Articles
There are a few things that need to be cleared in terms of terminology: 1. Hits - this simply...
Common SSH Commands - Linux Shell CommandsNavigating in UNIX pwd Shows the full path of the current directory ls Lists all...
Creating a Welcome message for SSH loginsDid you ever want to change or create a new login message anytime someone logs into SSH?First off...
Facts on Data Size and BandwidthHow much data is in a megabyte (MB)? How about a gigabyte (GB)? First, let's get some context....
How to Harden WordPress From Attackers!If you or your company have WordPress sites, there are two things to consider. First is to avoid...
How to Unblock your IP address for your hosting accountIf you find that you are unable to view your site and receive a message saying your ip address is...
Phishing - Protect your Identity and FinancesPhishing is the name given to an increasingly common type of spam (unsolicited emails) designed...
Protecting Yourself Against Viruses & Data LossIt is vital to ensure your computer is protected from viruses and trojans. As well as installing...
Static IP vs. Dynamic IP AddressStatic IP addresses remain fixed, that is to say unchanging. Static IP's are advantageous if you...
What are Nameservers, and Where Can I Edit Them?A nameserver (NS) is an authoritative server that provides up-to-date DNS records for a given...
What are Private (Custom) Nameservers, and How do I Set Them Up?Skip below to #1 for the step-by-step instructions! Private nameservers are used mainly for...