Articles

 10 tips for an awesome and SEO friendly blog post

Read More

 7 top Linux desktop environments compared

READ MORE

 A Practical Guide to Amazon SEO

READ MORE

 ALT tag and TITLE tag optimization

READ MORE

 AMP for small business owners

READ MORE

 ASSP and ASSP Deluxe, what's the difference?

ASSP is free to use under GPL license, you can install and use it in your cPanel server.The...

 Allnet4u Enterprise is not associated with allnet4u.co.il

We got many spams and hacks attempts from allnet4u.co.il under the organisation BEZEQ...

 Alway Backup your datas

If you lost all your data, how would you react? See how one man faces life after the...

 Authentication Bypass Vulnerabilities

READ MORE

 Beware of Misleading Domain Renewals scam

There are a number of companies out there that will contact you and lead you to think your domain...

 Change a server's hostname in CentOS

 Check disk space on your server

Check free disk spaceFirst, open a ssh session Type df -h or df -k to list free disk space: $...

 China Scam Watch

READ MORE

 Chrome 68

On July 24th, Google officially launched Chrome 68.With new features and security...

 Common Computer Viruses

What is a computer virusA computer virus is a malware program that replicates by making copies of...

 Common Mistakes with Servers

Although a dedicated server affords you a great deal more power and freedom than other hosting...

 Configuring IP aliasing

Adding failover IPs to your configuration: Objective IP aliasing is a special network...

 Credit Monitoring Services and Other Anti-Fraud Protection

READ MOREAllnet4u Enterprise have his shopping cart and clients portal SSL enabled.We use1-...

 DOS Attacks Explained

READ MORE.All services with Allnet4u Enterprise have anti DDos enabled with auto mitigation

 Data Privacy Ten Ways to Keep Your Data Private

READ MORE.

 Dedicated Server Info manual

This manual is to be used to make all administrators more sensitive regarding few topics related...

 Does readability rank?

READ MORE.

 Duplicate content causes and solutions

READ MORE.

 Duplicate content issues on my shop

READ MORE.

 ECommerce usability: the ultimate guide

READ MORE.

 Editing files in SSH using VI

VI is a Linux text editor that can edit most of the files under a Linux architecture (text files,...

 Encryption How To Utilize it Online and Why It is Important

READ MORE.With Allnet4u Enterprise your dates are safe. We use SSL approved encryption on our pages.

 Error Page Codes

This tutorial will show you a few of the most common error codes a server may return. There are...

 File Upload Vulnerabilities

READ MORE.

 Fix it SSL v3.0 POODLE Vulnerability

October 19, 2014For servers owner ONLYWith the recent discovery of the the Poodle vulnerability,...

 Free cPanel license Trial

You can try a cPanel license for 15 days, completely free of charge.READ MORE.

 Geolocated IP addresse

You have created sites with an international focus and are keen to work on SEO for your target...

 Google 68

From the beginning, security has been one of Chrome’s core principles and one of the biggest...

 Gravityscan provides vulnerability and malware scanning for your website

Gravityscan provides vulnerability and malware scanning for any website. We are incredibly...

 Grayware, Adware, and Madware

What is Grayware, Adware, and Madware?.

 HTTP status codes and what they mean for SEO

READ MORE.

 Hacking Prevention Fork Bomb Folder Blaster

What is a Fork BombA fork bomb is the equivalent of a DOS attack on your own system. DOS is short...

 Half of all WordPress Plugin Vulnerabilities are XSS and Securing FTP

READ MORE.

 Hardening Your WordPress Site

READ MORE.

 How Can I Tell If I Have Malware and What Can I Do About It

How Can I Tell If I Have Malware and What Can I Do About It?.

 How Do Businesses Get Hacked?

How Do Businesses Get Hacked?.

 How Do Firewalls Prevent Computer Viruses?

How Do Firewalls Prevent Computer Viruses?.

 How Do I Get Malware on My Computer?

Part 1- READ MORE.Part 2- READ MORE.

 How Does Malware Get Past Security Software?

How Does Malware Get Past Security Software?.

 How To Recognize and Avoid Tech Support Scams?

How To Recognize and Avoid Tech Support Scams?.

 How XSS Vulnerabilities are Created and How to Avoid Them?

How XSS Vulnerabilities are Created and How to Avoid Them?.

 How a Gmail Password Stealing Scam Works?

How a Gmail Password Stealing Scam Works?.

 How a Packet Travels Through the Internet?

How a Packet Travels Through the Internet?.

 How long does propagation take?

Domain propagation can take up to 72 hours to fully go though but this is not always the case and...

 How many iP you can get with us

We can provide Up (add-ons) to 256x  IP's version 4 and 64x IP'd version 6 plus the main server...

