Articles

Block URL on MikroTik If you are managing a network and you would like to filter specific web site URL's (such as... WordPress plugins: TinyMCE advanced TinyMCE (i.e. Tiny Moxiecode Content Editor) is one of the most commonly used plugins for... .AU registration rules Want your website to show off your Australian pride or simply targeting the Australian market?... .CN registration regulations To register .CN domains, we need authentic proof that the client is of Chinese nationality or... .DE domain name rules/requirements So, you want to host a site on a domain that has the .de TLD? It is possible, however, like most... .gov Domains explained If you want to have a website up on the internet, you must choose and buy a domain name. Once you... 10 Factors of On-page SEO In order to succeed on Googles SERPs, then you have to play the SEO game. Over the past years... 10 PUTTy tips and tricks In this article we will describe ten different PuTTy tips and tricks for you to have a better... 11 things that will keep you safe on the internet Cybersecurity is a very broad topic which is growing day by day and has the notion that this is... 12 Tips to get the Traffic flowing If you’re reading this post, most likely you’re also having trouble getting traffic to your... 20 ways to increase WordPress SEO SEO is an acronym that stands for Search Engine Optimization. It’s a strategy used by website... 35 Sites to learn coding for free Internet is filled with all types of information, thus security has become one of the key... 5 Best mail servers for Linux OS 5 Best Mail Servers for Linux OSThis Linux mail servers can be installed on all linux... 5 best plugins to create a landing page on WordPress 1. Beaver Builder pluginBeaver Builder includes a set of content modules that help build landing... 6 WordPress automation Plugins for 2020 There’s a lot of things that we put effort and time into completing but some (or most) of them... 8 Ways to secure your Linux VPS Server Nowadays the use of Linux servers on the cyber-space has grown enormously and with it the amount... 8 Ways to secure your Linux VPS server Nowadays the use of Linux servers on the cyber-space has grown enormously and with it the amount... A general introduction to cloud computing Introduction The impact of cloud computing on industry and end users would be difficult to... Activate OpenSSH client in Windows 10 Activating OpenSSH Client in Windows 10 OpenSSH is the open-source version of the Secure Shell... Add users to local group with PowerShell This tutorial is based on PowerShell 5.1 and above, which is installed on Windows 10, Windows... Admin backup in DirectAdmin Admin Backup in DirectAdmin VPSTo avoid potential problems in hosting server, the host manager or... An introduction to DNS terminology, components and concepts viewsIntroductionDNS, or the Domain Name System, is often a very difficult part of learning how... An introduction to GraphQL IntroductionGraphQL is a query language for APIs and a runtime for fulfilling those queries with... Backup database from phpMyAdmin Making backups is necessary for every host and of databases. We want to describe how to make a... Backup database from phpMyAdmin Making backups is necessary for every host and of databases. We want to describe how to make a... Best social media management tools for 2020 Marketing is not the same as it was 10 years ago. People don’t have time to read newspapers or... Best CMS Sofware in 2020 CMS is abbreviated as content management service which is mostly used when you are building and... Best PC CPU recommendations for 2020 So you have an outdated CPU in your system and want to upgrade? Now is a good time to do that as... Best and fastest DNS servers for 2020 Best & Fastest DNS Servers For 2020When surfing the world wide web, we tend to simply type in... Block IP or network in MikroTik To block or accept traffic in mikrotik, follow below steps: At first we should login to the... Change MAC address through the registry Changing MAC address through the registry For changing MAC address in Windows through registry... Change SSH port on MikroTik using Winbox To guarantee the MikroTik security and to avoid any kind of attack, one of the security... Change username and password on Mikrotik In order to have unauthorized access, hackers need to have basic information in order to... Changing the Apache port in CentOS Apache is a free and open-source cross-platform(Linux & Windows) web server software. It... Changing the password in DirectAdmin Changing the Password in DirectAdmin serverFirst, log in to the DirectAdmin admin panel.Click... Changing the password in WHM Changing the Password in WHMWhat does WHM mean? WHM stands for Web Host Manager which gives... Changing