Plesk panel: available applications
Home » Plesk panel: available applications

Plesk panel: available applications
On the web there are many open source applications that allow you to manage the most various situations. It is common practice for these applications to be available for installation from your hosting control panel. The Plesk panel makes no exceptions. So let’s see what are the main applications available for installation.
How to install applications from the Plesk panel
Installing the apps from the Plesk panel is very simple. First of all it is necessary to click on the Applications menu, then select the All Available Applications tab, and finally choose the sector of the application you want to use.
The choice can be complicated, especially due to the large amount of applications available. Let’s see the most important ones together.
WordPress
WordPress is a cutting-edge semantic platform for personal publishing, with particular attention to aesthetics, web standards and usability.
WordPress is free and invaluable at the same time. More simply: it is what you use when you want to collaborate with a blogging software and not fight for any changes to be made. With WordPress you can create any type of website: a blog or personal website, a company portal, a professional portfolio, a government website, a magazine or an online newspaper.
WordPress allows you to make the site beautiful and captivating with themes and also extend its functionality with plugins. Being open source, it is also possible to integrate your own themes and plugins. Among the applications available in the Plesk panel, this is probably the most famous.
Joomla!
Joomla! is a powerful open source content management system. It is used for the management of simple websites or complex business applications. The well-known competitor of WordPress could not miss in the Plesk panel.
It is easy to install, simple to manage and reliable. Once Joomla! is up and running, even non-technical users can easily add or edit content, update images and manage critical data. Anyone with basic word processing skills can easily learn how to manage a Joomla!
SugarCRM
SugarCRM allows companies to efficiently organize, populate and maintain information on all aspects of customer relationships.
It provides integrated management of corporate information on customer accounts and contacts, sales leads and opportunities, as well as activities such as calls, meetings and assigned tasks. The system seamlessly merges all the features needed to manage information on many aspects of your business in an intuitive and easy-to-use graphical interface.
BBclone
BBclone is a web counter written in PHP. It looks similar to Webstats, but it’s not just a counter. BBClone provides a detailed view of website visitors. It does this by showing specific visitor data, such as IP, browser and so on, not just showing a total visitor count.
This is very useful for webmasters of low to medium traffic websites who want to see who visits their sites, which browsers they use, where they come from, etc.
Please note that BBclone is not useful for high traffic websites where you only need agreed data.
Prestashop
In the Plesk panel, the Open-Source software n. 1 in Europe for e-commerce. More than 275,000 members of the community are already experimenting with the ease of use and management of this innovative solution, for a profitable e-commerce business.
Prestashop has had numerous outstanding achievements and developments over the years. The application provides modules, themes and services that will allow you to customize and implement the e-commerce site according to specific needs.
The products offered on PrestaShop Addons are developed by PrestaShop and its community of developers.
MediaWiki
The Plesk panel also satisfies those who want to open a community. Through applications such as MediaWiki, it is possible to create virtual places for interaction and dissemination of notions.
MediaWiki is used by companies as an internal solution for knowledge management and as a content management system. It is written in PHP and can use both the MySQL and PostgreSQL relational database management systems. MediaWiki supports more than 70 languages; it is scalable and customizable.
With this application it is really possible to create repositories for the knowledge of a specific niche, for example, or for the customers of your company. Wouldn’t it be great to have a place where customers can find all the documentation of the products on sale?
Conclusions
Buying a hosting service, such as that offered by SOD, is only the first step in designing and offering quality content to the public. The next steps are the choice of the type of application and the implementation of the contents themselves. As we have seen in this article, the choice offered by the Plesk panel of our hosting is truly remarkable, and I have listed only the most famous. You can also find applications for customer support and online forum management.
All great opportunities for development, they are simple to install and easy to manage thanks to the Plesk control panel.
Useful links:
Share
RSS
More Articles…
- The SOAR benefits: simplifying investigation and response
- Security Code Review: How the service works
- Integration of the automated response: the automations in SOCaaS
- Coordination between CTI and SOC: how to further raise the defenses
- New Cloud Server: redundant internet
- Quality certificate for the SOCaaS of SOD
- Managed Detection and Response: a new preventive approach
- CLUSIT: our collaboration for better services
Categories …
- Backup as a Service (17)
- Acronis Cloud Backup (11)
- Veeam Cloud Connect (4)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (22)
- Conferenza Cloud (4)
- ICT Monitoring (5)
- Log Management (2)
- News (21)
- ownCloud (4)
- Privacy (7)
- Secure Online Desktop (14)
- Security (170)
- Cyber Threat Intelligence (CTI) (6)
- Ethical Phishing (8)
- Penetration Test (5)
- SOCaaS (55)
- Vulnerabilities (84)
- Web Hosting (15)
Tags
Dark Reading
- How CISOs Can Work With the CFO to Get the Best Security Budget March 17, 2023CISOs can and should push back when they're presented with budget costs that affect the business. Here's how.