 How to Clean a Hacked Website?

How to Clean a Hacked Website?.Allnet4u Enterprise have backups servers. If you are one of our...

 How to Clear Your Cache in Internet Explorer

This tutorial will assist you with clearing your cache, which will help your computer run better....

 How to Detect a Hacked Website?

How to Detect a Hacked Website?.

 How to Disable XML RPC in WordPress?

XML-RPC service was disabled by default for the longest time mainly due to security reasons. In...

 How to Fix the Error Establishing a Database Connection in WordPress

Fix Error Establishing a Database Connection in WordPressA guide to resolve Error Establishing a...

 How to Manually Upgrade WordPress including Themes and Plugins?

READ MORE.

 How to Prevent Cross Site Scripting Attacks?

READ MORE.

 How to Restrict WordPress File Permissions and Ownership?

READ MORE.

 How to analyze your audience?

READ MORE.

 How to create and use dashboards in Google Analytics?

READ MORE.

 How to do a Ping

The purpose of this tutorial is to teach you how to do a ping. Pinging is a command which tells...

 How to do a TELNET on a PC (Windows) OS

From time to time you may need to perform an operation called "TELNET".You can use TELNET to...

 How to do a Tracert

This tutorial will show you how to run a trace route on a Window operating system. If you are...

 How to get local reviews and ratings?

READ MORE.

 How to install an SSL Certificate in cPanel

Installing an SSL Certificate in cPanel requires that the domain be assigned a dedicated IP to...

 How to optimize a blog post?

READ MORE.

 How to remove www from your URL?

READ MORE.

 How to report a fraudulent website to a registrar?

Yesterday, http://www.twitter.com/sconsult and http://www.sherlloch.com/ reported to us on...

 How to setup a Reverse DNS and a PTR records?

READ MORE.Our Virtual server and dedicated server clients can configure their own rDNS thru their...

 How to use social media?

READ MORE.

 I'm getting a Resource Limit Is Reached error

If you are seeing the following when visiting your website, it means that CloudLinux has stopped...

 IP address with geolocation

You have created sites with an international focus and are keen to work on SEO for your target...

 IP class 4 and IP class 6

For dedicated server owners.Each IP you order is class 4 Failover and are switchable between your...

 IP class Failover

All IP4 are Failover (except the main one).We advice to set your server and sites with IP...

 IRS Scam Calls

What is an IRS Scam CallAn IRS Scam Call is when scammers make unsolicited calls. These scammers...

 Improve local SEO with Google My Business

READ MORE.

 Install Minecraft on centos 7.x OS

In this tutorial, we will be guiding you through the set up of a Minecraft Server on our...

 Installing TELNET Client in Windows Vista

By default, Vista doesn't install the Telnet client.The client is for text-based communication...

 Internal search for online shops: an essential asset

READ MORE.

 Internal search why and how?

READ MORE.

 Introduction to Brute Force Attacks

Introduction to Brute Force Attacks Today we published a new Learning Center article focused on...

 Introduction to Secure WordPress Sites

READ MORE.

 Introduction to Writing Secure PHP Code

READ MORE.

 Is it still necessary to minify and concatenate your CSS and JS files in HTTP/2?

To work properly, websites contain multiple CSS and JavaScript files. These must be fetched...

 KVM Rescue Mode

Allnet4u enterprise dedicated server provide servers with default configuation.  1- OS stable 2-...

 Keeping SSH session running using Screen

Screen is like a window manager for your console. It will allow you to keep multiple terminal...

 Local ranking factors that help your local business SEO

READ MORE.

 Lost password on server

For clients with VPS and dedicated server.If ever you lost your password login to your portal...

 Monitoring

When you have monitoring enabled, we know if your server is down. If it is, our technical staff...

 Most Important Cyber Security Topics You Should Learn About

READ MORE

 My order can not be processed

If you order was unabled to be processed by the gateway such as PayPal or our Official Merchant...

 Networking for WordPress Administrators

Networking for WordPress Administrators.

 New Requirement for SSL Validation

Nowadays, SSL Certificate becomes a crucial part of the internet and business. SSL Certificate...

 OS re-installation

Here is How to Reinstall your OS or install a new one on your VPS or dedicated server.1- login to...

 Optimizing images for search engines

READ MORE.

 Our Datacenters and IP geolocations

Datacenters: Asia, Australia,  Europe,  North America.   IP address can be in: Montreal,...

 PHP Vulnerabilities Types and How They Originate

READ MORE.

 Page speed as a ranking factor what you need to know

READ MORE.

 Passwords Cracking

READ MORE.

 Penetration Testing Your WordPress Website

READ MORE.

 Personal Data Really Gone When Deleted from a Device

READ MORE.

 Publishing in another language and SEO

READ MORE.

