Access WHM/cPanel Without Root Password

The WHM/cPanel can be accessed without knowing the actual password if you have shell access to the server. This can be done by executing the command “whmapi1” via Linux shell terminal. If you have the shell access through SSH Keypair or using VPS nodes on the server, you can simply access the WHM panel without knowing the actual root password of the server.

I am going to explain the steps to create a session to access the WHM panel for root or any reseller accounts without a password.

This can be done by executing the “whmapi1” command via Linux Shell. WHM API 1 accesses the WHM interface’s features. You can make use of this API to administrate cPanel and WHM reseller accounts, perform server administration tasks and manage cPanel & WHM services.

Whmapi command to create a WHM root session from the command line.

By executing the following command you can create a temporary root WHM session:

# whmapi1 create_user_session user=root service=whostmgrd

The output will be as the following:
CT-xxxxxxxxx-bash-4.2# whmapi1 create_user_session user=root service=whostmgrd

cp_security_token: /cpsess3736615296
expires: ‘1519064107’
service: whostmgrd
session: root:GSs8CH3T4YhRuk4o:create_user_session,340efbb4413cee451a9f2d115a14760c
command: create_user_session
reason: Created session
result: 1
version: 1

This is a one-time-use session to access WHM panel. You can paste the WHM URL in the browser which would in turn bypass the need to enter a root password.

Create a WHM session for reseller account

# whmapi1 create_user_session user=USERNAME service=cpaneld

Replace USERNAME with the exact cPanel username.

This is a one-time-use session to access WHM/cPanel panel. The system destroys the temporary session after 15 minutes of inactivity.

Signs You’ve Outgrown Your Web Hosting Service

Choosing an appropriate web hosting service is a stepping stone to running a successful and a visitor engaging website. Regardless of the type of website you own, a great web hosting service is like the spine that supports and powers the core of your website. Depending upon the requirement, the right kind of web hosting service can provide your website an edge over the competing ones.

Talking about the existing websites which already employ web hosting services, there is always a time for making a change when the business has outgrown it’s existing online presence. During this time, your website will undergo a lot of change to meet this requirement.

What if your website needs to shift its gear to a new web host? How will you know? If you are new to blogging/ website making, how do you make sure that your website/blog stays relevant in the fast-paced online world?

In this blog post, we will be discussing the signs that determine if you need to change your web hosting plan or the web hosting provider, altogether

Business expansion

For obvious reasons, if your business is growing exponentially, your business website will have enhanced requirements as well. As you add newer features to your website in order to provide all kinds of targeted functionalities to your customers, there might be a need of change in your web host provider or the existing plan your website is being hosted on.

A very simple example: You recently started reseller services and now wish to do so through an E-Commerce website. Now, you might be required to move to a more secure web host so that sensitive data is not compromised.

Sudden gush of Traffic and a slow loading website

All website owners want to drive in user traffic to their websites so that they can rank well. However, a sudden surge will lead to a higher bounce rate and an incompetent web host might not be able to handle it well. If this becomes a case with your own website, you must take this as a sign.

That’s a red flag if your usually awesome website suddenly begins to load slowly. This is an indicator that your web host is overcrowded and there are just too many entities sharing the bandwidth and the hosting resources. In such a scenario, your visitors will withdraw themselves from your website and this is something that isn’t very favorable.

This is crucial because if your website takes more than 2-3 seconds to load, site abonnement percentage will spike. Hence, you wouldn’t want an inadequate web host service provider to ruin things for you and your valuable website.

Repetitive Downtime

Also, there are times when your website begins to stay unavailable to the requesting visitors frequently. This occurrence is known as Downtime of your website. This can send out the wrong message regarding the reputation of your online business or E-Commerce business. This is a glaring sign to help you understand that it is time to move to a new web host provider.

Security Concerns

Poor or incompetent web host services are an excellent way of compromising with your website’s security if you really want that to happen. Also, when your website requirement demands an even more secure host, it is better to invest more money and thought into moving to a better-secured provider. For example, if you are moving towards an E-Commerce setup, you will have to be more cautious before investing in a web hosting service. This is so because your website will now be handling sensitive consumer data that isn’t meant to be compromised.

Unsatisfactory customer support

Do you have to put up with a lot of waiting time over a call or an E-mail when you are trying to get things fixed? Do you mostly fix your host issues all by yourself? Has this become a regular drill? There, you said it. You need to move away from pesky and unprofessional web host providers to a new and reliable one so that your website can enjoy professional support assistance in need of critical times.


Choosing the right web host can be a tricky and confusing activity. There are just so many plans that promise so much, at the same time, yet claim to be light on the pocket. In a situation when your website requirements have grown, making this choice can get tougher. So, if you feel that you are now financially well assisted to invest in a better web hosting service that can serve your website right, you better make an informed decision so that you do not end up burning a hole in your pocket, for nothing.

Semantic Signs

If you feel like you can, you probably should move to a new host. If you feel that you need a complete control, don’t sit back and wait.