wp.config permission Increasing security in WordPress by changing the configuration files permission... Chrome will not allow sites to detect Incognito mode users Despite the controversies around the name, Google attempts to bring as much comfort and usability... Command Prompt (CMD) tricks that you must know. It's fun to explore more about Windows, use Command prompt to get things done pretty fast simply... Compress .jpeg .png images One way to increase SEO and website optimization is to increase the site loading speed; the... Configure NTP server on MikroTik In order to reach maximum productivity, you want to have the time on all the machines in your... Configure Windows 10 update through registry In this tutorial, you will learn how to control Windows update settings through the registry. For... Connect to SFTP on Ubuntu without Shell access Connect to SFTP on Ubuntu Without Shell AccessFirst of all, before we begin this tutorial and its... Connect to STFP on CentOS without Shell access Connect to SFTP on CentOS Without Shell AccessFirst of all, before we begin this tutorial and its... Create local user with PowerShell Dear reader, this tutorial is based on PowerShell 5.1 and above, which is installed on Windows... Creating local group with PowerShell this tutorial is based on PowerShell 5.1 and above, which is installed on Windows 10, Windows... Creating packages in DirectAdmin In this tutorial, we will explain how to create packages using DirectAdmin. Packages are all of... Cross-site scripting explanation and prevention guidelines There are numerous ways that a site’s security can be compromised. One possible method of attack... DNS configuration on MikroTik To add and get acquainted with setting up the DNS to all MikroTik Router: select IP > DNS. A... Deactivate installed Plugins in WordPress Deactivate Installed Plugins in WordPressThere are two methods to disabling your plugins. One... Deactivating WordPress plugins directly from the database Deactivating WordPress Plugins Directly from the DatabaseYou can easily disable all WordPress... Disable Windows update from group policy Disable Windows UpdateOne of the ways to disable Windows from updating automatically, is by... Disable WordPress plugin and theme editor Disable WordPress Plugin and Theme EditorIt’s not too difficult to make a strong case for... Disk cleanup methods in CentOS Disk cleanup in CentOS 6, 7, 8In this article we will go through some quick commands to clear... Encountering WordPress database error message   First, let’s examine what this error message actually means. Your database uses a language... End of life: Windows server and SQL server 2008 and 2008 R2 Microsoft Windows Server 2008 and 2008 R2 were both great technological breakthroughs in the... Facebook pans to use your photos for advertisement Recently Facebook was granted a patent in the US for a system which detects items like alcoholic... Fiber optics: Harness the speed of light We are used to transmitting data through regular copper wires, however they come with a great... Find out who is the owner of a domain name So you have a new and amazing idea for a site. Great, you spent hours trying to come up with a... Finding files in Ubuntu 20.04 The most popular open-source operating system Ubuntu 20.04, an LTS (Long Term Support) version.... Gatsby CLI quick reference IntroductionWhen working with Gatsby.js, we constantly make use of its built-in command line... Google BERT A few months ago, Google announced what they believe to be their most important search engine... Google Chrome shortens inks automatically Over the recent past, new updates for Google Chrome are happening very frequenty. These changes... Google SERP features for 2020 We all know how important Google is for everyone in the globe. Every second Google processes... Google domain diversity update Have you ever searched for something and saw most of the top results are from the same website?... Google stops the development of first-party tablet Just last year Google has released the Pixel Slate, its first Chrome OS-fueled tablet. With two... HAProxy network error : Cannot bind socket This tutorial series explains how to troubleshoot and fix some of the most common errors that you... Helium HDDs: How and why? Solid State Drives are a relatively new technology and are way too expensive to implement as an... Hide Plugin from WordPress dashboard Do you want to have one or multiple of your WordPress plugins hidden yet still running and fully... Hide wp-config on WordPress site Protecting the WordPress wp-config.php file is another way to beef up your WordPress security.... History of the Internet: When it all began The internet is something that everyone uses and being connected is a must for a lot of people... How To Change Your TREJJ VPN Location By default, your VPN router connects randomly to the nearest and least congested server each time... How do I force my website to use SSL? From time to time we are asked how you can force your website visitors to view your website over... How does SMTP work? What is SMTP?We all have heard the term IP, short for Internet Protocol. We need an IP to access... How important is Website speed?  