Plesk panel: available applications
Home » Plesk panel: available applications
Plesk panel: available applications
On the web there are many open source applications that allow you to manage the most various situations. It is common practice for these applications to be available for installation from your hosting control panel. The Plesk panel makes no exceptions. So let’s see what are the main applications available for installation.
How to install applications from the Plesk panel
Installing the apps from the Plesk panel is very simple. First of all it is necessary to click on the Applications menu, then select the All Available Applications tab, and finally choose the sector of the application you want to use.
The choice can be complicated, especially due to the large amount of applications available. Let’s see the most important ones together.
WordPress
WordPress is a cutting-edge semantic platform for personal publishing, with particular attention to aesthetics, web standards and usability.
WordPress is free and invaluable at the same time. More simply: it is what you use when you want to collaborate with a blogging software and not fight for any changes to be made. With WordPress you can create any type of website: a blog or personal website, a company portal, a professional portfolio, a government website, a magazine or an online newspaper.
WordPress allows you to make the site beautiful and captivating with themes and also extend its functionality with plugins. Being open source, it is also possible to integrate your own themes and plugins. Among the applications available in the Plesk panel, this is probably the most famous.
Joomla!
Joomla! is a powerful open source content management system. It is used for the management of simple websites or complex business applications. The well-known competitor of WordPress could not miss in the Plesk panel.
It is easy to install, simple to manage and reliable. Once Joomla! is up and running, even non-technical users can easily add or edit content, update images and manage critical data. Anyone with basic word processing skills can easily learn how to manage a Joomla!
SugarCRM
SugarCRM allows companies to efficiently organize, populate and maintain information on all aspects of customer relationships.
It provides integrated management of corporate information on customer accounts and contacts, sales leads and opportunities, as well as activities such as calls, meetings and assigned tasks. The system seamlessly merges all the features needed to manage information on many aspects of your business in an intuitive and easy-to-use graphical interface.
BBclone
BBclone is a web counter written in PHP. It looks similar to Webstats, but it’s not just a counter. BBClone provides a detailed view of website visitors. It does this by showing specific visitor data, such as IP, browser and so on, not just showing a total visitor count.
This is very useful for webmasters of low to medium traffic websites who want to see who visits their sites, which browsers they use, where they come from, etc.
Please note that BBclone is not useful for high traffic websites where you only need agreed data.
Prestashop
In the Plesk panel, the Open-Source software n. 1 in Europe for e-commerce. More than 275,000 members of the community are already experimenting with the ease of use and management of this innovative solution, for a profitable e-commerce business.
Prestashop has had numerous outstanding achievements and developments over the years. The application provides modules, themes and services that will allow you to customize and implement the e-commerce site according to specific needs.
The products offered on PrestaShop Addons are developed by PrestaShop and its community of developers.
MediaWiki
The Plesk panel also satisfies those who want to open a community. Through applications such as MediaWiki, it is possible to create virtual places for interaction and dissemination of notions.
MediaWiki is used by companies as an internal solution for knowledge management and as a content management system. It is written in PHP and can use both the MySQL and PostgreSQL relational database management systems. MediaWiki supports more than 70 languages; it is scalable and customizable.
With this application it is really possible to create repositories for the knowledge of a specific niche, for example, or for the customers of your company. Wouldn’t it be great to have a place where customers can find all the documentation of the products on sale?
Conclusions
Buying a hosting service, such as that offered by SOD, is only the first step in designing and offering quality content to the public. The next steps are the choice of the type of application and the implementation of the contents themselves. As we have seen in this article, the choice offered by the Plesk panel of our hosting is truly remarkable, and I have listed only the most famous. You can also find applications for customer support and online forum management.
All great opportunities for development, they are simple to install and easy to manage thanks to the Plesk control panel.
Useful links:
Share
RSS
More Articles…
- NIS: what it is and how it protects cybersecurity
- Advanced persistent threats (APTs): what they are and how to defend yourself
- Penetration Testing and MFA: A Dual Strategy to Maximize Security
- Penetration Testing: Where to Strike to Protect Your IT Network
- Ransomware: a plague that brings companies and institutions to their knees. Should you pay the ransom? Here is the answer.
- Why IT audit and log management are important for Cybersecurity
- Red Team, Blue Team and Purple Team: what are the differences?
