This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

This Is A Custom Widget

This Sliding Bar can be switched on or off in theme options, and can take any widget you throw at it or even fill it with your custom HTML Code. Its perfect for grabbing the attention of your viewers. Choose between 1, 2, 3 or 4 columns, set the background color, widget divider color, activate transparency, a top border or fully disable it on desktop and mobile.

Webservers

/Tag:Webservers

How to enable mod_info in Apache ?

By | May 2nd, 2013|Apache, WebServers|

Navigate to <Some location>Apache2.2conf folder and Open httpd.conf file Find the module mod_info.so and remove the comment. For example: Add following code in httpd.conf file. # Allow remote server configuration reports, with the URL of # http://servername/server-info <Location /server-info>     SetHandler server-info     Order deny, allow     Deny from all     Allow from 127.0.0.1 </Location> Restart the [...]

Enabling CPU Monitoring in IIS 6.0

By | September 3rd, 2012|Microsoft IIS, WebServers|

The CPU monitoring feature monitors and automatically shuts down worker processes that consume large amounts of CPU time. CPU monitoring is enabled for individual application pools. Before enabling CPU monitoring, take note of the following: •           IIS must be operating in Worker Worker Process Isolation Mode.  •           CPU monitoring is available only for application pools. [...]

How to use User Authentication for Apache

By | September 2nd, 2012|Apache, WebServers|

Using User Authentication There are two ways of restricting access to documents: either by the hostname of the browser being used, or by asking for a username and password. The former can be used to, for example, restrict documents to use within a company. However if the people who are allowed to access the documents [...]