With the current hectic lives people lead, there is nearly no extra time in many individuals’... How introduction to regular expressions As system administrators, developers, QA engineers, support engineers, etc. one needs to find a... How to access a Linux server using an iOS device Accessing your Linux server SSH using an iOS device In order to connect to the Linux VPS server... How to add CAPTCHA on WordPress How to Add CAPTCHA on WordPress:   In this tutorial, we will demonstrate how to add CAPTCHA to... How to add CAPTCHA on WordPress How to Add CAPTCHA on WordPress:   In this tutorial, we will demonstrate how to add CAPTCHA to... How to add an extra IP to CentOS 7 How to Add an Extra IP to CentOS 7?Sometimes you need to add more than one IP to a NIC (i.e.... How to add another domain in DirectAdmin Add another domain in DirectAdmin: (each step is followed by a visual representation of it) Log... How to add another domain in DirectAdmin Add another domain in DirectAdmin: (each step is followed by a visual representation of it) Log... How to add extra IPs on Windows VPS server This article shows you how to add an additional IP address to a Windows Server. The steps are... How to add extra IPs to Ubuntu OS How to Add Extra IPs to Ubuntu OS?If you want to add an extra IP on one NIC (Network Interface... How to add two-way data binding to custom components in Vue.js IntroductionIn this article, you will learn about how to add the v-model directive for custom... How to add v-model support to custom Vue.js components viewsIntroductionThe v-model directive is one of the few directives that comes bundled with... How to back up MikroTik configuration Making backups and saving configurations is the most important section on MikroTik. To create... How to block port scanner in MikroTik Some applications or sites can scan your MikroTik operating system and gain detailed reports... How to build a custom Terraform module IntroductionTerraform modules encapsulate distinct logical components of your infrastructure by... How to buy a Domain name If you’re planning on getting your website available for the general public then you have to get... How to change MAC address in Windows 10 How to change MAC address in Windows 10As you might know, changing the MAC address in an... How to change RDP port In this article, we are going to change rdp port used in Remote Desktop access. By default, the... How to change SSH Port on CentOs 6, 7 and 8 How to change SSH port on centos 6Changing SSH Port will help to secure your Linux VPS server,... How to change the password of a Linux VPS and server Once you order your Linux VPS (Virtual Private Server), the service provider provides you with... How to check bandwidth usage in cPanel What is Bandwidth?In web hosting, bandwidth is usually described in terms of data transmission... How to check bandwidth usage in cPanel What is Bandwidth?In web hosting, bandwidth is usually described in terms of data transmission... How to choose a secure password With the current trend of technological advancements, we now store nearly all our data on the... How to choose the best domain for my business A domain name is the name of your website, which people type on their browsers to access your... How to clear DNS Cache on Windows In this article, we will show how to clear the DNS cache on Microsoft Windows OS. DNS cache... How to clear WordPress cache If you made some changes to your website but you can’t see the content? Well then a solution... How to configure Nginx as a Web server and reverse Proxy for Apache on Ubuntu 20.04 server The author selected the Electronic Frontier Foundation to receive a donation as part of the Write... How to connect SSH on Linux via MikroTik Winbox Suppose that you use Mikrotik and wish to connect via SSH to another Linux server. You can do so... How to connect to Kali Linux in Windows with RDP Using Kali Linux graphical environment (GUI) in Windows. After installing Kali Linux on Windows,... How to connect to Linux VPS server via Android How to connect to linux VPS server Via Android In the previous article we explained how to... How to connect to Windows VPS using an Android device How Connect to windows VPS server From Android DeviceImagine you are a proud owner of a VPS where... How to connect to Windows server