Overview of the wowza control panel

For further instructions on how to use our wowza control panel check the links below:

1- Live streaming

2- TV Station

3- Ondemand Streaming

4- IP Camera Re-Streaming

Overview of the wowza control panel

1- After you login you will see a page like the image below (click on the images to see the full image).

wowza control panel
click on the image to see it full size

2- click on the to go to the service:

3- below image shows overview of the service, in this case a live streaming server:

4- click on all the links but on the configuration page I suggest you don’t make any changes, sometimes changing configuration even password can corrupt the service.

configuration of the wowza service

5- The important thing is perhaps the code for the jw premium player, if so click on Media Player and grab the code to paste it on your site.

Options while ordering wowza server

While ordering Wowza Streaming Engine on our billing system there are 4 options:

1- Live streaming, which as it says it is for live streaming or live broadcasts, perfect for broadcasting live events, sports, church events, weddings.

order wowza hosting

2- TV Station,  perfect for TV stations having the option to upload videos and create schedules and playlists schedule at a predetermined time.  At any time this schedule can be interrupted for live broadcasts.

3- Ondemand Streaming, with the option to upload videos and create playlists.

4- Live Camera Restream, used for IP cameras, the output of IP camera is normally RTSP or RTP ( example: rtsp://[camera-ip-address]:554/axis-media/media.amp ).

This format RTP or RTSP is useless for players, by using our wowza server and the Live Camera Re-Stream we convert this signal for playback on all supported player technologies. Some cameras are not supported, please open a ticket and email us the rtsp or rtp for us to check if it works on our wowza servers.

 

testing a red5 live streaming rtmp, plus creating a player for the rtmp

We created an app for live streaming here.

Now we going to test it and create a player code so we can start streaming to our site.

Do you have fmle installed on your computer? You need to download it from adobe.

Lets test it first, go to

http://209.95.39.220/test/

enter the rtmp of your app. the rtmp is

rtmp://server IP/app

so:

rtmp://RED5_SERVER_IP/live221

Enter this URL on the long string and click connect, now click “Publish” your camera will start,  and now click “Play” if the 2 players show the same thing you are on. Everything is good.

OK, now we have to work on “stream name”. We talked about rtmp, and we tested it, the testing site if you go back to it

http://209.95.39.220/test/

it has a stream name, “testing” this must be on both the publishing and on the player.

so it must be on the FMLE and on the player code.

fmle

(click on the image to have a better view)

the FMLE on the left you have your settings, frame per second, bitrate, your camera, format.

on the red5 server your bitrate should be about 320kbps higher then that you need a lot of RAM and server resources.

lets configure the fmle as the image shows.

on the right on the FMS URL enter the rtmp and on the stream enter your chosen stream name, in this case I entered “live” see image.

click connect, and then below click “Start”

you now streaming to your server.

 

Now creating a player for this stream. Go to

http://www.hosting-marketers.com/generator/

at the bottom on the “Streamer” enter the rtmp:

rtmp://RED5_SERVER_IP/live221

and on “Stream / File Name” enter the stream name, which we used on the FMLE, “live”

Click  “Generate Code!”

Take the “Preview & Embed” code, paste on your site and that’s it.

You can also use an image on the player, it will show before the user click to play,  enter the image URL on “Overlay Poster”

creating a new app on Red5 for live streaming

We will call this app live221.

first of all download the folder live from red5, the path is /usr/local/red5/webapps

if you ftp to the server you will see these apps.

then rename the folder live to live221

open the folder and go inside \WEB-INF folder, there are 3 files there, you need to change 2.

1- file: red5-web.properties
2 – file: web.xml

open on a text editor red5-web.properties , you will see the 2 lines below:
webapp.contextPath=/live
webapp.virtualHosts=*

change it to:

webapp.contextPath=/live221
webapp.virtualHosts=*

now open the second file web.xml the code on top:

red5 live app

upload the new folder, restart the Red5

go to the Red5 admin area and you will see the new app.

a few steps to protect your wordpress from hackers

1- Stay UPDATED – Run the latest version of WordPress, and upgrade your plugins and themes as quick as possible.
2- Have a strong password.
3- Disable PHP Execution in Certain WordPress Directories – This disables PHP execution in the upload directories and other directories of your choice. Basically so even if someone was able to upload the file in your uploads folder, they wouldn’t be able to execute it.
a- Block Access To wp-content Folder

The wp-content folder contains all your images, plugins and themes, it is a very important folder for your WordPress site. If this folder gets hacked they can delete all your themes and plugins on your site leaving your site blank.

To block access to your wp-content folder create a new htaccess file and save this at the root level of your wp-content folder.

Now add the following code in this new htaccess file.

Order deny,allow
Deny from all
<Files ~ “.(xml|css|jpe?g|png|gif|js)$”>
Allow from all
</Files>

b- Block file types being served from uploads and wp-includes

Having cleaned numerous WordPress hacks, in our experience most backdoor access files disguise themselves in /wp-includes/ folder or in your /wp-content/uploads/ directory. Usually these are .php files with names that some what seems like WordPress core files, but they are not. One of the measures that you can take to improve your WordPress security is disabling PHP execution in certain WordPress directories. We will show you how you can use .htaccess file to disable PHP execution in a specific directory.

Create a blank file in a text editor. Call it .htaccess and paste the following code in there:

<Files *.php>
deny from all
</Files>

Now upload this file in your /wp-content/uploads/ folder. You should also upload it in your /wp-includes/ folder.

Code Explanation: This code checks for any PHP file and denies access to it.

4- Delete themes and plugins you not using.
5- Deny access to the wp-config.php file.

Open your wordpress main .htaccess and paste the following code in there:

<Files wp-config.php>
Order Allow,Deny
Deny from all
</Files>

6= Disable Directory Browsing

If someone has access to your directories they will be able to view all the folders in this directory if you don’t have an index.html or a index.php file. You can stop this with htaccess by adding the following line the main .htaccess file, the one on the public_html. This will make sure that the hacker can not browse a directory even if an index file doesn’t exist.

# directory browsing
Options All -Indexes

7- Protect Against Requests That Haven’t Got A HTTP_USER_AGENT

You can stop this with htaccess by adding the below code to the main .htaccess file, the one on the public_html.

<IfModule mod_rewrite.c>
RewriteCond %{REQUEST_METHOD} POST
RewriteCond %{REQUEST_URI} .wp-comments-post\.php*
RewriteCond %{HTTP_REFERER} !.yourwebsite.com.* [OR]
RewriteCond %{HTTP_USER_AGENT} ^$
RewriteRule (.*) ^http://%{REMOTE_ADDR}/$ [R=301,L]
</IfModule>

Finally Good Luck!

Important updates, news, reviews of our customers sites and tricks for common problems…