Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature currently requires accessing the site using the built-in Safari browser.
If you are still using CentOS 7.9, it's time to convert to Alma 8 with the free centos2alma tool by Plesk or Plesk Migrator. Please let us know your experiences or concerns in this thread: CentOS2Alma discussion
The default rules, according to an email I received from AWS, is vulnerable to malicious actors. Plus, it looks wide open to me and I have not touched it.
Thanks! Looking for more of a "what/why" than a "how" type of explanation or pointer to some resources to learn.
More along the lines of this (from Smashing Mag Firewalls Intro article):
Hi all,
I am fairly new to Plesk.
My question is not how to configure the firewall rules but what (and why) firewall rules to configure. I have searched and searched and all I find is articles about the how but not the what/why.
I would really appreciate pointers to useful resources...
Hi Tom,
Also a fairly new Pleskian and I have a question similar to yours and default rules similar to yours. Did you ever get an answer anywhere?
- Scott