James Brand Benton ballpoint pen review

REVIEW: I firmly believe all EDC bags should start with the basics: a small to moderately sized knife, a nice set of shades, and a reliable/solid writing implement. In addition to the bag itself, these non-tech accessories say a lot about the carrier. I prefer simple, well-made on this front. From that point, many of us add various layers of technology and accessories. For this review James Brand sent me one of their recently released Benton pens to checkout. Let’s see if it finds a permanent spot in my Colonel Littleton 1943 Navigator bag

What is it?

The Benton is a minimalistic ballpoint pen engineered to survive the road less traveled. This small, lightweight pen is designed to live in your pocket or EDC bag, ready to jot some rouge thought, comical doddle, or notes during a board meeting.

Design and features

The Benton is very well made and has an excellent feel/weight to it. James Brand uses stainless steel to create the barrel of the Benton. The barrel is 3/8″ in diameter, which is thin but not too thin. Overall length is five and a half inches, weighing in at less than an ounce.

Specifications:

  • MATERIAL: 304 Stainless Steel Barrel
  • CLIP: Bent Steel
  • GRIP PATTERN: Laser Etched
  • LANYARD LOOP: From clicker
  • CARTRIDGE: Schmidt 900 M (Black)
  • CARTRIDGE ACCESS: Twist off
  • DIAMETER: 3/8″ (9.4mm)
  • LENGTH: 5.5″ (139mm)
  • WEIGHT: 0.8 oz

The Benton includes a Schmidt 900 M ink cartridge that provides a smooth, flowing writing experience and is easily replaced when needed.

The lower third of the pen has many small circular indentations laser etched into the stainless steel barrel that gives the Benton an excellent feel and grip to it.

The Benton’s pocket clip is made from a PVD coated steel with the James Brand logo monogrammed into its tip.

Like the rest of the Benton, its pocket clip is low-profile and minimalistic yet gets the job done. The steel clip is rigid and strong as you would expect.

The Benton’s clicker has a machined hole/hard point to attach a lanyard to the pen.

James Brand includes a matching monogrammed lanyard with the Benton.

James Brand also includes a wool felt sleeve to protect the Benton.

What I like

  • Excellent build and material quality
  • Nice size and weight
  • Excellent feel and grip
  • Good writing experience

What needs to be improved

  • None

The Benton is available in stainless steel with green/black highlights, all-black, and a limited white ceramic coated LTD edition.

Final thoughts

The Benton is a very nice pen, made from excellent materials and attention to detail. It’s shape, size, and weight is ideal. James Brand has done an excellent job creating a simple, minimalistic design…perfect for anyone’s EDC gear. It is lightweight, well-made, form factor combined with a great writing experience.

Price: $60
Where to buy: The Benton is available directly from James Brand.
Source: The sample of this product was provided by James Brand.

Filed in categories: Reviews

Tagged:

James Brand Benton ballpoint pen review originally appeared on The Gadgeteer on January 9, 2019 at 11:00 am.

Note: If you are subscribed to this feed through FeedBurner, please switch to our native feed URL http://the-gadgeteer.com/feed/ in order to ensure continuous delivery.

VAVA’s new 4K projector only needs 8.5 inches from a wall to project a 150 inch image

NEWS – Is it weird that as The Gadgeteer that I’ve not had a lot of experience with projectors? I’ve not had a lot of interest in them because until now they’ve needed space between the projector and the wall where you plan to project the image. At CES VAVA announced a 4K UHD Short Throw Laser Projector. What does that even mean? It means that this new projector only needs 8.5 inches of space between the projector and the wall to display a 150 inch (12.5 feet) high def image.

This projector uses ALDP 3.0 technology which the same as movie theater projectors and features Harman Kardon 30W speakers that support DTS and Dolby sound, Smart TV features that use the Android 7.0 which is built in, and Smart Eyes Protection which automatically turns down the brightness for eye safety when people get close to the screen.