via iOS Connecting remotely to a server (iOS)Imagine there’s a situation where you have to access your... How to connect to a Linux Server/VPS When dealing with servers, most of us don't have access to the physical server. So this tutorial... How to connect to a Linux server/VPS When dealing with servers, most of us don't have access to the physical server. So this tutorial... How to connect to a Windows VPS using an Android device How Connect to windows VPS server From Android DeviceImagine you are a proud owner of a VPS where... How to connect to a Windows server and Windows VPS This article will guide you on how you can connect to a Windows server using Remote Desktop from... How to connect to remote desktop. What is remote desktop? Remote Desktop is a Microsoft Windows application that allows remote control of a windows machine... How to create DMARC record on cPanel How to create DMARC record on cPanel VPS?In this tutorial, we will learn how to build the DMARC... How to create Webmail in Plesk How to create and manage webmail in Plesk Mail service is one of the most useful services which... How to create a Sudo user on Debian How To Create a Sudo User on DebianIn this guide, we will show you how to create a new user on a... How to create a Windows live USB There is great functionality in having a fully working version of Windows that you could boot... How to create a calibre Ebook server on Ubuntu 18.04 Introductioncalibre is a free and open source ebook manager that’s well known for its... How to create a calibre Ebook server on Ubuntu 20.04 Introductioncalibre is a free and open source ebook manager that’s well known for its... How to create a new account in CWP How to Create a New Account in CWPIn this article, we will be explaining to you how to set up the... How to create an email account in Plesk panel The following guide will show you how to create an email account within your Plesk hosting... How to create and activate free Webmail service The organizations have different requirements for communication based on organization size or... How to create and manage Webmail in cPanel How to create and manage webmail in cPanel server Mail service is one of the most useful... How to create and restore backups in CWP This tutorial is dedicated for the creation and restoration of backups in CWP(CWP Installation).... How to create child name servers How to Create Child Name ServersBefore explaining child name servers, it’s better to get some... How to create email accounts in DirectAdmin How to create email accounts in DirectAdminTo create an email account in DirectAdmin VPS, follow... How to create email aliases in Plesk An alias is an email address that has the purpose to forward emails. This means that alias does... How to create or delete hosting packages in CWP In this tutorial, we will guide you on how to create and delete hosting packages in CWP(How to... How to create or delete hosting packages in CWP In this tutorial, we will guide you on how to create and delete hosting packages in CWP(How to... How to delete my site publisher page When you have created your own website and you are ready to replace your quick and easy Site... How to disable automatic updates in Windows 10 As you may know, Microsoft constantly releases new updates to tackle newly arising Windows... How to disable network manager in CentOS 7 Disable Network Manager in CentOSIn order to install some applications on CentOS 7 VPS Server, we... How to edit WordPress dashboard menu Have you ever wanted to re-arrange or remove items from your WordPress admin menu? Maybe hide the... How to emulate a Webcam in a video call In these trying times, everybody who can possibly work online is doing so. More and more... How to enable antivirus for Email in Plesk Despite the global efforts in cybersecurity, the internet is still a very dangerous place, filled... How to find a file in Windows When you are in a hurry and want to find a particular file whose location you have forgotten,... How to find and fix mixed content warnings on Https sites Simply supporting HTTPS isn’t always enough — you also need to know how to identify and fix mixed... How to fix Copy/Paste in Windows VPS remote connection Using a VPS is a great solution if you need a bit more performance and administrator access.... How to fix WordPress connection timeout One of the common WordPress error is the ‘connection timed out’ which is caused by an... How to fix the WordPress white screen of death What is python?Python is a general purpose, high-level, object-oriented script. It is open source... How to fix the syntax error in WordPress website How to Fix the Syntax Error in WordPress websiteTypically, this happens because a snippet of code... How to force Windows 10 