- Mercedes’ Oversight Puts Company Secrets at Risk: Why Cyber Threat Intelligence is Critical
Categories …
- Backup as a Service (18)
- Acronis Cloud Backup (11)
- Veeam Cloud Connect (4)
- Cloud Conference (3)
- Cloud CRM (1)
- Cloud Server/VPS (22)
- Conferenza Cloud (4)
- ICT Monitoring (5)
- Log Management (2)
- News (24)
- ownCloud (4)
- Privacy (7)
- Secure Online Desktop (14)
- Security (203)
- Cyber Threat Intelligence (CTI) (8)
- Deception (4)
- Ethical Phishing (11)
- Netwrix Auditor (2)
- Penetration Test (11)
- Posture Guard (3)
- SOCaaS (65)
- Vulnerabilities (84)
- Web Hosting (15)
Tags
darkreading
- Digital Blitzkrieg: Unveiling Cyber-Logistics Warfare April 25, 2024Cyberattacks on logistics are becoming increasingly common, and the potential impact is enormous.
- Cisco Zero-Days Anchor 'ArcaneDoor' Cyber Espionage Campaign April 25, 2024Attacks by a previously unknown threat actor leveraged two bugs in firewall devices to install custom backdoors on several government networks globally.
- SolarWinds 2024: Where Do Cyber Disclosures Go From Here? April 25, 2024Get updated advice on how, when, and where we should disclose cybersecurity incidents under the SEC's four-day rule after SolarWinds, and join the call to revamp the rule to remediate first.
- KnowBe4 to Acquire Egress April 24, 2024
- Black Girls Do Engineer Signs Education Partnership Agreement With NSA April 24, 2024
- Attacker Social-Engineered Backdoor Code Into XZ Utils April 24, 2024Unlike the SolarWinds and CodeCov incidents, all that it took for an adversary to nearly pull off a massive supply chain attack was some slick social engineering and a string of pressure emails.
- Lights On in Leicester: Streetlights in Disarray After Cyberattack April 24, 2024The city is stymied in efforts to pinpoint the issue since its IT systems were shut down in the wake of the cyberattack.
- North Korea APT Triumvirate Spied on South Korean Defense Industry For Years April 24, 2024Lazarus, Kimsuky, and Andariel all got in on the action, stealing "important" data from firms responsible for defending their southern neighbors (from them).
- Iran Dupes US Military Contractors, Gov't Agencies in Years-Long Cyber Campaign April 24, 2024A state-sponsored hacking team employed a clever masquerade and elaborate back-end infrastructure as part of a five-year info-stealing campaign that compromised the US State and Treasury Departments, and hundreds of thousands of accounts overall.
- 2023: A 'Good' Year for OT Cyberattacks April 24, 2024Attacks increased by "only" 19% last year. But that number is expected to grow significently.
Full Disclosure
- Defense in depth -- the Microsoft way (part 87): shipping more rotten software to billions of unsuspecting customers April 24, 2024Posted by Stefan Kanthak on Apr 24Hi @ll, this post is a continuation of and With the release of .NET Framework 4.8 in April 2019, Microsoft updated the following paragraph of the MSDN article "What's new in .NET Framework" | Starting with .NET Framework 4.5, the clrcompression.dll assembly...
- Response to CVE-2023-26756 - Revive Adserver April 24, 2024Posted by Matteo Beccati on Apr 24CVE-2023-26756 has been recently filed against the Revive Adserver project. The action was taken without first contacting us, and it did not follow the security process that is thoroughly documented on our website. The project team has been given no notice before or after the disclosure. Our team has […]
- BACKDOOR.WIN32.DUMADOR.C / Remote Stack Buffer Overflow (SEH) April 19, 2024Posted by malvuln on Apr 19Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/6cc630843cabf23621375830df474bc5.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Dumador.c Vulnerability: Remote Stack Buffer Overflow (SEH) Description: The malware runs an FTP server on TCP port 10000. Third-party adversaries who can reach the server can send a specially […]
- SEC Consult SA-20240418-0 :: Broken authorization in Dreamehome app April 19, 2024Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 19SEC Consult Vulnerability Lab Security Advisory < 20240418-0 > ======================================================================= title: Broken authorization product: Dreamehome app vulnerable version:
- MindManager 23 - full disclosure April 19, 2024Posted by Pawel Karwowski via Fulldisclosure on Apr 19Resending! Thank you for your efforts. GitHub - pawlokk/mindmanager-poc: public disclosure Affected application: MindManager23_setup.exe Platform: Windows Issue: Local Privilege Escalation via MSI installer Repair Mode (EXE hijacking race condition) Discovered and reported by: Pawel Karwowski and Julian Horoszkiewicz (Eviden Red Team) Proposed mitigation:...