The VAVA 4K UHD Short Throw Laser Projector will sell for $3,499 and will be available in late Q1 to early Q2. For more info visit VAVA.com

Filed in categories: News

Tagged: ,

VAVA’s new 4K projector only needs 8.5 inches from a wall to project a 150 inch image originally appeared on The Gadgeteer on January 9, 2019 at 10:00 am.

Note: If you are subscribed to this feed through FeedBurner, please switch to our native feed URL http://the-gadgeteer.com/feed/ in order to ensure continuous delivery.

Grado GW100 Wireless Bluetooth open-back headphones review

REVIEW – Let’s be transparent— I’m a big fan of Grado headphones and earphones. Their 325e headphones are one of my favorite open-backed headphones and the GR10 earphones are a go-to pair I still love and use. However, it’s becoming a wireless world and it appeared that Grado was being left behind—until now, that is.

What is it?

Grado’s new GW100 headphones are the world’s first wireless headphones that are open-backed. If you’re unfamiliar with the term open-backed, it means that you can see through the headphone ear cups. This openness makes the speakers sound like they are not sitting on your ears, but rather away from your head giving music an expanded soundstage. (However, this soundstage is not as pronounced as on other Grado headphones—more on that later.) Some people prefer the open-backed approach so much that they refuse to listen to any other type of headphone. Add Bluetooth wireless to the mix and you have something special. 

What’s in the box

  • GW100 headphones
  • Mini plug audio cable
  • Mini USB charging cable

Specs

  • Bluetooth Version: 4.2 with apt-X
  • Battery Capacity: 320mAH
  • Working Distance: 30+ ft.
  • Battery Life: 15 hours (at 50% volume)
  • Frequency Response: 20Hz~20KHz
  • Mic Sensitivity: 42dB +/- 3dB
  • Transducer Type: Dynamic
  • Operating Principle: Open Air
  • SPL 1mW: 99.8 dB
  • Nominal Impedance: 32 ohms

Design and features

These are Grado headphones. That may sound a bit obvious, but if you’re familiar with the Grado brand, you get it. One look and that Grado look is immediately apparent. The overarching design language of these headphones has not changed much since the first Grado headphone in the early 90s. The look is a postmodern/mid-century classic style that looks old, but never dated.

The ear cup design, the sliding sizing rod, those foam ear pads are all Grado. The ear pads on these are on-ear like the SR60 and SR80 headphones as opposed to over-ear like Grado’s more expensive models. The GW100s are clad in an abundance of matte black plastic and faux leather. On some headphones, this would look and feel cheap, but the pieces fit together well and there’s no rattling or squeaking. Plus they are incredibly light. I’ve worn them for hours with little to no discomfort. The one comfort issue I do have is the foam on the ear pads. My skin mildly reacts to whatever the foam is made of and can sometimes become itchy. It could be something worth noting if you have sensitive skin.

The headband on the GW100 headphones could use more padding, but it’s almost identical to the headbands of Grado’s upscale headphones. It feels fine to me but might not have enough cushion for someone with thinning to no hair.

One design flaw I noticed is that if you want to wear the headphones around your neck, the ear cups only swivel one way and that way is backward. Let me explain: when headphones are around your neck, the foam part of the ear cup should face your body so they won’t get dirty. However, when worn correctly, the ear cup’s foam on the GW100s only face outward—unless you flip them around which then makes the right speaker be on your left side and left on right. Who wants that? Maybe this shouldn’t bug me so much, but it feels completely backward. 

Even though the GW100s are wireless, they can also be used with the included mini plug cable for (slightly) improved audio quality or if you forgot to recharge the battery. The headphones are charged via a mini USB plug, also included. I would have preferred a newer, faster, more durable USB-C connection that many wireless headphones now employ. Also, the Bluetooth is version 4.2 instead of the latest version 5. 

As far as extras go, that’s it. They are housed in cheap foam inside a thin cardboard box. Plus, there’s no case included, but that’s true of most if not all Grado headphones—no matter the cost. It appears that Grado puts all of their money into the product instead of extras that have no effect on audio quality.

