_SSL=208128 -DUSE_HSREGEX -DEAPI -c Table.c && mv Table.o Table.lo
rm -f libperl.so
cc -shared -L/usr/local/lib -o libperl.so mod_perl.lo perlxsi.lo perl_config.lo perl_util.lo perlio.lo mod_perl_opmask.lo Apache.lo Constants.lo ModuleConfig.lo Log.lo URI.lo Util.lo Connection.lo Server.lo File.lo Table.lo -Wl,-E -L/usr/local/lib /usr/lib/perl5/5.8.8/x86_64-linux/auto/DynaLoader/DynaLoader.a -L/usr/lib/perl5/5.8.8/x86_64-linux/CORE -lperl -lnsl -ldl -lm -lcrypt -lutil -lc
/usr/bin/ld: /usr/lib/perl5/5.8.8/x86_64-linux/auto/DynaLoader/DynaLoader.a(DynaLoader.o): relocation R_X86_64_32 against `a local symbol' can not be used when making a shared object; recompile with -fPIC
/usr/lib/perl5/5.8.8/x86_64-linux/auto/DynaLoader/DynaLoader.a: could not read symbols: Bad value
collect2: ld returned 1 exit status
make[1]: *** [libperl.so] Error 1
make[1]: Leaving directory `/home/.cpan/build/mod_perl-1.30-bUyCBp/apaci'
make: *** [apxs_libperl] Error 2

View 2 Replies View Related

Changing User/group Disk Quota In LXadmin & CentOS4

Aug 7, 2007

LXadmin seem to have a preset disk quota limit to users/groups, even root!

So, how do I change these disk quota limits? There isn't an option in the LXadmin control panel either.

View 1 Replies View Related

How Can I Extract Certain File From Tar.gz

Apr 25, 2008

I have a huge backup file in tar.gz format.

now I need a file from this backup file,

for example I need extract only index.php located in homedir/public_html on tar.gz file.

View 8 Replies View Related

Mass Extract .tar Files

Sep 17, 2008

What command do I use to mass extract a bunch of .tar files? I have a directory with about 60+ .tar files that I want to extract at the same time instead of doing it one by one.

View 4 Replies View Related

Extract Domain Names From .txt File

Jan 9, 2008

a command to extract the domain names from the following .txt file.

sss.com 59 01/09/2008 13:45
edd.com 59 01/09/2008 13:45

i want to extact the domains sss.com and edd.com in another txt file.

View 7 Replies View Related

Plesk And Mailman -- How To Extract Subscribers

Apr 3, 2007

I used to have a server under Plesk. I don't have the server anymore, but I kept all the files from the server (not a plesk dump). Where do I find the subscribers database and how can I extract it?

View 0 Replies View Related

Extract IP Addresses From Apache Logs

Sep 18, 2007

How can I extract a list of visitor ip addresses from apache logs for a cpanel account?

are there any tools that will do a whois lookup for all the IP's?

View 2 Replies View Related

Website That Can Be Seen In A Part Of World But Not The Other

May 28, 2009

I have a website that can be seen in a part of the world but not on the other. How can I troubleshoot this issue. Is there a web utility that can help me figure out what is the problem?

View 1 Replies View Related

My Thoughts About Hacking... [Part 1]

Jul 8, 2008

Is security really that critical? If so, why are some of the largest software companies providing such a bad example for the rest of the industry? Why would someone want to target my website? Why is security often overlooked?

These are all common questions that arise on a daily basis within the online industry.

The rest of this article will provide some detailed answers, along with practical examples and true scenarios.

I've spoken with numerous hackers over the past short while. I can't count the number of times I've heard the line "Ignorant site owners deserve to be hacked". In my opinion, that's like claiming that cars without alarms deserve to be stolen, or homes without alarm systems deserve to be burglarized. It's not just wrong - it's illegal.

Security risks and vulnerabilities affect the entire online industry. When a single website is hacked, there are usually multiple other victims. This is most commonly seen with widely distributed software. A potential attacker has the ability to install the software on a test environment, locate the vulnerabilities, then attack random victims even before anyone else is aware of the potential exploits. Once a vulnerability is located, the attacker simply needs to search for other environments using the same software, and within minutes there are hundreds, often thousands of potential victims.

Typically, in the race to market, software providers are encouraged to release their products as soon as the applications are usable. Critical development procedures are often overlooked or intentionally bypassed. One such miss is an application vulnerability assessment. Although the product may be usable, the effects of a vulnerable application could be severe.

