• Hi, Pleskians! We are running a UX testing of our upcoming product intended for server management and monitoring.
    We would like to invite you to have a call with us and have some fun checking our prototype. The agenda is pretty simple - we bring new design and some scenarios that you need to walk through and succeed. We will be watching and taking insights for further development of the design.
    If you would like to participate, please use this link to book a meeting. We will sent the link to the clickable prototype at the meeting.
  • Our UX team believes in the in the power of direct feedback and would like to invite you to participate in interviews, tests, and surveys.
    To stay in the loop and never miss an opportunity to share your thoughts, please subscribe to our UX research program. If you were previously part of the Plesk UX research program, please re-subscribe to continue receiving our invitations.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.

#security

  1. G

    Question if a wordpress website is hacked, can they damage my entire server?

    Hi everyone, as the title suggests, I have this great doubt .. but if a WordPress or prestashop site is hacked, etc., is the attack limited to the specific plesk account or can I suffer damage to my entire system? a thousand thanks
  2. A

    Question Plesk Security Investigator

    Hi, Is there anything akin to cPanel Security Investigator ( CSI ) which is available on the following URL for Plesk? - GitHub - CpanelInc/tech-CSI: cPanel Security Scan If not, can one be developed? As now cPanel and Plesk are under the same roof of WebPros, hence a collaboration on this tool...
  3. P

    Question How to let customers to choose passwords length?

    Hello everybody! I need to let customers to choose their passwords length. I think not only me. Is there a possibility to do it? (Plesk Obsidian at CentOS Linux 7.9.2009) The problem. When I stay at "Strong" level of Security Policy (8 characters), bruteforcers do their work well and one time...
Back
Top