to restart, emergency restart. Emergency restart is a hidden power option on Windows 10 that you can use when an immediate... How to handle Routing in React Apps with React router IntroductionIn React, routers help create and navigate between the different URLs that make up... How to increase PHP memory limit in DirectAdmin To change upload size in DirectAdmin you need to edit php.ini Firstly you need to find your... How to increase the speed of website How to increase site speed? Nowadays we won’t visit a site which takes ages to load. I mean when... How to install Apache on Windows Apache is one of the most popular web server software, developed and maintained by Apache... How to install CentOs Web panel in CentOs How To Install CentOS Web Panel In CentOSCentOS Web Panel (CWP) is a free web hosting control... How to install Dude on MikroTik If you are an admin of a network, you should always monitor the network and know what goes on in... How to install Git on CentOS 7 How to install Git on CentOS 7Git is a utility for Linux administrators who need to install... How to install Kali Linux How To Install Kali Linux Kali Linux is a Debian-based Linux distribution aimed at advanced... How to install LAMP Ubuntu 18.04 The LAMP stack is a set of open-source software used for web application development. For a web... How to install LEMP on Ubuntu 18.04 How to install LEMP on Ubuntu 18.04What is LEMP? LEMP is an acronym for Linux, Nginx, MySQL, and... How to install LEMP on the Debian 9 How to install LEMP on Debian 9LEMP is an acronym which stands for the software stack: Linux... How to install Laravel on localhost XAMPP How to Install Laravel on Localhost XAMPPAt first, you should install XAMPP on your computer. To... How to install Open JDK on CentoOS How to Install OpenJDK on CentOSOpenJDK is a Java implementation and compilation platform that is... How to install OpenVPN on CentOs8 VPN or virtual private network allows you to create your own internet in the World Wide Web. You... How to install Python 3 on Debian 9 How to install Python 3 on Debian 9Well, so far, with this Python definition we will be working... How to install Python on Ubuntu 18.04 What is python?Python is a general purpose, high-level, object-oriented script. It is open source... How to install Python3 0n CentOS7 How to Install Python 3 on CentOS 7What is Python? Python is a general purpose, high-level,... How to install Redis on CentOs8 Redis:According to Wikipedia, this Remote Dictionary Server is an in-memory data structure... How to install WordPress on Plesk How to Install WordPress on Plesk In Plesk web hosting control panel, you can install WordPress... How to install WordPress on cPanel How to Install WordPress on cPanel VPS WordPress is one of the most popular CMSs (Content... How to install XAMPP on Windows XAMPP is the most popular software package which is used to set up a PHP development environment... How to install a free SSL on a shared Web host Let’s Encrypt is a free SSL certificate provider and verifier. It is becoming more and more... How to install and configure Elasticsearch on CentOS 8 IntroductionElasticsearch is a platform for the distributed search and analysis of data in real... How to install and configure Heartbeat control for WordPress The WordPress Heartbeat API is a great feature that provides real-time communication between the... How to install and configuring CSF ConfigServer Firewall, also known as CSF, is a firewall configuration script created to provide... How to install anti-rootkit on CentOS7 utorial on installing Anti-Rootkit in CentOS 7 1. Connect to your Linux VPS with SSH(How to... How to open PowerShell as Administrator 1. Run PowerShell from CMD to run powershell from cmd there is only need type PowerShell in... How to prevent data corruption on your PC Data corruption is basically a common system error or bug that occur due to loss of data or... How to prevent line breaks using CSS IntroductionDevelopers typically like to wrap text on a web page. Wrapping constrains text in one... How to re-open browser tabs you've previously closed accidentally Have you ever had two or more tabs open in your web browser and closed one of them by accident,... How to register your site Yahoo Search engines rely on an automatic system in order to find and index the sites they show in... How to register your site with Bing In our recent post about how to submit a website to Yahoo, we went over the importance of and the... How to register your site with Google Search engines are designed around automation, thus they use web crawlers to find and index new... How to register your site with Yandex Google is an undisputed champion when it comes to search engines, holding a vast 90% of the... How to remove