Sadly, nobody is "off limits" when it comes to hacking. Most hackers feel safe committing online crime, since the online industry has evolved much faster than the security industry. Many applications are not created with the intent to recognize hacking attempts. Some hackers view their actions as a competition - Who can attack the most valuable website? Who can exploit the most user databases? In many cases, these attacks are bragged about within the hacker's immediate network. The competitive nature of these hacking groups has become so severe, there have been reports of attacks between competing organizations.

You might ask, "If I use industry standards, won't my environment be secure?". The short answer: no, but it helps. Hackers are not restricted by industry standards. Most security companies only implement new standards once at least one victim is reported. This often gives hackers plenty of time to locate other vulnerable environments, and before long, the number of victims can increase rapidly. Hackers are some of the most innovative individuals within the online industry. The most logical way to combat them is to use similar methodology for security purposes.

View 2 Replies View Related

Dotable Now Part Of UK2Group

Oct 1, 2008

One of the most reliable & dependable webhosts around: Aussie Bob's Dotable is now a part of the UK2Group.

Read announcement:
[url]

The new plans unfortunately resemble that of a typical overselling host.

View 14 Replies View Related

Part-time Sysadmin

Jun 4, 2007

I am having trouble finding a good sysadmin for my needs. Has anyone else been in a similar situation? Does anyone have any advice on how to find somebody like this?

SITUATION:
I am having trouble finding a reliable RH sysadmin. I have a handful of clustered HA setups for customers (6+ servers & load-balancers) and a number of single-server dedicated hosting customers. I do a lot of the work myself. The additional sysadmin usually only has a small amount of actual worked hours per month, dependent on new installs. But, they need to be reliable, available, and familiar with the complexities of the setups.

From what I have seen, some sort of server management company wouldn't be able to be familiar with the setups well enough to not regularly make errors or modify setups correctly due to the amount of clients they have.

View 14 Replies View Related

Should /home Be Its Own Partition When Using R1soft, Or Can It Be Part Of /

Aug 7, 2008

Should/home be its own partition when using r1soft, or can it be part of/?

View 7 Replies View Related

A Server Part Of A DNS Cluster Is Not Synchronizing

Jun 16, 2008

I have a small dns cluster with 4 servers, the problem is that when i want to update a dns registry one of them doesnt sync, i have to try like 6 or 8 times to get that server to sync with all the others, and im concern because the one who gets trouble to sync is my secondary dns server

View 2 Replies View Related

Is Bandwidth The Expensive Part Of Video Sites

Mar 3, 2009

Is bandwidth going to be my most expensive cost if I open up a video hosting site? Is there a inexpensive alternative? Is there an inexpensive web host with low cost bandwidth allocation?

View 9 Replies View Related

How To Prevent Spoofing From Postfix/local Part

Apr 29, 2009

I have similar problem that explained [url]

The detail of my problem is below:

Some people sent spoofing mails from our mail users sent to our user from Postfix/local that is listed in maillog like below:

Apr 29 16:57:02 ns1 postfix/local[3075]: EC2153565E3: to=<user-mydomain.com@ns1.mydns.com>, orig_to=<user@mydomain.com>, relay=local, delay=486, status=sent (delivered to command: /usr/bin/procmail-wrapper -o -a $DOMAIN -d $LOGNAME)

Bu i do not know how to prevent this people not to use my Postfix/local delivery part. How can i prevent this attack?

When i connect to my mail server to sent or receive my mail it look like
Apr 29 17:25:28 ns1 dovecot: pop3-login: Login: user=<user@mydomain.com>, method=PLAIN, rip=***.***.***.***, lip=***.***.***.***
....
Apr 29 17:25:55 ns1 dovecot: POP3(user@mydomain.com): Disconnected: Logged out top=0/0, retr=0/0, del=0/0, size=0....

But the attackers connect directly like below:

Apr 29 17:29:59 ns1 postfix/local[2456]: 3192E357FD9: to=<user-mydomain.com@ns1.mydns.com>, orig_to=<user@mydomain.com>, relay=local, delay=261, status=sent (delivered to command: /usr/bin/procmail-wrapper -o -a $DOMAIN -d $LOGNAME)
....
Apr 29 17:29:59 ns1 postfix/qmgr[2218]: 3192E357FD9: removed

How can the spammer connect to Postfix/local part? My mail server not open relay. i test it from internet.

