Articles

 Best practices for passwords

Use letters, numbers and symbols.To create a strong password, use words you won’t find in the...

 Beware of Misleading Domain Renewals scam

There are a number of companies out there that will contact you and lead you to think your domain...

 Brute Force

Introduction to Brute Force Attacks Today we published a new Learning Center article focused on...

 China Scam Watch

Beware of the china scams. china internet scam Fake Tik Tok Cheap Power Banks Internet...

 Computer Viruses

What is a computer virus. A computer virus is a malware program that replicates by making copies...

 Disable XML RPC

XML-RPC service was disabled by default for the longest time mainly due to security reasons.In...

 Fork Bomb

A fork bomb is the equivalent of a DOS attack on your own system. DOS is short for Denial of...

 Google rank better with SSL certificate

Security is a top priority for Google. We invest a lot in making sure that our services use...

 HTTPS

HTTPS secures the connection to the website you are visiting. I’m sure you have seen this in...

 How to stay protected from infostealers

How to stay protected from infostealers Imagine this: You get an email...

 How to use multi-factor authentication - aka 2FA - to improve your security

Want to avoid having your online accounts hacked? Enable two-factor authentication, a crucial...

 IRS Scam

What is an IRS Scam CallAn IRS Scam Call is when scammers make unsolicited calls. These scammers...

 Locky Ransomware?

What is Locky Ransomware?Another ransomware seems to spreading like wildfire, taking a hold of...

 Pharming

Pharming is a cyber attack intended to redirect a websites traffic to another, fake site. This is...

 Phishing

This is the attempt to acquire sensitive information such as user name, password, and credit card...

 Rkhunter install guide

rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible...

 SFTP vs FTPS

SFTP vs FTPS – Secure File Transfer Protocols Explained   It’s been a while since...

 SSL Vendor Status

When waiting for your SSL to process you will be provided with status updates straight from the...

 SSL validation

Nowadays, SSL Certificate becomes a crucial part of the internet and business. SSL Certificate...

 Using cPHulk to Prevent Brute-Force Attacks

Using cPHulk to Prevent Brute-Force Attacks cPHulk is an additional security feature in WHM that...

 What is DNS hijacking

What is DNS hijacking and why is it harmful? A DNS hijack means that someone...

 Why You Should Turn On Two Factor Authentication

 What is a DDoS attack?

What is a DDoS attack? Everything you need to know about Distributed Denial-of-Service attacks...