A Web.com Partner
It’s important to backup your website files on a regular basis and keep those files in a safe place. When you perform updates to applications or make simple changes to a site, there’s always a chance something will go wrong. As you are running your own server you’ll need to ensure that both your web […]
Read MoreThe Joomla security team have just released a new version of Joomla to patch a critical remote command execution vulnerability that affects all versions from 1.5 to 3.4. This is a serious vulnerability that can be easily exploited and is already in the wild. If you are using Joomla, you have to update it […]
Read MoreWhile many people use the grep command through a pipe | there are more efficient ways of using it. I have nearly killed a server on many occasions by running cat filename |grep some-term while the command tries to list a huge file. Instead simply use egrep which is more efficient in terms of speed […]
Read MoreIt’s important that you create regular backups to mitigate the risk of losing your WordPress site. There are a number of different things that could go wrong so you will need to take a few steps on your own to prevent losing your web site completely. In the following article we’ll discuss what problems could […]
Read MoreThousands of web sites are hacked every day. Hackers and spammers either force entry by brute force guessing your password or they find a backdoor to sneak in via out of date software, bad permissions or poorly written code. Once in, they can install malicious scripts or inject code into your web site. This can […]
Read MoreSometimes when running a ‘yum update’ there are certain packages you may be running which you wish to remain static, or which can potentially cause errors with running a ‘yum update’. In these situations it is useful to force yum to exclude certain packages from being updated under CentOS. Yum uses a configuration file located […]
Read MoreIn today’s world of technology, it is not uncommon to hear about horror stories of people’s private information being stolen and used. There are many ways that a person can be harmed by the revelation of personal information, leaving the subjects vulnerable and sometimes implicated by the law. The more sensitive information is […]
Read MoreIf you lost your phone, tablet or your hard disk on your home computer dies, what would you do? Sure, you can replace the actual hardware, albeit at some expense and annoyance, but you’d eventually be back up and running in the end, right? What about your software and data? What about your […]
Read MoreWho will be managing the server? Depending on the hosting provider, the level of involvement required from your end in the day-to-day operation of the server will vary greatly. This differs from Shared Hosting where the provider is responsible for the maintenance, security and optimisation of the server. Typically, IaaS (Infrastructure as a Service) providers […]
Read MoreAs Donald Rumsfeld was famous for saying, the biggest problems are the unknown unknowns. Put another way, you can be blissfully unaware that something is wrong. Think this applies just to the security of the nation? Think again! One of the most prolific of problems that hosting companies the world over have to deal with […]
Read More