Xor DDos Trojan from Linux Trojan Identification Before doing anything, you need to make sure that the Trojan exists on... How to repair Windows with DISM command How to repair Windows with DISM command?In this tutorial we will demonstrate how to repair... How to repair WordPress database How to Repair WordPress DatabaseWordPress database runs on the database management system, MySQL.... How to replace all instances of a string in Javascript Replacing text in strings is a common task in JavaScript. In this article, you’ll look at using... How to rewrite URLs with mod_rewrite for Apache o Ubuntu 18.04 IntroductionApache’s mod_rewrite module lets you rewrite URLs in a cleaner fashion, translating... How to rewrite URLs with mod_rewrite for Apache on Ubuntu 20.04 Introduction Apache’s mod_rewrite module lets you rewrite URLs more cleanly, translating... How to route Web traffic securely without a VPN using a socks IntroductionAt some point, you may find yourself on a network that is insecure or has an overly... How to secure Windows VPS server, ultimate Windows security A VPS server is a great hosting option if you want more control over your server without dishing... How to set up IPv6 on Ubuntu Linux server How to Configure Public IPV6 to Ubuntu Linux Server In the previous article we discussed what... How to set up IPv6 on Windows VPS server Since its introduction in 1983, IPv4 has been the standard protocol for internet routing, however... How to set up a continuous deployment pipeline with GitLab CI/CD on Ubuntu 18.04 IntroductionGitLab is an open source collaboration platform that provides powerful features... How to set up mail forwarding in Plesk In this tutorial, we will guide you through the process of setting up mail forwarding for an... How to set up password protected director in Plesk When you add password protection to a directory, site visitors are prompted for a username and... How to test your current broadband speed directly from Chrome We have soo many online tools used to test the internet speed, and to to know how fast your... How to transfer (upload and download) files to and from Windows VPS There are different ways to transfer files between virtual private servers and computers, or vice... How to transfer (upload and download) to and from Windows VPS There are different ways to transfer files between virtual private servers and computers, or vice... How to troubleshoot common HAProxy errors Part of the Series: Common HAProxy ErrorsThis tutorial series explains how to troubleshoot and... How to troubleshoot common HAProxy errors Part of the Series: Common HAProxy ErrorsThis tutorial series explains how to troubleshoot and... How to update CentOS 7 How to update CentOS 7One of the most important issues in managing a server, as well as... How to update MikroTik OS As we know, every device requires updates to work correctly and fix bugs. Updates are released in... How to upload files to a Linux VPS from Windows How to Upload Files to a Linux VPS from Windows?In this article, we will explain how to upload... How to use SMTP on Laravel How to use SMTP on Laravel Laravel is a PHP framework that has been featured today by many... How to use Traefik v1 as a reverse Proxy for Docker containers on Ubuntu 20.04 The author selected the Electronic Frontier Foundation to receive a donation as part of the Write... How to use Traefik v2 as a reverse proxy for docker containers on Ubuntu 20.04 IntroductionDocker can be an efficient way to run web applications in production, but you may... How to use the ng-container element in Angular Introductionng-container is an element available in Angular 2+ that can act as the host to... How to use the res object in Express In this article, you will learn about the res object in Express. Short for response, the res... Increase WordPress security by setting password for wp-admin As you know, the wp-admin directory is one of the most important dictionaries in WordPress, and... Increase memory restriction in WordPress Increase Memory Restriction in WordPressDefault WordPress installation is limited to 32MB. This... Increasing allocated memory in WordPress Web servers are just like any other computer. They need memory to efficiently run multiple... Install GNOME and VNC server on CentOS Install GNOME and VNC Server on CentOSLinux servers are based on a command-line interface by... Install and configure FTP server on Ubuntu 18 Install and Configure FTP Server in Ubuntu 18Note: At all stages, the commands are logged with... Installing Kali Linux in Windows through Microsoft store We have shown how to install Kali Linux on your system, however, sometimes we want to keep the... Installing Laravel on cPanel through SSH Installing Laravel on cPanel through