The GW100 headphones may be Grado’s first wireless model, but you would never know it. Out of the box, the GW100s are easy to pair and easy to use. I didn’t even need to read the manual—I was able to figure out the buttons fairly quickly. The buttons are on the large-side making them easy to feel and use. When pressed, there is a voice prompt that tells you if you are powered on or off and either connected or disconnected. It’s nice that I don’t have to translate what different beeps mean as with other headphones. Oh, the voice is female and has a trace of a British accent—nice touch.

Call quality is so-so using the GW100 headphones. People I spoke with could tell I was not using my iPhone (unlike the crazy good call quality of the Apple AirPods). I was told my voice had static in the background. Even so, I could hear the other person quite well. However, the open-backed design lets me hear myself talking—something sorely lacking on regular headphones.

It’s worth noting that even though the GW100 headphones are open-backed, Grado has noticeably reduced audio “bleed.” People next to you may still be able to hear what you are hearing, but it won’t be as loud to them as with other Grado models. Note that this also reduces the soundstage a bit, so if you’re looking for that ultra-wide Grado soundstage, you may be disappointed.

So what is that Grado sound? Grado headphones are tuned to middle to slightly higher frequencies, but without being too bright-sounding in any way. Bass is present but well controlled. They are well suited for rock and jazz but can be easily used for any genre of music—except for bass prominent hip-hop or some electronica.

Since I’m a fan of classic rock, the GW100 headphones sound just right, whether it’s the Beatles, Stones, Bowie or even more recent rock. It’s a “mama bear” kind of headphone. However, if you’re a bass-head, I would look elsewhere. If you’re used to a brighter, ”Etymotic” type of sound, The GW100s may come off as a bit flat sounding. They still sound energetic, but not to the point of becoming harsh.

But what’s really nice about the GW100 headphones is that they can disappear. The Grados put music first and when coupled with their open-backed design, it’s easy to become lost in the music where you can forget you’re wearing headphones. It’s a weird sensation and it doesn’t happen with many headphones.  

What I like

The GW100 headphones are extremely light and comfortable. They can be worn for hours with little to no discomfort. Oh yeah, they also sound great.

What needs to be improved

The GW100s are almost all plastic which can feel a bit cheap when first held. Be careful cramming them into a backpack—the ear pads easily come off and can be misplaced. The ear pad foam can be scratchy feeling for sensitive skin.

Final Thoughts

Grado took their time making a Bluetooth headphone, but the wait was justified. The GW100 headphones have managed to retain that illusive Grado character that fans love. It’s a Grado headphone, period.

Price: $249 US
Where to buy: Amazon
Source: The sample for this product was provided by Grado.

Filed in categories: Reviews

Tagged:

Grado GW100 Wireless Bluetooth open-back headphones review originally appeared on The Gadgeteer on January 9, 2019 at 9:00 am.

Note: If you are subscribed to this feed through FeedBurner, please switch to our native feed URL http://the-gadgeteer.com/feed/ in order to ensure continuous delivery.

Ring’s new Door View Cam offers up a new point of view

NEWS – Ring, maker of the popular video doorbell recently showed off their latest offering at CES 2019, the Ring Door View Cam. The Ring Door View Cam video doorbell essential replaces your door’s peephole with a smart, compact HD camera.

Door View sends you mobile notifications when anyone presses the built-in doorbell button, knocks on the door or triggers the motion sensors. Answer the notification to see and speak to the person from anywhere on your phone or tablet. Or you can quickly look thru your traditional peephole to see who’s knocking.

Door View Cam offers 1080p HD video with two-way talk, a peephole with privacy cover, adjustable motion detection, and rechargeable battery.

Like all of Ring’s current doorbells, Door View works with Alexa and Google Assistant.

The Door View Cam is easy to install, simply unscrew your existing peephole and put the Door View Cam in its place. And Ring states it can be used on any door with an existing peephole.