High Disk Usage with VIRTFS

We have heard a lot about VirtFS disk consumption issues while checking the disk usage in cPanel server. VirtFS in cPanel/WHM is used to allot a jailed shell environment for users who can access the server through SSH. This environment acts as a container for the user and will not allow the user to access other cPanel account’s home directories on the server. Unlike a normal shell, jailed shell environment has increased security and ability to run commands like crontab and passwd which are not allowed in the normal shell environment.

You can enable jail shell access to a cPanel user by logging into WHM and choose the Manage Shell Access option. The directory structure created when a user accesses jail shell is /home/virtfs/user.

The high disk usage issues with VirtFS commonly occurs when any cPanel user which has access to jail shell for his account logins to the shell and fails to properly log out from his session. Since the bind (virtual) mount for his directory are recreated and not properly released, you must not directly remove any files under this folder structure (/home/virtfs/user) because it is hard linked to actual server directory structure and removing these may cause serious issues to the server.

In order to resolve this issue, we must first release the mount point for that user and kill all jailshell processes related to that user. Make sure there are no jailshell processes or mount points for that particular user. Then we must unmount all the files related to that user. After verifying that all mount points for that user are released, we can remove the contents present in the virtfs folder for that user.

Kindly be cautious not to delete the virtfs folder contents since it is hardlinked to the system files and will result in the entire operating system to become unstable. You can always get in touch with the Supportpro team and our expert techs are available 24X7 to handle such tasks with zero data loss.

Mobile Clouds – The New Content Distribution Platform

Cloud Computing is a term that applies to applications and data storage that are delivered over the Internet, via wireless connection.

Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool.

Mobile Cloud Computing (MCC) can be integrated with the existing cloud system without requiring any additional costly infrastructure.


What is Mobile Cloud Computing?

Mobile cloud computing (MCC) in simple terms, refers to an infrastructure where both the data storage and processing happen outside the mobile device.



Why Mobile Cloud Computing?

Mobile devices face many resource challenges like battery life, bandwidth and storage. Here comes the role of Mobile Cloud Computing technology. It provides mobile users with data storage and processing services in clouds, thereby eliminating the need to have a powerful device configuration. Such a combination of cloud computing and mobile networks bring benefits for mobile users, network operators, as well as cloud providers. All the resource-intensive computing can be performed in the cloud.


MCC Architecture

  1. Mobile devices are connected to the mobile networks through base stations that establish and control the connections and functional interfaces between the networks and mobile devices.

      2. The requests from the mobile users and information are transmitted to the central processors that are connected to servers providing mobile network services.

      3. The requests from the subscribers are delivered to a cloud through the Internet.

      4. In the cloud, the requests are processed by the cloud controllers and deliver the mobile users with the corresponding cloud services.


Image result for mcc architecture


Applications of MCC

  • Mobile Commerce

           M-commerce allows business models for commerce using mobile devices.

           Eg: Mobile financial, mobile advertising, mobile shopping.


  • Mobile Learning

           M-learning combines e-learning and mobility.

           Improved communication quality between teachers and students.

           Enables learners to access remote learning resources.


  • Mobile Healthcare

          M-healthcare provides mobile users with convenient access to resources (eg. medical records).

          Another application is the access to health-aware mobile devices to detect pulse-rate, blood pressure, level of alcohol etc.

          Eg: Cloud Doctor


  • Mobile Gaming

           Can completely offload game engine requiring large computing resource to the servers in the cloud.

           Offloading aids in saving energy and increases game playing time.


  •  Other applications

            Sharing photos/videos, Smart home systems, keyword, voice and tag-based search capabilities.


MCC Issues

  • Limited Resources: The limited resources in mobile devices produces difficulties in implementing this technology. The basic limitations related to limited resources are limited computing power, limited battery and low quality display.
  • Network related issues: Network related problems like Bandwidth, latency, availability and heterogeneity since all the processing in MCC is performed on the network.
  • Security: The most common security issues are device security, privacy of mobile user and securing data on cloud,  security threats like viruses, hacking, Trojan horses etc. The use of global positioning system (GPS) in mobile devices gives birth to the privacy issues.
  • Low Bandwidth: As compared with the traditional wired networks, the radio resource for wireless networks is much scarce. A work-around would be to share the limited bandwidth among mobile users who are located in the same area (e.g., a workplace, a station, and a stadium) and involved in the same content.
  • Service availability: Due to various factors like network failures, traffic congestion etc mobile users may not be able to connect to the cloud to obtain service.


Advantages of MCC

>> Extended battery lifetime

>> Remote application execution

>> Improved data storage capacity and processing power

>> Improved reliability and availability

>> Scalability

>> MCC for Security: Protecting user privacy and data/application secrecy. The two main categories are Security for mobile users & Securing data on clouds.



Mobile cloud computing has a huge potential to become one of the mobile technology trends in the future due to the fact that it combines the advantages of both cloud computing and mobile computing. That traction will push the revenue of MCC to $5.2 billion. The applications supported by MCC including m-commerce, m-learning, and mobile healthcare have been discussed which clearly show the applicability of the MCC to a wide range of mobile services. 

In the present scenario, companies must innovate and get the most from its resources to succeed in the global competitive market. Cloud computing infrastructures are next-generation platforms that can provide tremendous value to companies of any size. They can help companies achieve more efficient use of their IT hardware and software investments and pave way for an accelerated growth.