Pannello Plesk Giacomo Lanzi

Plesk panel: available applications

On the web there are many open source applications that allow you to manage the most various situations. It is common practice for these applications to be available for installation from your hosting control panel. The Plesk panel makes no exceptions. So let’s see what are the main applications available for installation.

How to install applications from the Plesk panel

Installing the apps from the Plesk panel is very simple. First of all it is necessary to click on the Applications menu, then select the All Available Applications tab, and finally choose the sector of the application you want to use.

 

Plesk Installations Panel

The choice can be complicated, especially due to the large amount of applications available. Let’s see the most important ones together.

WordPress

WordPress is a cutting-edge semantic platform for personal publishing, with particular attention to aesthetics, web standards and usability.

WordPress is free and invaluable at the same time. More simply: it is what you use when you want to collaborate with a blogging software and not fight for any changes to be made. With WordPress you can create any type of website: a blog or personal website, a company portal, a professional portfolio, a government website, a magazine or an online newspaper.

WordPress allows you to make the site beautiful and captivating with themes and also extend its functionality with plugins. Being open source, it is also possible to integrate your own themes and plugins. Among the applications available in the Plesk panel, this is probably the most famous.

Joomla!

Joomla! is a powerful open source content management system. It is used for the management of simple websites or complex business applications. The well-known competitor of WordPress could not miss in the Plesk panel.

It is easy to install, simple to manage and reliable. Once Joomla! is up and running, even non-technical users can easily add or edit content, update images and manage critical data. Anyone with basic word processing skills can easily learn how to manage a Joomla!

SugarCRM

SugarCRM allows companies to efficiently organize, populate and maintain information on all aspects of customer relationships.

It provides integrated management of corporate information on customer accounts and contacts, sales leads and opportunities, as well as activities such as calls, meetings and assigned tasks. The system seamlessly merges all the features needed to manage information on many aspects of your business in an intuitive and easy-to-use graphical interface.

BBclone

BBclone is a web counter written in PHP. It looks similar to Webstats, but it’s not just a counter. BBClone provides a detailed view of website visitors. It does this by showing specific visitor data, such as IP, browser and so on, not just showing a total visitor count.

This is very useful for webmasters of low to medium traffic websites who want to see who visits their sites, which browsers they use, where they come from, etc.

Please note that BBclone is not useful for high traffic websites where you only need agreed data.

Prestashop

In the Plesk panel, the Open-Source software n. 1 in Europe for e-commerce. More than 275,000 members of the community are already experimenting with the ease of use and management of this innovative solution, for a profitable e-commerce business.

Prestashop has had numerous outstanding achievements and developments over the years. The application provides modules, themes and services that will allow you to customize and implement the e-commerce site according to specific needs.

The products offered on PrestaShop Addons are developed by PrestaShop and its community of developers.

MediaWiki

The Plesk panel also satisfies those who want to open a community. Through applications such as MediaWiki, it is possible to create virtual places for interaction and dissemination of notions.

MediaWiki is used by companies as an internal solution for knowledge management and as a content management system. It is written in PHP and can use both the MySQL and PostgreSQL relational database management systems. MediaWiki supports more than 70 languages; it is scalable and customizable.

With this application it is really possible to create repositories for the knowledge of a specific niche, for example, or for the customers of your company. Wouldn’t it be great to have a place where customers can find all the documentation of the products on sale?

Conclusions

Buying a hosting service, such as that offered by SOD, is only the first step in designing and offering quality content to the public. The next steps are the choice of the type of application and the implementation of the contents themselves. As we have seen in this article, the choice offered by the Plesk panel of our hosting is truly remarkable, and I have listed only the most famous. You can also find applications for customer support and online forum management.

All great opportunities for development, they are simple to install and easy to manage thanks to the Plesk control panel.