Price for the Door View Cam when it’s released “later this year” will be the same as the company’s Video Doorbell 2, $199.

Filed in categories: News

Tagged:

Ring’s new Door View Cam offers up a new point of view originally appeared on The Gadgeteer on January 9, 2019 at 8:00 am.

Note: If you are subscribed to this feed through FeedBurner, please switch to our native feed URL http://the-gadgeteer.com/feed/ in order to ensure continuous delivery.

How to Host a Website (Step-by-Step)

How to create a server

To host a website on a server, you’ll need to get your hands dirty and set up the whole environment by yourself. Below, you’ll find a generalized example of how to get things done using a virtual private server running Ubuntu 18.04

In short, you’ll need to:

  • Perform the initial server setup
  • Set up a DNS zone and point your domain
  • Install a software stack
  • Create a virtual host
  • Get your website up and running

P.S. If you don’t want to go through this complicated steps, consider getting a web hosting.

1. The First Server Setup Steps

If you decide to rent a dedicated server or a VPS, you’ll first need to lay a solid foundation. This involves accessing your server through a terminal or an SSH client and making security tweaks and updates.

Connect to Your Server

Start by connecting to your server. The following command will do the trick:

ssh root@your_server_IP -port

When connecting for the first time, you may be prompted to add your server IP to the list of known hosts. Type in yes to proceed and you’ll then be prompted to enter the root password.

adding server IP to known hosts

Here’s an example of what you should see on your screen if everything went right.

initial Ubuntu SSH login screen

Get the Latest Updates

Run the following commands to get the latest updates for your Ubuntu 18.04 server:

sudo apt update
sudo apt upgrade

When running the second command, you’ll see a confirmation screen. Type in Y to proceed.

confirming server updates Ubuntu

Create a New User

Next, you’ll need to add a new user, as using the root one for everyday tasks is not recommended. Let’s call it webmaster. To begin the user creation, execute:

adduser webmaster

creating a new user Ubuntu

Once you create a password, you’ll be prompted to enter the general details (which you can leave blank). Then, type in Y to confirm the new user creation.

By default, the new user won’t have enough privileges to do everything you need, hence you’ll need to add them manually. Here’s how you do it:

usermod -aG sudo webmaster

That’s it! Your new administrative user is ready. To start using it instead of root, execute:

su – webmaster

changing system user

Set Up Public Key Authentication (Optional)

Using a password to authenticate leaves you vulnerable to brute-force attempts and puts your server in a moderate risk (especially if you’re lazy to set up a unique and strong password).

A great way to improve server integrity is to use SSH keys instead of a regular password. The steps should be identical regardless of which Linux distribution you’re running. To begin log out of your server and execute the following command on your local computer to create a new public key:

ssh-keygen

You’ll be asked to enter an additional passphrase and the location of where to save the public key. By default, it saves everything to /Users/Your_User/.ssh directory (which you can keep unless you have other plans in mind).

running SSH keygen

As soon as it’s finished, copy over the SSH key to your server by using:

ssh-copy-id webmaster@your_server_IP

You may also do the same for your root user just in case:

ssh-copy-id root@your_server_IP

moving SSH key to remote server

Finally, you’ll need to login to your server again. Only this time, you’ll be using the SSH key and its passphrase to authenticate. If your password is guessed by someone, they will be unable to log in, as the public key is required to make a successful connection.

logging into server with SSH key

Disable Password Authentication (Optional)

Since you’re now able to access your server with the newly generated SSH key, it’s advisable to disable the regular password authentication. To do so, we can use the nano text editor:

sudo nano /etc/ssh/sshd_config

Look for a line that says #PasswordAuthentication yes, delete the # and change the yes to a no. The final result should look like:

disabling password authentication in sshd config

To save these changes and exit the nano editor, press CTRL+X, type in Y and press Enter. And finally, apply everything by reloading the sshd service:

sudo systemctl reload sshd

And that’s it! You’ll now use a public key to authenticate instead of a password, which is considered a more secure way to access and manage a server.