SSHLaravel attempts to take the pain out of development by... Installing Windows server's features and roles through PowerShell Installing Windows Server’s Features and Roles through PowerShell.In this tutorial we will... Introducing "Contact form to email" WordPress plugin Disable WordPress Plugin and Theme EditorIt’s not too difficult to make a strong case for... Introduction to IPv6 and what is IPv6 Internet Protocol version 6 (IPv6) is the next generation of the Internet Protocol (IP). IPv6 was... L2TP/PSK CONFIGURATION PROCEDURE FOR WINDOWS 10 This tutorial will show you how to manually and easily set up a VPN for devices running Windows... L2TP/PSK MANUAL CONFIGURATION PROCEDURE ANDROID DEVICE This tutorial will show you how to manually and easily set up a VPN for android devices using the... L2TP/PSK MANUAL CONFIGURATION PROCEDURE iOS Devices This tutorial will show you how to manually and easily set up a VPN for android devices using the... Man In The Middle Attack. What is it? A man-in-the-middle attack takes place amongst 3 entities which include two legitimate entities... Managing Windows services with PowerShell PowerShell is a task automation and configuration management framework from Microsoft. Today we... MikroTik bandwidth test In MikroTik devices you can test the bandwidth to where you are linked. To test and ensure that... Most common cyber security threats and how to mitigate them Most common Cyber-Attacks? A cyber attack is an action which targets computer systems,... Most important WordPress plugins 2020 WordPress was initially started as a blogging tool, but after time it has evolved itself into the... Most useful Windows shortcut The amount of PC and laptop users is growing year by year. Whether you need a computer for your... Off page SEO: Link building strategies and much more Off page SEO are all the factors which takes place outside of your website which has an impact on... On page vs. off page SEO SEO is a term that has been around almost since the beginning of the internet. Since then... Optimize WordPress from phpmyadmin Optimizing Mysql DatabasesDatabases have the potential to grow very large, particularly on sites... Port forwarding on MikroTik Imagine your an IT administrator. You created a big network and someone wants to remotely connect... Redirection in WordPress Redirection in WordPress At this tutorial, we want to get some informs about a WordPress plugin... Removing users and groups through PowerShell PowerShell is a tool for system and network administrators with countless usages. One of them is... Reseller API SSL and TLS, the whole nine yards Internet is filled with all types of information, thus security has become one of the key... SSL certificate? Can I use that on my CV? Sadly this certification cannot be used on your CV when you’re applying for a jobL. So what is... Servers vs. Home desktop computers There are desktop computers and then there are VPS Server computers but how different are they... Set Mikrotik date and time At first, maybe we think the time and date is not important but after we get more experience we... Set up localhost on macOS High Sierra (Apache, MySQL, and PHP 7) with SSL/HTTPS   Turn on Apache Open Terminal by clicking on the magnifying glass at the top right corner... Setting the time zone through PowerShell Setting Time Zone through PowerShell.Setting Time Zone in Windows is one of the important actions... Setting up and using mail list in Plesk Setting up and using mailing list on Plesk (Windows) If you are looking to send emails to a... Shared Vs Dedicated business internet plan: What's the difference? Shared vs Dedicated Business Internet Plans: What’s the Difference? When you’re deciding on the... Solving Kali Linux packages not installing in Windows problems Kali Linux Packages not Installing in WindowsWhen installing Kali Linux on Windows, there could... Solving WordPress internal server errors Resolving WordPress Internal Server ErrorInternal Server Error is one of the errors that... Strategy to get backlinks for free What are backlink on a website? Backlinks are the incoming links to a specific page on a website.... Subnet Mask Cheat Sheet   Addresses Hosts Netmask Amount of a Class C /30 4 2 255.255.255.252 1/64... Switching firewalld to iptables on CentOS Switching firewalld to iptables on CentOSOne of the most important changes to be made in the... TREJJCOMMS Domain control panel TREJJCOMMS acts not only as a hosting provider, but also as a domain registrar. In order to... The advantages of using a CDN The distance between a client and a server substantially affects the load times the client... The best inventions of the last decade as of 2020 The last decade has been rich with technological advancements in