Understanding The Root User And How to Obtain It
If you’re new to the realm of dedicated web hosting, you may suddenly be inundated with a bunch of terms with which you’re unfamiliar. Believe it or not, there’s a…
Understanding The Root User And How to Obtain It
If you’re new to the realm of dedicated web hosting, you may suddenly be inundated with a bunch of terms with which you’re unfamiliar. Believe it or not, there’s a…
How To Connect To Your Server Using SSH
SSH is about as cool as sliced bread, if maybe not a little bit more so. Seriously, it’s a great way to get at your server’s terminal shell, which—as we…
Keep Your Site Safe – Learn What Not to Do
Let’s face it: The Internet isn’t the golden playground it once was, where all could go and have their swing in peace. In fact, it’s now so overrun with bullies…
How And When To Offer SSH Access To Your Customers
If you’re running on a Unix or Linux server, then you likely access your files systems via SSH on a daily basis. However, this might be well and fine for…
How To Deal With A Possible Intruder On Your Server
You’re cruising through your server’s inner network one fine day, when all of a sudden you notice an unfamiliar name accessing your files. This user may have come through SSH,…
Secure Shell or SSH is a security measure that was designed to protect websites from external threats. In the past, users would connect to their servers using Telnet. Now that…
Web Hosting Security – Difference Between SSL, TLS and SSH
One of the most important aspects of web hosting security is the protocol that is used to transfer files from the web server to a visitor’s computer. This is especially…
A Review of the cPanel Preference Menu
The preference menu within the cPanel software interface is an area to change various settings allowing for further customization. This permits clients to view different features in a more comfortable…
File Transfer Protocol or simply FTP, is a feature that has become very popular on the web hosting market. FTP offers capabilities the email system can’t touch, allowing you to…
Protect Your Site From Maliciously Activities
Thousands of vulnerable websites are exploited everyday. In many cases, your site can be victimized without you having the slightest clue. Unfortunately, there are also instances in which your site…