Set Up a Firewall

Last, but not least, it’s advisable to use a firewall to protect yourself from the dangers lurking on the web. Uncomplicated Firewall is one of the best tools for the job. To set it up, execute:

sudo apt-get install ufw

When installed, the firewall will not work unless turned on manually. You can enable it by using:

sudo ufw enable

enabling ufw Ubuntu

To check if it’s up and running, execute:

sudo ufw status verbose

 

2. Set Up a DNS Zone

The next challenge will be creating a DNS zone, which acts as the binding material between a domain name and a server. We can break it down into two smaller steps:

  1. Setting up a DNS zone within your server
  2. Creating custom nameservers at your domain registrar

Create a New DNS Zone

To make a new DNS zone, we’ll be using a tool called bind9. In the end, this is the service that allows us to load a website through a domain name instead of an IP address.

To install Bind9 on your Ubuntu 18.04 server, execute:

sudo apt-get install bind9

Once installed, all the files will be available in the /etc/bind directory. Let’s navigate to it first:

cd /etc/bind

To keep everything neat and organized, we’ll create a separate directory for our DNS zones:

sudo mkdir -p zones

Let’s create a new DNS zone file for our domain. We’ll be using domain-example.com for demonstration purposes (you should replace it with your actual domain name).

sudo nano zones/domain-example.com

DNS zone snippet example:

;
; BIND data file for domain-example.com
;
$TTL    3h
@       IN      SOA     ns1.domain-example.com. admin.domain-example.com. (
                          1        ; Serial
                          3h       ; Refresh after 3 hours
                          1h       ; Retry after 1 hour
                          1w       ; Expire after 1 week
                          1h )     ; Negative caching TTL of 1 day
;
@       IN      NS      ns1.domain-example.com.
@       IN      NS      ns2.domain-example.com.


domain-example.com.     IN      A       YOUR_SERVER_IP
ns1                     IN      A       YOUR_SERVER_IP
ns2                     IN      A       YOUR_SERVER_IP
www                     IN      CNAME   domain-example.com.
mail                    IN      A       YOUR_SERVER_IP
ftp                     IN      CNAME   domain-example.com.
domain-example.com.     IN      MX      10      domain-example.com.

Make sure to replace all instances of your Your_Server_IP and domain-example.com with the actual values. Save the zone file by pressing CTRL+X and then typing Y to confirm the changes.

Next up, we’ll need to edit the local configuration and specify the location of our newly created DNS zone. This ensures that the server knows which zone file belongs to which domain name.

sudo nano named.conf.local

Paste down the following lines at the bottom of the file while replacing domain-example.com with your actual website address.

zone "domain-example.com" {
       type master;
       file "/etc/bind/zones/domain-example.com";
};

Press CTRL+X and input Y to save your changes and exit the nano editor.

You can also test out whether everything was added and configured correctly by executing the following command:

sudo named-checkzone domain-example.com /etc/bind/zones/domain-example.com

verifying dns zone

Lastly, run these two commands to restart your server’s DNS service and to make sure it’s running:

sudo /etc/init.d/bind9 restart
sudo /etc/init.d/bind9 start

At this point, the DNS zone is ready from your server side. To finalize it, you’ll need to create custom nameservers entries within your domain registrar.

Create Custom Nameservers For Your Domain

Since we specified two nameservers (ns1.domain-example.com and ns2.domain-example.com) in our DNS zone example, we’ll need to create these entries at the domain registrar and use them.

Here’s how the entries should look like:

Custom Nameserver Points to
ns1.domain-example.com Your_Server_IP
ns2.domain-example.com Your_Server_IP

child nameserver creation

Once created, you’ll need to point your domain to these new nameservers.

