Articles
Use letters, numbers and symbols.To create a strong password, use words you won’t find in the...
Beware of Misleading Domain Renewals scamThere are a number of companies out there that will contact you and lead you to think your domain...
Brute ForceIntroduction to Brute Force Attacks Today we published a new Learning Center article focused on...
China Scam WatchBeware of the china scams. china internet scam Fake Tik Tok Cheap Power Banks Internet...
Computer VirusesWhat is a computer virus. A computer virus is a malware program that replicates by making copies...
Disable XML RPCXML-RPC service was disabled by default for the longest time mainly due to security reasons.In...
Fork BombA fork bomb is the equivalent of a DOS attack on your own system. DOS is short for Denial of...
Google rank better with SSL certificateSecurity is a top priority for Google. We invest a lot in making sure that our services use...
HTTPSHTTPS secures the connection to the website you are visiting. I’m sure you have seen this in...
How to stay protected from infostealersHow to stay protected from infostealers Imagine this: You get an email...
How to use multi-factor authentication - aka 2FA - to improve your securityWant to avoid having your online accounts hacked? Enable two-factor authentication, a crucial...
IRS ScamWhat is an IRS Scam CallAn IRS Scam Call is when scammers make unsolicited calls. These scammers...
Locky Ransomware?What is Locky Ransomware?Another ransomware seems to spreading like wildfire, taking a hold of...
PharmingPharming is a cyber attack intended to redirect a websites traffic to another, fake site. This is...
PhishingThis is the attempt to acquire sensitive information such as user name, password, and credit card...
Rkhunter install guiderkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible...
SFTP vs FTPSSFTP vs FTPS – Secure File Transfer Protocols Explained It’s been a while since...
SSL Vendor StatusWhen waiting for your SSL to process you will be provided with status updates straight from the...
SSL validationNowadays, SSL Certificate becomes a crucial part of the internet and business. SSL Certificate...
Using cPHulk to Prevent Brute-Force AttacksUsing cPHulk to Prevent Brute-Force Attacks cPHulk is an additional security feature in WHM that...
What is DNS hijackingWhat is DNS hijacking and why is it harmful? A DNS hijack means that someone...
Why You Should Turn On Two Factor Authentication What is a DDoS attack?What is a DDoS attack? Everything you need to know about Distributed Denial-of-Service attacks...