Articles

 About Let's Encrypt

Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s...

 Best Practices to Secure and Harden Joomla Web Site

Protecting your website is essential to your online business availability and operations....

 CAPTCHA Telling Humans and Computers Apart Automatically

This tutorial is to explain CAPTCHA, an acronym which stands for "Completely Automated Public...

 Critical PHPMailer Flaw leaves Millions of Websites Vulnerable

Dec 25 2016: A critical vulnerability has been discovered in PHPMailer, which is one of the most...

 How to Password Protect a Directory

This tutorial will teach how to password protect a directory. Password protecting a directory...

 How to Prevent Hacking

There are many common methods for attack that hackers may use to compromise your services. By...

 How To Use The IP Deny Manager

This tutorial will teach you how to use the IP Deny Manager to block access to your web site from...

 Our Server Security Measures

Security is of paramount importance on today's internet. We pay special attention to each...

 The Primary Purpose of Secure SSL Certificates

The internet is a marketplace featuring 1000 of products and services from all around the world....

 Using Hotlink Protection

Hotlink Protection prevents other web sites from directly linking to certain files (typically...

 Ways to Secure Your WordPress Site You’ve Probably Overlooked

WordPress security is often referred to as “hardening.” Makes sense. After all, the process is...

Our official partners