- Microsoft Azure Warns on Killnet's Growing DDoS Onslaught Against Healthcare March 17, 2023DDoS cyberattack campaigns from the pro-Russian group have spiked significantly.
- Prancer Announces Integration With ChatGPT for Enhanced Security Assessments March 17, 2023
- Microsoft Outlook Vulnerability Could Be 2023's 'It' Bug March 17, 2023Snowballing PoC exploits for CVE-2023-23397 and a massive attack surface means almost business user could be a victim.
- Technology Firms Delivering Much-Sought Encryption-in-Use March 17, 2023If the approaches stand up to scrutiny, companies may soon be able to encrypt most databases in a way that allows using data without needing to decrypt to plaintext.
- Low-Budget 'Winter Vivern' APT Awakens After 2-Year Hibernation March 17, 2023The "underreported" APT has returned to focus after attacks promoting Russian and Belarusian government interests and going after targets with humor, zest, and scrappiness.
- The Ethics of Network and Security Monitoring March 17, 2023The chances of getting hacked are no longer low. Companies need to rethink their data collection and monitoring strategies to protect employee privacy and corporate integrity.
- Meta Proposes Revamped Approach to Online Kill Chain Frameworks March 17, 2023A more holistic model beyond MITRE et al is needed to help defenders better identify and understand commonalities in different online threat campaigns, the Facebook parent company says.
- Leveraging Behavioral Analysis to Catch Living-Off-the-Land Attacks March 16, 2023Attackers are increasingly staying under the radar by using your own tools against you. Only behavioral AI can catch these stealthy attacks.
- $3B Crypto-Mixer Money Laundering Operation Seized by Cops March 16, 2023The 'ChipMixer' cryptocurrency service for cybercriminals was shut down by law enforcement, and its alleged operator has been charged.
Full Disclosure
- Defense in depth -- the Microsoft way (part 83): instead to fix even their most stupid mistaskes, they spill barrels of snakeoil to cover them (or just leave them as-is) March 17, 2023Posted by Stefan Kanthak on Mar 16Hi @ll, with Windows 2000, Microsoft virtualised the [HKEY_CLASSES_ROOT] registry branch: what was just an alias for [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] before became the overlay of [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] and [HKEY_CURRENT_USER\Software\Classes] with the latter having precedence: Note: while [HKEY_LOCAL_MACHINE\SOFTWARE\Classes] is writable only by...
- [CFP] Security BSides Ljubljana 0x7E7 | June 16, 2023 March 17, 2023Posted by Andraz Sraka on Mar 16MMMMMMMMMMMMMMMMNmddmNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMN..-..--+MMNy:...-.-/yNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MMy..ymd-.:Mm::-:osyo-..-mMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM MM:..---.:dM/..+NNyyMN/..:MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM Mm../dds.-oy.-.dMh--mMds++MMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM My:::::/ydMmo..-hMMMmo//omMs/+Mm+++++shNMN+//+//+oMNy+///ohM MMMs//yMNo+hMh---m:-:hy+sMN..+Mo..os+.-:Ny--ossssdN-.:yyo+mM...
