FAQ in "NodeWorx FAQ" containing ""

Category: How do I delete old backup files?

You can do this either from the Backup Management screen in NodeWorx: NodeWorx ⇒ SiteWorx ⇒ Backup/Restore ⇒ Manage (link next to the correct domain) ⇒ Check the box(es) next to the backup(s) you want to delete ⇒ Select Delete from the “With Selected” pull down menu under the backup list Or SiteWorx: SiteWorx ⇒ […]

Backup / Restore
Nov 12, 2012, 8:33 pmBy: InterWorx
30 votes, 3.00 avg. rating (59% score)
(0) Comments

How to: Change My InterWorx License Key

If you need to update your InterWorx server license key go to the Settings page under the Server Tab in NodeWorx.   Simply replace your old key with your new key and be sure to hit the save button at the bottom of the page!

update license key
Mar 19, 2015, 4:46 pmBy: InterWorx
15 votes, 3.00 avg. rating (59% score)
(0) Comments

Category: How to: Generate / Delete an API Key

In order for 3rd party software like billing systems to interface with InterWorx to perform tasks such as SiteWorx account creation, the 3rd party software must first authenticate to prove that it is indeed permitted to request actions of the InterWorx control panel system. The most common way to provide authentication is to pass what […]

API
Nov 15, 2012, 5:12 pmBy: InterWorx
5 votes, 3.00 avg. rating (58% score)
(0) Comments

Category: Overview of Managing IP Addresses With InterWorx Control Panel

InterWorx Control Panel provides a simple-to-use interface for managing the IP address(es) on an InterWorx Control Panel System. From the IP Management screen, you can make an IP address available to the system, InterWorx Control Panel, and/or resellers; remove an IP address from the server; and add one or a range of IP addresses. Add […]

IP Management
Nov 15, 2012, 9:49 pmBy: InterWorx
5 votes, 3.00 avg. rating (58% score)
(0) Comments

Category: What is a Jailed Shell? Why is it beneficial?

A jailed shell is a shell user with limited access to the file system.  It is beneficial because it provides an extra layer of security on the server while still allowing limited shell access.  

Shell Users
Nov 12, 2012, 8:17 pmBy: InterWorx
5 votes, 3.00 avg. rating (58% score)
(0) Comments