3. Install LAMP Stack

LAMP is one of the most used software stacks of the web. It stands short for Linux, Apache HTTP Server, MySQL/MariaDB, and PHP. Before hosting a site, you’ll need to make sure all these ingredients are available at your server. Here’s how the process of setting them up would look using Ubuntu 18.04:

Apache

Apache HTTP Server may already be included in the default packages that come with your server. If not, then execute:

sudo apt-get install apache2

install Apache

Since there’s a firewall, we need to make sure these ports are open as Apache won’t work properly otherwise. Here’s what you should allow through the firewall:

sudo ufw allow 80/tcp
sudo ufw allow 443/tcp

Then, restart it to make sure the changes are applied:

sudo ufw reload

At this point, here’s what you should see by visiting the IP address of your server through a browser:

default Apache2 page

PHP

To get the latest PHP version with a few extra modules that WordPress needs, execute:

sudo apt-get install php php-common php-mysql php-gd php-cli

confirm PHP installation

You can check which PHP version was installed on your server by typing:

php -v

check PHP version

MySQL/MariaDB

MariaDB and MySQL are two of the top choices for your database server in Linux. For this example, we’ll use MariaDB. To install it on your server, execute:

sudo apt-get install mariadb-server mariadb-client

install Mariadb

Once done, you’ll need to use an additional script that comes with the package. It will establish the basic security measures for your database server. Start it by typing:

sudo mysql_secure_installation

At the very first step, you’ll be asked to provide the root MySQL password. Press the Enter button to continue as it’s not created yet. Then follow the rest of the instructions that pop up in the command line interface.

Mariadb secure installation

Finally, you can check if my database server is operational by running:

sudo systemctl status mysql

4 Create a Virtual Host

The next task will be creating a dedicated directory for your website files. Start by changing your working directory:

cd /var/www/html

Use this command to create a folder for your domain and an additional one within in:

sudo mkdir -p domain-example.com/public_html

Then, make the webmaster user we created previously the owner by using:

sudo chown -R webmaster:webmaster domain-example.com/public_html

You’ll also need to make sure that read permissions are applied to the Apache root directory. In this case:

sudo chmod -R 755 /var/www/html/

At this point, Apache gets all the settings from the 000-default.conf file. We’ll need to copy the contents of this file and create a separate one for our domain name. The easiest way to copy a template of the virtual host configuration is by using the following command:

sudo cp /etc/apache2/sites-available/000-default.conf /etc/apache2/sites-available/domain-example.com.conf

Essentially, this makes a copy of the file under a different name in the same directory. This is the file that tells your Apache web server the location of a domain’s root directory, error log, and other important paths. To change its content, we’ll use nano:

sudo nano /etc/apache2/sites-available/domain-example.com.conf

 

Apache config example:

<VirtualHost *:80>
        # The ServerName directive sets the request scheme, hostname and port that
        # the server uses to identify itself. This is used when creating
        # redirection URLs. In the context of virtual hosts, the ServerName
        # specifies what hostname must appear in the request's Host: header to
        # match this virtual host. For the default virtual host (this file) this
        # value is not decisive as it is used as a last resort host regardless.
        # However, you must set it for any further virtual host explicitly.

        ServerAdmin admin@domain-example.com
        DocumentRoot /var/www/html/domain-example.com/public_html
        ServerName domain-example.com
        ServerAlias www.domain-example.com
        
        # Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
        # error, crit, alert, emerg.
        # It is also possible to configure the loglevel for particular
        # modules, e.g.
        #LogLevel info ssl:warn

        ErrorLog ${APACHE_LOG_DIR}/error.log
        CustomLog ${APACHE_LOG_DIR}/access.log combined
        
        # For most configuration files from conf-available/, which are
        # enabled or disabled at a global level, it is possible to
        # include a line for only one particular virtual host. For example the
        # following line enables the CGI configuration for this host only
        # after it has been globally disabled with "a2disconf".
        #Include conf-available/serve-cgi-bin.conf
</VirtualHost>