Useful links:

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading:

RSS Full Disclosure

  • Backdoor.Win32.Nbdd.bgz / Remote Stack Buffer Overflow July 27, 2021
    Posted by malvuln on Jul 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/6fab73bf104c6a9211b94f9559faa134.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Nbdd.bgz Vulnerability: Remote Stack Buffer Overflow Description: NetBot_Attacker VIP 5.9 on initial startup listens on port 8080 and on subsequent restarts port 80. Third-party attackers who can reach an infected system […]
  • Backdoor.Win32.Bifrose.acci / Local Stack Buffer Overflow July 27, 2021
    Posted by malvuln on Jul 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/611dbff0d68df777c6d6881e00440143.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Bifrose.acci Vulnerability: Local Stack Buffer Overflow Description: Bifrost doesn't properly validate the IP address when importing Bifrost settings (.set) files. The IP address offset is located after a NULL byte which […]
  • Backdoor.Win32.PsyRat.b / Remote Denial of Service July 27, 2021
    Posted by malvuln on Jul 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/5817183894cb513239f6aef28895130c_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.PsyRat.b Vulnerability: Remote Denial of Service Description: The PsyRAT 1.02 malware listens by default on TCP port 9863. Third-party attackers who can reach infected systems can send a specially crafted command […]
  • Backdoor.Win32.PsyRat.b / Unauthenticated Remote Command Execution July 27, 2021
    Posted by malvuln on Jul 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/5817183894cb513239f6aef28895130c.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.PsyRat.b Vulnerability: Unauthenticated Remote Command Execution Description: The PsyRAT 1.02 malware listens by default on TCP port 9863, but can be changed when building backdoor servers. Third-party attackers who can reach...
  • Backdoor.Win32.Agent.cu / Unauthenticated Remote Command Execution July 27, 2021
    Posted by malvuln on Jul 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ce1963d3fd6a8e1383aac40a1f1c4107_C.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Agent.cu Vulnerability: Unauthenticated Remote Command Execution Description: The malware listens on TCP ports 10426, 56185. Third-party attackers who can reach infected systems can execute commands made available by the backdoor....
  • Backdoor.Win32.Agent.cu / Port Bounce Scan (MITM) July 27, 2021
    Posted by malvuln on Jul 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ce1963d3fd6a8e1383aac40a1f1c4107_B.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Agent.cu Vulnerability: Port Bounce Scan (MITM) Description: The malware listens on TCP ports 10426, 56185, its FTP component accepts any username/password credentials. Third-party attackers who successfully logon can abuse the...
  • Backdoor.Win32.Agent.cu / Authentication Bypass RCE July 27, 2021
    Posted by malvuln on Jul 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ce1963d3fd6a8e1383aac40a1f1c4107.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Agent.cu Vulnerability: Authentication Bypass RCE Description: The malware listens on TCP ports 10426, 56185. Third-party attackers who can reach infected systems can logon using any username/password combination. Intruders may then...
  • Backdoor.Win32.Mazben.me / Unauthenticated Open Proxy July 27, 2021
    Posted by malvuln on Jul 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/6681d5e4b68abd21a14c704edf9e2ff5.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Mazben.me Vulnerability: Unauthenticated Open Proxy Description: The malware listens on random TCP ports like 3515, 7936, 3972. Third-party attackers who can connect to the infected system can relay requests from the […]
  • Backdoor.Win32.Hupigon.aaur / Unauthenticated Open Proxy July 27, 2021
    Posted by malvuln on Jul 26Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/16d598c01f7b391986c8c19eded005b1.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Hupigon.aaur Vulnerability: Unauthenticated Open Proxy Description: The malware listens on TCP port 8080. Third-party attackers who can connect to the infected system can relay requests from the original connection to the...
  • ATLASSIAN - CVE-2020-36239 - Jira Data Center and Jira Service Management Data Center July 27, 2021
    Posted by Atlassian on Jul 26This email refers to the advisory found at https://confluence.atlassian.com/adminjiraserver/jira-data-center-and-jira-service-management-data-center-security-advisory-2021-07-21-1063571388.html CVE ID: * CVE-2020-36239 Products: Jira Data Center, Jira Core Data Center, Jira Software Data Center, and Jira Service Management Data Center. Affected Versions - Jira Data Center, Jira Core Data Center, and Jira Software Data Center: 6.3.0

Customers

Newsletter