Use letters, numbers and symbols.To create a strong password, use words you won’t find in the...Beware of Misleading Domain Renewals scam
There are a number of companies out there that will contact you and lead you to think your domain...Brute Force
Introduction to Brute Force Attacks Today we published a new Learning Center article focused on...China Scam Watch
Beware of the china scams. china internet scam Fake Tik Tok Cheap Power Banks Internet...Computer Viruses
What is a computer virus. A computer virus is a malware program that replicates by making copies...Disable XML RPC
XML-RPC service was disabled by default for the longest time mainly due to security reasons.In...Fork Bomb
A fork bomb is the equivalent of a DOS attack on your own system. DOS is short for Denial of...Google rank better with SSL certificate
Security is a top priority for Google. We invest a lot in making sure that our services use...HTTPS
HTTPS secures the connection to the website you are visiting. I’m sure you have seen this in...How to stay protected from infostealers
How to stay protected from infostealers Imagine this: You get an email...How to use multi-factor authentication - aka 2FA - to improve your security
Want to avoid having your online accounts hacked? Enable two-factor authentication, a crucial...IRS Scam
What is an IRS Scam CallAn IRS Scam Call is when scammers make unsolicited calls. These scammers...Locky Ransomware?
What is Locky Ransomware?Another ransomware seems to spreading like wildfire, taking a hold of...Pharming
Pharming is a cyber attack intended to redirect a websites traffic to another, fake site. This is...Phishing
This is the attempt to acquire sensitive information such as user name, password, and credit card...Rkhunter install guide
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible...SFTP vs FTPS
SFTP vs FTPS – Secure File Transfer Protocols Explained It’s been a while since...SSL Vendor Status
When waiting for your SSL to process you will be provided with status updates straight from the...SSL validation
Nowadays, SSL Certificate becomes a crucial part of the internet and business. SSL Certificate...Using cPHulk to Prevent Brute-Force Attacks
Using cPHulk to Prevent Brute-Force Attacks cPHulk is an additional security feature in WHM that...What is DNS hijacking
What is DNS hijacking and why is it harmful? A DNS hijack means that someone...Why You Should Turn On Two Factor Authentication What is a DDoS attack?
What is a DDoS attack? Everything you need to know about Distributed Denial-of-Service attacks...