Make sure to replace all instances of domain-example.com with your actual domain name. To save the file, press CTRL+X and confirm by typing Y. The final result should look like:

adding domain config to Apache

At this point, you’ll need to turn off the default virtual host configuration file and use the newly created one. This command will disable it:

sudo a2dissite 000-default.conf

Then, add the recently created configuration file as shown below:

sudo a2ensite domain-example.com.conf

Lastly, you’ll need to restart Apache for the changes to apply. You can do that by running:

sudo systemctl reload apache2

You successfully installed LAMP on your server. Since your domain is already pointed to the server, you may need to wait a few hours for the DNS to fully propagate. Then you should see a similar screen when visiting your domain through the browser.

domain root directory content

5. Set Up WordPress (or Upload a Website)

Since the initial server setup is finally complete, it’s time to host a website on it. In this section, we’ll show you a generalized example of how to get a WordPress site up and running.

Create a New MySQL Database and User

Start by accessing the MySQL interface through the terminal:

sudo mysql

>Use the following syntax to make a new database:

CREATE DATABASE wpdatabase;

Then, create a new user and specify the password:

CREATE USER 'wpuser'@'localhost' IDENTIFIED BY 'SuperSecurePassword123';

Next, assign administrative privileges to your newly created user with:

GRANT ALL PRIVILEGES ON wpdatabase.* TO 'wpuser'@'localhost';

That’s it! Your MySQL user and database are ready for action. To turn off the interface, type in:

exit

Move WordPress Files to Your Server

Last, but not least, we have to get the actual website files uploaded to the root directory of your domain. There are two approaches that we’ll describe step-by-step:

  • Using the wget command to get the latest WordPress version
  • Configuring an FTP client (such as FileZilla)

Method 1: Using the Command Line Tools

The first way is to use a command called wget. To use it on your server, you’ll have to install it:

sudo apt-get install wget

Then, change your working directory to the root folder of your domain name:

cd /var/www/html/domain-example.com/public_html

Use the wget command to download the latest version of WordPress from the web:

wget https://www.wordpress.org/latest.zip

Then, extract all the contents of the archive by using:

unzip latest.zip

By default, all the files will appear in a new directory called wordpress (which may result in your website working via domain-example.com/wordpress). For everything to work correctly, we’ll need to move all the files out of that directory to the one above. Here’s how to do it:

cd wordpress

The following command will move all files from the current directory to your specified location:

sudo mv * /var/www/html/domain-example.com/public_html/

Before starting the installation, you’ll need to prepare your wp-config.php file. Since only a sample one is provided. Start by renaming it:

sudo mv wp-config-sample.php wp-config.php

Then, edit the file using nano and add the MySQL database configuration details.

sudo nano wp-config.php

Make sure to update the MySQL User, Database, and Host sections with the values that you created previously.

editing WP config

Lastly, visit your domain name in the browser and you’ll see the initial WordPress setup screen.

initial WordPress setup

Once you finish it, you can install a migration plugin such as All-in-One WP Migration to import an existing WordPress website.

Method 2: Using an FTP Client

Alternatively, you can use an FTP client such as FileZilla. In case you configured an SSH key and disabled password authentication, you’ll need to use it to log in instead of the regular username and password combination. To configure the SFTP connection:

  1. Go to FileZilla Site Manager and add a New Site.
  2. Set the protocol to SFTP – SSH File Transfer Protocol.
  3. Enter your server IP in the Host field and set the port to 22.
  4. Set the login type to Key file.
  5. Specify the path to your SSH key (e.g. /Users/Name/.ssh/id_rsa).
  6. FileZilla will convert it into a .ppk file, which you can then use to make a connection.

converting SSH key

The final configuration should look something like this:

FileZilla sftp configuration

Now, you’ll be able to access your server via FTP and upload any files directly from your computer.

FileZilla sftp connection

Congratulations! You’ve learned how to host a website on a virtual private server running Ubuntu 18.04. Everything from the initial server setup to preparing the software stack has been covered. All that’s left is to grab a server and get your hands dirty!

This article was published with the help of Hostinger.com.

The post How to Host a Website (Step-by-Step) appeared first on HostingFacts.com.

Posted by / January 9, 2019 / Posted in Guide