If for any reason you want to uninstall proftpd and/or pureftpd in Directadmin and don't want to run any FTP server at all. Here is a guide on how to complete it.
Should you want to run PHP scripts in behalf of the script owner. Or you have issues with modifying uploaded via HTTP files in a FTP client or in Directadmin File Manager. Probably you see various errors similar to "Permission denied". Then you might consider installing mod_ruid2 to your mod_php.
Did you renew a SSL/TLS cert and an old one is still showing up? And you think it's a Let's Encrypt strange renew problem? Added a domain but still see "Nginx is functioning normally" or "Apache is functioning normally"?
There are two ways to deal with WordPress Multisite on Directadmin powered server, and you should choose one according to your preferences and requirements. First of all you should ask yourself a question, and an answer on it will help to determine a way which you will go.
You might consider configuring exim to exclude original message from bounce in order to reduce chances to get blacklisted by other mail servers. As they might think that you are spamming them.
If any try to update MySQL 5.6.x on a Debian server with Directadmin fails, and you see that download of a archived file can not succeed due to the fact of the missing file. Here is a way on how to solve it.
Want to have nginx_mainline installed on your server to gain from using HTTP/2, here are new-way instructions on how to install it with an automatic script.
If after an account restoration or any other action you don't see a domain on a "Custom HTTPD Configurations" page in Directadmin, and you are still sure that domain exists at an user level on a server, then there is a quick way to get it fixed.
A usernames leakage on Directadmin servers through phpMyAdmin logs was recently discovered. And here we will guide you through the security update in order to protect your server against this vulnerability.
On July 18th, 2016, a CGI application vulnerability, referred to as "HTTPoxy", was disclosed. An attacker can exploit vulnerable deployments by passing an HTTP Proxy header with their request, which will alter the URL used by the application when contacting backing services. This can be used to leak credentials, modify responses to the application, etc.