 Ransomware

READ MORE.

 Ransomware And The Importance Of Backing Up

READ MORE.Allnet4u Enterprise shared, reseller and VPS accounts are automatically backed-up by...

 Redirecting your site to non-www and HTTPS

READ MORE.

 Risks of Third Party App Stores

READ MORE.

 Rkhunter Rootkit Hunter Install Guide

rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible...

 SAS Hard Drive

SAS stands for Serial Attached SCSI (SCSI Stands for Small Computer System Interface, typically...

 SATA Hard Drive

SATA stands for Serial Advanced Technology Attachment and it is a type of interface for a hard...

 SEO of an online shop

READ MORE.

 SQL Injection and Database Vulnerabilities

READ MORE.

 SSD Drive

A solid-state drive (SSD) is a nonvolatile storage device that stores persistent data on...

 SSH terminal with Putty

PuTTY (is a free and open-source terminal emulator, serial console and network file transfer...

 SSL Vendor Status explanation

When waiting for your SSL to process you will be provided with status updates straight from the...

 Securing your Working Environment

READ MORE.

 Security Threats and How to Protect Yourself

READ MORE.

 Server API interface

You can configure and complete tasks such, rdns config, active server monitoring, re-install your...

 Sneaky Spammer Tactics and How To Avoid Them?

READ MORE.

 Social buttons How to add and track them on your site

READ MORE.

 Software Terms of Service and Privacy Policies Explained

READ MORE.

 Speed Test Tools for WordPress

Test tools

 Stop words in your focus keyword

READ MORE.

 Storing European User Data on USA Servers

READ MORE.

 The Importance of Clean Computing

READ MORE.

 The Importance of Data Back-Up

READ MORE.

 The best Linux distributions for beginners

READ MORE.

 The definitive guide to higher rankings for WordPress sites

READ MORE.

 The definitive guide to higher rankings for WordPress sites

READ MORE.

 The sense and nonsense of XML sitemaps

READ MORE.

 Too many links in navigation menu

READ MORE.

 Tor Network Frequently Asked Questions

READ MORE.

 Tracking your SEO with Google Analytics a how-to

READ MORE.

 Transition words and SEO

READ MORE.

 Understanding IP Addressing and CIDR Charts

Click here

 Understanding bounce rate in Google Analytics

READ MORE.

 Understanding the Risk of Social Engineering

READ MORE.

 Video on YouTube or on my own site

READ MORE.

 Web Hosting Glossary

The following is a glossary of popular words associated with web hosting. ActiveXA loosely...

 What Are Bots?

READ MORE.

 What Are Browser Hijackers?

READ MORE.

 What Are Cookies?

READ MORE.

 What Are Malicious Websites and Drive by Downloads?

READ MORE.

 What Is Bulletproof Hosting?

READ MORE.

 What Is Malvertising?

What Is Malvertising?.

 What Is Spear Phishing?

READ MORE.

 What Is a Virus?

READ MORE.

 What Personal Information Should You Safeguard?

READ MORE.

 What To Do When You Fall For An Email Scam?

READ MORE.

 What is Cyber Espionage?

READ MORE

 What is Cyberbullying?

READ MORE

 What is HTTPS?

HTTPS secures the connection to the website you are visiting. I’m sure you have seen this in...

 What is Pharming

Pharming is a cyber attack intended to redirect a websites traffic to another, fake site. This is...

 What is Phishing

This is the attempt to acquire sensitive information such as usernames, passwords, and credit...

 What is Social Engineering?

READ MORE.

 What is a Botnet?

READ MORE

 What is cornerstone content?

READ MORE.

 What is the Difference Between Black, White and Grey Hat Hackers?

READ MORE

 What is the KVM recue mode

With your server in KVM rescue mode, you can now carry out the maintenance required to the repair...

 What is the difference between KVM and OpenVZ?

A KVM (do not confuse with KVM rescue for server fix) VPS is like a dedicated server within a...

 What makes a great contact page?

READ MORE.

 What to do about the POODLE SSL Vulnerability?

READ MORE.

 Where to find your servers httpd.conf file

The httpd.conf directory differs across Linux & Unix variants like CentOS, Mac OS X, Red Hat,...

 Which redirect should I use?

READ MORE.

 Why focus on long tail keywords?

READ MORE.

 Why use segments in Google Analytics?

READ MORE.

 WordPress Security for Beginners where to Start?

READ MORE.

 WordPress archive pages the tutorial

READ MORE.

 Wordpress 5 things to do after a hack and prevents future hacks while you are at hit.

Click this link

 XML sitemap

What is an XML Sitemap and why is having one important for SEO? Good question! Think of your...

 Zero Day, Vulnerability Disclosure and News Sources

READ MORE.