View 2 Replies View Related

VolumeDrive Review Part 1 - Good Start

May 6, 2009

A few people have asked me to give feedback on my experience with VolumeDrive so I decided I will be posting a 3 part review on them:

Part 1 - initial impressions
Part 2 - three month review
Part 3 - one year review (hopefully)

-------------
When I first got in contact with VD, contact was slow: about an email a day. It was very annoying to say the least. However when VD realized that I was genuinely interested in purchasing a server, and not just a window shopper, contact was more frequent and acceptable.

After looking around and comparing, I ended up ordering the following server from VD for a whopping $105 per month:

Q6600
4 GB DDR2 800 RAM
500 GB HDD
10 Mbps dedicated unmetered
5 IP addresses
Plesk 30 domain
Full managed services

Well just at face value, I don't think anyone will argue with me when I say you cannot beat the price. Where else will you find that kind of server w/ full management for $105 a month?

In the ordering process there were a few forgivable annoyances:
1) VD does not have any sort of automated, order online system for their "good" deals. I had to order via email and manually pay from PayPal. I was, however, emailed an invoice confirming my purchase after I paid.

2) It took VD 2 hours to send me my order request after I said "I am ready to purchase". Now it was late at night, so they probably only had a skeleton staff on hand, so this is understandable; however this point is sort of related to the lack of an automated system point mentioned above.

So after I paid and all, I was told they were building me a new server and it would take 3 business days to arrive. I was bummed out upon hearing this but this was understandable and justifiable - if they don't have the parts on hand, they don't have the parts, no big deal. I did appreciate the fact that they were honest with me upfront instead of trying to con me into giving me a different server (like I have been hearing stories about with other hosts).

So I waited. I was told my server would be setup on Tuesday afternoon and it was. The actual time between order and setup was about 5 and a half days: 3 days for the parts to arrive + Saturday + Sunday + time to build the server.

On Tuesday I was informed that my server has a Q8200 instead of a Q6600. To me this was not a big deal so I didn't object but if you are going to order from VD and you want one specific CPU I would be very clear with them that you won't accept any alternative. What did make me chuckle, however, is the fact that I was told "I received a free upgrade" to Q8200. It made me chuckle because I don't consider it a "free upgrade" when I was offered a choice between the Q6600 and a Q8200 for the same price during the ordering process. However, as I already said, a Q6600 or Q8200 - it does not matter to me: both are very similar in performance anyway.

So since I got my server I have been busy setting it up so VD can secure it after I am finished migrating my website (which by the way they just did - I just got an email ).

During that time I have emailed VD a fair amount of times, sometimes asking for clarification and sometimes asking for assistance with a problem, and they have responded back in a more than acceptable time frame and manner.

The only one major problem I have had so far is that initially, and by initially I mean first ~12 hours, it seems the connection to my server was not all the best. Randomly pages would take a while to load; I was curious as to why this was happening so I did some pinging and saw packets were being lost sometimes. This problem seems to have been auto-corrected itself now and I am did email VD about it; hopefully if it happens again we can get it perma-fixed.

Final verdict: people say "you get what you pay for". I say "I got more than I paid for". Hope it continues this way.

View 14 Replies View Related

Crissic - Inexperienced And Careless Web Host: Part II

Nov 3, 2008

Today I'm back to encourage you to stay away from Crissic: I know the prices are tempting, but know that you will have no one on your side when a problem comes up. I finally closed my account with them after numerous major issues with my VPS.

I've had a simultaneous account with Slicehost for the past few months, just to see if paying the extra buck is worth while. Now I know it absolutely is. I'm paying double the price for half the resources with Slicehost, but their service is amazing and reliable, their support is stellar, and peace of mind that the server will stay up and running without load issues, memory or drive failures is worth every penny. The point of this post is not Slicehost though, back to Crissic.

When I signed up for Crissic, I knew that it was a relatively new web hosting startup, but I had no idea it was a one-man show. Yes it's probably possible for a single guy to run a small web hosting company--the problem, particularly in the case of Skylar, is that when something is beyond him, it isn't getting fixed.

A recent support incident occurred where I was suddenly unable to access my VPS via SSH or the console. I contacted support, here are some of his responses to my status inquiries: ....

View 8 Replies View Related

Offering Hosting As Part Of A Web Design Contract

Dec 24, 2007

Are there any web designers/developers who offer hosting to their clients as part of their website creation package. I am toying with the idea of only creating websites for people who host with me. I currently have a colo server, but only use it for personal things. So I have no experience with the needs and demands of clients in regards to hosting. What are some of your experiences with hosting for clients? Is it worth it?

View 15 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved