Read More7 top Linux desktop environments compared
READ MOREA Practical Guide to Amazon SEO
READ MOREALT tag and TITLE tag optimization
READ MOREAMP for small business owners
READ MOREASSP and ASSP Deluxe, what's the difference?
ASSP is free to use under GPL license, you can install and use it in your cPanel server.The...Allnet4u Enterprise is not associated with allnet4u.co.il
We got many spams and hacks attempts from allnet4u.co.il under the organisation BEZEQ...Alway Backup your datas
If you lost all your data, how would you react? See how one man faces life after the...Authentication Bypass Vulnerabilities
READ MOREBeware of Misleading Domain Renewals scam
There are a number of companies out there that will contact you and lead you to think your domain...Change a server's hostname in CentOS Check disk space on your server
Check free disk spaceFirst, open a ssh session Type df -h or df -k to list free disk space: $...China Scam Watch
READ MOREChrome 68
On July 24th, Google officially launched Chrome 68.With new features and security...Common Computer Viruses
What is a computer virusA computer virus is a malware program that replicates by making copies of...Common Mistakes with Servers
Although a dedicated server affords you a great deal more power and freedom than other hosting...Configuring IP aliasing
Adding failover IPs to your configuration: Objective IP aliasing is a special network...Credit Monitoring Services and Other Anti-Fraud Protection
READ MOREAllnet4u Enterprise have his shopping cart and clients portal SSL enabled.We use1-...DOS Attacks Explained
READ MORE.All services with Allnet4u Enterprise have anti DDos enabled with auto mitigationData Privacy Ten Ways to Keep Your Data Private
READ MORE.Dedicated Server Info manual
This manual is to be used to make all administrators more sensitive regarding few topics related...Does readability rank?
READ MORE.Duplicate content causes and solutions
READ MORE.Duplicate content issues on my shop
READ MORE.ECommerce usability: the ultimate guide
READ MORE.Editing files in SSH using VI
VI is a Linux text editor that can edit most of the files under a Linux architecture (text files,...Encryption How To Utilize it Online and Why It is Important
READ MORE.With Allnet4u Enterprise your dates are safe. We use SSL approved encryption on our pages.Error Page Codes
This tutorial will show you a few of the most common error codes a server may return. There are...File Upload Vulnerabilities
READ MORE.Fix it SSL v3.0 POODLE Vulnerability
October 19, 2014For servers owner ONLYWith the recent discovery of the the Poodle vulnerability,...Free cPanel license Trial
You can try a cPanel license for 15 days, completely free of charge.READ MORE.Geolocated IP addresse
You have created sites with an international focus and are keen to work on SEO for your target...Google 68
From the beginning, security has been one of Chromeâ€™s core principles and one of the biggest...Gravityscan provides vulnerability and malware scanning for your website
Gravityscan provides vulnerability and malware scanning for any website. We are incredibly...Grayware, Adware, and Madware
What is Grayware, Adware, and Madware?.HTTP status codes and what they mean for SEO
READ MORE.Hacking Prevention Fork Bomb Folder Blaster
What is a Fork BombA fork bomb is the equivalent of a DOS attack on your own system. DOS is short...Half of all WordPress Plugin Vulnerabilities are XSS and Securing FTP
READ MORE.Hardening Your WordPress Site
READ MORE.How Can I Tell If I Have Malware and What Can I Do About It
How Can I Tell If I Have Malware and What Can I Do About It?.How Do Businesses Get Hacked?
How Do Businesses Get Hacked?.How Do Firewalls Prevent Computer Viruses?
How Do Firewalls Prevent Computer Viruses?.How Do I Get Malware on My Computer?
Part 1- READ MORE.Part 2- READ MORE.How Does Malware Get Past Security Software?
How Does Malware Get Past Security Software?.How To Recognize and Avoid Tech Support Scams?
How To Recognize and Avoid Tech Support Scams?.How XSS Vulnerabilities are Created and How to Avoid Them?
How XSS Vulnerabilities are Created and How to Avoid Them?.How a Gmail Password Stealing Scam Works?
How a Gmail Password Stealing Scam Works?.How a Packet Travels Through the Internet?
How a Packet Travels Through the Internet?.How long does propagation take?
Domain propagation can take up to 72 hours to fully go though but this is not always the case and...How many iP you can get with us
We can provide Up (add-ons) to 256x IP's version 4 and 64x IP'd version 6 plus the main server...How to Clean a Hacked Website?
How to Clean a Hacked Website?.Allnet4u Enterprise have backups servers. If you are one of our...How to Clear Your Cache in Internet Explorer
This tutorial will assist you with clearing your cache, which will help your computer run better....How to Detect a Hacked Website?
How to Detect a Hacked Website?.How to Disable XML RPC in WordPress?
XML-RPC service was disabled by default for the longest time mainly due to security reasons. In...How to Fix the Error Establishing a Database Connection in WordPress
Fix Error Establishing a Database Connection in WordPressA guide to resolve Error Establishing a...How to Manually Upgrade WordPress including Themes and Plugins?
READ MORE.How to Prevent Cross Site Scripting Attacks?
READ MORE.How to Restrict WordPress File Permissions and Ownership?
READ MORE.How to analyze your audience?
READ MORE.How to create and use dashboards in Google Analytics?
READ MORE.How to do a Ping
The purpose of this tutorial is to teach you how to do a ping. Pinging is a command which tells...How to do a TELNET on a PC (Windows) OS
From time to time you may need to perform an operation called "TELNET".You can use TELNET to...How to do a Tracert
This tutorial will show you how to run a trace route on a Window operating system. If you are...How to get local reviews and ratings?
READ MORE.How to install an SSL Certificate in cPanel
Installing an SSL Certificate in cPanel requires that the domain be assigned a dedicated IP to...How to optimize a blog post?
READ MORE.How to remove www from your URL?
READ MORE.How to report a fraudulent website to a registrar?
Yesterday, http://www.twitter.com/sconsult and http://www.sherlloch.com/ reported to us on...How to setup a Reverse DNS and a PTR records?
READ MORE.Our Virtual server and dedicated server clients can configure their own rDNS thru their...How to use social media?
READ MORE.I'm getting a Resource Limit Is Reached error
If you are seeing the following when visiting your website, it means that CloudLinux has stopped...IP address with geolocation
You have created sites with an international focus and are keen to work on SEO for your target...IP class 4 and IP class 6
For dedicated server owners.Each IP you order is class 4 Failover and are switchable between your...IP class Failover
All IP4 are Failover (except the main one).We advice to set your server and sites with IP...IRS Scam Calls
What is an IRS Scam CallAn IRS Scam Call is when scammers make unsolicited calls. These scammers...Improve local SEO with Google My Business
READ MORE.Install Minecraft on centos 7.x OS
In this tutorial, we will be guiding you through the set up of a Minecraft Server on our...Installing TELNET Client in Windows Vista
By default, Vista doesn't install the Telnet client.The client is for text-based communication...Internal search for online shops: an essential asset
READ MORE.Internal search why and how?
READ MORE.Introduction to Brute Force Attacks
Introduction to Brute Force Attacks Today we published a new Learning Center article focused on...Introduction to Secure WordPress Sites
READ MORE.Introduction to Writing Secure PHP Code
READ MORE.Is it still necessary to minify and concatenate your CSS and JS files in HTTP/2?
Allnet4u enterprise dedicated server provide servers with default configuation. 1- OS stable 2-...Keeping SSH session running using Screen
Screen is like a window manager for your console. It will allow you to keep multiple terminal...Local ranking factors that help your local business SEO
READ MORE.Lost password on server
For clients with VPS and dedicated server.If ever you lost your password login to your portal...Monitoring
When you have monitoring enabled, we know if your server is down. If it is, our technical staff...Most Important Cyber Security Topics You Should Learn About
READ MOREMy order can not be processed
If you order was unabled to be processed by the gateway such as PayPal or our Official Merchant...Networking for WordPress Administrators
Networking for WordPress Administrators.New Requirement for SSL Validation
Nowadays, SSL Certificate becomes a crucial part of the internet and business. SSL Certificate...OS re-installation
Here is How to Reinstall your OS or install a new one on your VPS or dedicated server.1- login to...Optimizing images for search engines
READ MORE.Our Datacenters and IP geolocations
Datacenters: Asia, Australia, Europe, North America. IP address can be in: Montreal,...PHP Vulnerabilities Types and How They Originate
READ MORE.Page speed as a ranking factor what you need to know
READ MORE.Passwords Cracking
READ MORE.Penetration Testing Your WordPress Website
READ MORE.Personal Data Really Gone When Deleted from a Device
READ MORE.Publishing in another language and SEO
READ MORE.Ransomware And The Importance Of Backing Up
READ MORE.Allnet4u Enterprise shared, reseller and VPS accounts are automatically backed-up by...Redirecting your site to non-www and HTTPS
READ MORE.Risks of Third Party App Stores
READ MORE.Rkhunter Rootkit Hunter Install Guide
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible...SAS Hard Drive
SAS stands for Serial Attached SCSI (SCSI Stands for Small Computer System Interface, typically...SATA Hard Drive
SATA stands for Serial Advanced Technology Attachment and it is a type of interface for a hard...SEO of an online shop
READ MORE.SQL Injection and Database Vulnerabilities
READ MORE.SSD Drive
A solid-state drive (SSD) is a nonvolatile storage device that stores persistent data on...SSH terminal with Putty
PuTTY (is a free and open-source terminal emulator, serial console and network file transfer...SSL Vendor Status explanation
When waiting for your SSL to process you will be provided with status updates straight from the...Securing your Working Environment
READ MORE.Security Threats and How to Protect Yourself
READ MORE.Server API interface
You can configure and complete tasks such, rdns config, active server monitoring, re-install your...Sneaky Spammer Tactics and How To Avoid Them?
READ MORE.Social buttons How to add and track them on your site
READ MORE.Software Terms of Service and Privacy Policies Explained
READ MORE.Speed Test Tools for WordPress
Test toolsStop words in your focus keyword
READ MORE.Storing European User Data on USA Servers
READ MORE.The Importance of Clean Computing
READ MORE.The Importance of Data Back-Up
READ MORE.The best Linux distributions for beginners
READ MORE.The definitive guide to higher rankings for WordPress sites
READ MORE.The definitive guide to higher rankings for WordPress sites
READ MORE.The sense and nonsense of XML sitemaps
READ MORE.Too many links in navigation menu
READ MORE.Tor Network Frequently Asked Questions
READ MORE.Tracking your SEO with Google Analytics a how-to
READ MORE.Transition words and SEO
READ MORE.Understanding IP Addressing and CIDR Charts
Click hereUnderstanding bounce rate in Google Analytics
READ MORE.Understanding the Risk of Social Engineering
READ MORE.Video on YouTube or on my own site
READ MORE.Web Hosting Glossary
The following is a glossary of popular words associated with web hosting. ActiveXA loosely...What Are Bots?
READ MORE.What Are Browser Hijackers?
READ MORE.What Are Cookies?
READ MORE.What Are Malicious Websites and Drive by Downloads?
READ MORE.What Is Bulletproof Hosting?
READ MORE.What Is Malvertising?
What Is Malvertising?.What Is Spear Phishing?
READ MORE.What Is a Virus?
READ MORE.What Personal Information Should You Safeguard?
READ MORE.What To Do When You Fall For An Email Scam?
READ MORE.What is Cyber Espionage?
READ MOREWhat is Cyberbullying?
READ MOREWhat is HTTPS?
HTTPS secures the connection to the website you are visiting. I’m sure you have seen this in...What is Pharming
Pharming is a cyber attack intended to redirect a websites traffic to another, fake site. This is...What is Phishing
This is the attempt to acquire sensitive information such as usernames, passwords, and credit...What is Social Engineering?
READ MORE.What is a Botnet?
READ MOREWhat is cornerstone content?
READ MORE.What is the Difference Between Black, White and Grey Hat Hackers?
READ MOREWhat is the KVM recue mode
With your server in KVM rescue mode, you can now carry out the maintenance required to the repair...What is the difference between KVM and OpenVZ?
A KVM (do not confuse with KVM rescue for server fix) VPS is like a dedicated server within a...What makes a great contact page?
READ MORE.What to do about the POODLE SSL Vulnerability?
READ MORE.Where to find your servers httpd.conf file
The httpd.conf directory differs across Linux & Unix variants like CentOS, Mac OS X, Red Hat,...Which redirect should I use?
READ MORE.Why focus on long tail keywords?
READ MORE.Why use segments in Google Analytics?
READ MORE.WordPress Security for Beginners where to Start?
READ MORE.WordPress archive pages the tutorial
READ MORE.Wordpress 5 things to do after a hack and prevents future hacks while you are at hit.
Click this linkXML sitemap
What is an XML Sitemap and why is having one important for SEO? Good question! Think of your...Zero Day, Vulnerability Disclosure and News Sources