- Full Disclosure - Fastly March 12, 2023Posted by Andrey Stoykov on Mar 11Correspondence from Fastly declined to comment regarding new discovered vulnerabilities within their website. Poor practices regarding password changes. 1. Reset user password 2. Access link sent 3. Temporary password sent plaintext // HTTP POST request POST /user/mwebsec%40gmail.com/password/request_reset HTTP/2 Host: api.fastly.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 […]
- Full Disclosure - Shopify Application March 12, 2023Posted by Andrey Stoykov on Mar 11Correspondence from Shopify declined to comment regarding new discovered vulnerabilities within their website. Although 'frontend' vulnerabilities are considered out of scope, person/tester foundhimself a beefy bugbounty from the same page that has been listed below, including similar functionality that has not been tested yet. Two emails and several reports, […]
- [CVE-2023-25355/25356] No fix available - vulnerabilities in CoreDial sipXcom sipXopenfire March 7, 2023Posted by Systems Research Group via Fulldisclosure on Mar 06
- SEC Consult SA-20230306-0 :: Multiple Vulnerabilities in Arris DG3450 Cable Gateway March 7, 2023Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Mar 06SEC Consult Vulnerability Lab Security Advisory < 20230306-0 > ======================================================================= title: Multiple Vulnerabilities product: Arris DG3450 Cable Gateway vulnerable version: AR01.02.056.18_041520_711.NCS.10 fixed version: - CVE number: CVE-2023-27571, CVE-2023-27572 impact: medium homepage: https://www.commscope.com...
- OpenBSD overflow March 7, 2023Posted by Erg Noor on Mar 06Hi, Fun OpenBSD bug. ip_dooptions() will allow IPOPT_SSRR with optlen = 2. save_rte() will set isr_nhops to very large value, which will cause overflow in next ip_srcroute() call. More info is here https://github.com/fuzzingrf/openbsd_tcpip_overflow/ -erg
- SEC Consult SA-20230228-0 :: OS Command Injectionin Barracuda CloudGen WAN March 3, 2023Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Mar 02SEC Consult Vulnerability Lab Security Advisory < 20230228-0 > ======================================================================= title: OS Command Injection product: Barracuda CloudGen WAN vulnerable version: < v8.* hotfix 1089 fixed version: v8.* with hotfix webui-sdwan-1089-8.3.1-174141891 or above version 9.0.0 or above CVE number: CVE-2023-26213...
- SRP on Windows 11 March 3, 2023Posted by Andy Ful on Mar 02The correction to: Full Disclosure: Defense in depth -- the Microsoft way (part 82): INVALID/BOGUS AppLocker rules disable SAFER on Windows 11 22H2 (seclists.org) The Kanthak correction to restore SRP functionality on Windows 11 ver. 22H2, works only when Smart App Control is OFF. If it is in Evaluate […]
- NetBSD overflow March 3, 2023Posted by Erg Noor on Mar 02Hi, Trivial overflow in hfslib_reada_node_offset, while loop has no range checks. |size_t hfslib_reada_node_offsets(void* in_bytes, uint16_t* out_offset_array) { void* ptr; if (in_bytes == NULL || out_offset_array == NULL) return 0; ptr = in_bytes; out_offset_array--; do { out_offset_array++; *out_offset_array = be16tohp(&ptr); } while (*out_offset_array != (uint16_t)14); return ((uint8_t*)ptr - (uint8_t*)in_bytes); }| […]
Customers
Twitter FEED
Recent activity
-
SecureOnlineDesktop
Estimated reading time: 6 minutes L'impatto crescente delle minacce informatiche, su sistemi operativi privati op… https://t.co/FimxTS4o9G
-
SecureOnlineDesktop
Estimated reading time: 6 minutes The growing impact of cyber threats, on private or corporate operating systems… https://t.co/y6G6RYA9n1
-
SecureOnlineDesktop
Tempo di lettura stimato: 6 minuti Today we are talking about the CTI update of our services. Data security is… https://t.co/YAZkn7iFqa
-
SecureOnlineDesktop
Estimated reading time: 6 minutes Il tema della sicurezza delle informazioni è di grande attualità in questo peri… https://t.co/tfve5Kzr09
-
SecureOnlineDesktop
Estimated reading time: 6 minutes The issue of information security is very topical in this historical period ch… https://t.co/TP8gvdRcrF
Newsletter
Products and Solutions
News
- The SOAR benefits: simplifying investigation and response April 18, 2022
- Security Code Review: How the service works April 13, 2022
- Integration of the automated response: the automations in SOCaaS April 11, 2022
- Coordination between CTI and SOC: how to further raise the defenses April 6, 2022
- New Cloud Server: redundant internet March 23, 2022
Google Reviews























Copyright © 2011 Secure Online Desktop s.r.l. All Rights Reserved.
VAT: 07485920966 “Cloud Computing services - Software cloud - Cloud server - VPS” Terms of ServicePrivacy Policy
ISO Certifications