- CVE-2024-31705 April 14, 2024Posted by V3locidad on Apr 14CVE ID: CVE-2024-31705 Title : RCE to Shell Commands" Plugin / GLPI Shell Command Management Interface Affected Product : GLPI - 10.X.X and last version Description: An issue in Infotel Conseil GLPI v.10.X.X and after allows a remote attacker to execute arbitrary code via the insufficient validation of user-supplied input. […]
- SEC Consult SA-20240411-0 :: Database Passwords in Server Response in Amazon AWS Glue April 14, 2024Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Apr 14SEC Consult Vulnerability Lab Security Advisory < 20240411-0 > ======================================================================= title: Database Passwords in Server Response product: Amazon AWS Glue vulnerable version: until 2024-02-23 fixed version: as of 2024-02-23 CVE number: - impact: medium homepage: https://aws.amazon.com/glue/ found:...
- [KIS-2024-03] Invision Community <= 4.7.16 (toolbar.php) Remote Code Execution Vulnerability April 11, 2024Posted by Egidio Romano on Apr 10------------------------------------------------------------------------------ Invision Community
- [KIS-2024-02] Invision Community <= 4.7.15 (store.php) SQL Injection Vulnerability April 11, 2024Posted by Egidio Romano on Apr 10-------------------------------------------------------------------- Invision Community
- Multiple Issues in concretecmsv9.2.7 April 11, 2024Posted by Andrey Stoykov on Apr 10# Exploit Title: Multiple Web Flaws in concretecmsv9.2.7 # Date: 4/2024 # Exploit Author: Andrey Stoykov # Version: 9.2.7 # Tested on: Ubuntu 22.04 # Blog: http://msecureltd.blogspot.com Verbose Error Message - Stack Trace: 1. Directly browse to edit profile page 2. Error should come up with verbose stack trace […]
Customers
Twitter FEED
Recent activity
-
SecureOnlineDesktop
Estimated reading time: 6 minutes L'impatto crescente delle minacce informatiche, su sistemi operativi privati op… https://t.co/FimxTS4o9G
-
SecureOnlineDesktop
Estimated reading time: 6 minutes The growing impact of cyber threats, on private or corporate operating systems… https://t.co/y6G6RYA9n1
-
SecureOnlineDesktop
Tempo di lettura stimato: 6 minuti Today we are talking about the CTI update of our services. Data security is… https://t.co/YAZkn7iFqa
-
SecureOnlineDesktop
Estimated reading time: 6 minutes Il tema della sicurezza delle informazioni è di grande attualità in questo peri… https://t.co/tfve5Kzr09
-
SecureOnlineDesktop
Estimated reading time: 6 minutes The issue of information security is very topical in this historical period ch… https://t.co/TP8gvdRcrF
Newsletter
{subscription_form_1}Products and Solutions
News
- NIS: what it is and how it protects cybersecurity April 22, 2024
- Advanced persistent threats (APTs): what they are and how to defend yourself April 17, 2024
- Penetration Testing and MFA: A Dual Strategy to Maximize Security April 15, 2024
- Penetration Testing: Where to Strike to Protect Your IT Network March 25, 2024
- Ransomware: a plague that brings companies and institutions to their knees. Should you pay the ransom? Here is the answer. March 6, 2024
Google Reviews
Ottima azienda, servizi molto utili, staff qualificato e competente. Raccomandata!read more
Ottimo supportoread more
E' un piacere poter collaborare con realtà di questo tiporead more
Un ottimo fornitore.
Io personalmente ho parlato con l' Ing. Venuti, valore aggiunto indubbiamente.read more
© 2023 Secure Online Desktop s.r.l. All Rights Reserved. Registered Office: via dell'Annunciata 27 – 20121 Milan (MI), Operational Office: via statuto 3 - 42121 Reggio Emilia (RE) – PEC [email protected] Tax code and VAT number 07485920966 – R.E.A. MI-1962358 Privacy Policy - ISO Certifications