both hardware and software. The... The difference between Business and Enterprise Emails You have probably heard of both business and enterprise email services before, but what exactly... The guide to network optimization What Is Network Optimization?The Internet is not a single network, but a huge network of... The importance of two-factor Authentication As cyber attacks become more and more common, protecting your personal data is becoming... The latest HDD storage technologies The Latest HDD Storage TechnologiesSince development of the first hard drive in 1956, which... The most common cyber myths Common Security MythsWhen we’re surfing online, there are many ways to fall under a security... The next step for your WordPress site The growing computer culture is allowing more people than ever to join and start having their own... The ultimate CMS comparison In our previous article about content management systems, we explained what is a CMS, its... Top 5 Intranet solutions for your Digital workplace Top 5 Intranet Solutions for your Digital WorkplaceWhat is Intranet?An Intranet is a... Traceroute on Mikrotik In this article we want to learn about Traceroute on MikroTik. It is a command-line program which... Transfer WordPress site from host to another host The biggest risk when switching web hosting or migrating a website to a new server is data loss... Transfer domain to TREJJCOMMS Transfer Domain to TREJJCOMMSIf you have an active domain and need to transfer it to a new... Transferring your domain away from TREJJCOMMS Do you want to transfer domain out to another registrar?This article explains how to prepare your... Troubleshoot and prevent the Mozilla firefox crash Firefox can crash due to various reasons, but how fast it crashes that much fast it can be fixed.... Types of IP addresses and what is IP address used for Most people do not give a second thought about how the internet works. It is a complicated web of... Understanding Queries in GraphQL In this tutorial, we’ll take an in-depth look at queries in GraphQL so that you better understand... Using Get-Help command in PowerShell Get-Help command is one of the most useful commands in PowerShell. It helps you to get to know... Using OX App Suite with an Email Program You can also use OX App Suite on Apple® iOS®, Android devices, and with other mobile... VPS or dedicated server: What should you choose? What is difference of VPS and dedicated server?Shared hosting is the most widely used and... View content in 8k with the new DisplayPort 2.0 standard Just eleven years ago, Video Electronics Standards Association (VESA) released the Display Port... Web Hosting control panels Having a site up on the internet is not as simple of a task as it seems to be. Once you have the... What are .htaccess files and their uses? What is .htaccess? The .htaccess file is used to configure the directories and folders on the... What are Clickjacking attacks and how to avoid them? What is clickjacking?Have you ever visited a website, clicked on an element you wanted to open... What are Web crawlers? When browsing the internet, the go-to tool is a search engine. It works wonders, you just enter a... What are the different types of domains? Not all domain names are registered equal, learn the differenceby Antoniy Yushkevychin... What is Bluekeep and how to protect yourself from it? In the modern age of technology, new security threats arrive daily, but most don’t see the day of... What is Cloud computing, a.k.a. "The cloud"? What is Cloud Computing?Despite the name, the cloud has nothing to do with the white fluffy... What is DNSBL and why use it? Domain Name System BackLists (DNSBL) are spam blocking lists that allow system moderators to... What is FTP and its uses? FTP’s HistoryFile Transfer Protocol (i.e. FTP) has been around for much longer than HTTP (i.e.... What is Htop and what does it do? What is Linux Htop and What Does It Do?Htop is an interactive system monitor, process viewer and... What is IPMI? When regarding server management, IPMI is one of the most commonly used acronyms. It has become a... What is Incognito mode in Chrome In web surfing, browsers store information like cookies, certificates, domain names in order to... What is JetBackup? What is JetBackup?JetBackup is a leading backup solution for cPanel which allows you to backup... What is Libra? Libra, or what’s commonly known these days as ‘Facebook money’ or ‘Zuckerberg money’ is a new... What is MRAM? Since their inception, computers have gone through many different memory and storage... What is NVMe? Since the inception of computers, storage mediums have improved and evolved over time. From punch... What is Node.js? What is Node.js?Node.js is a cross-platform JavaScript run-time environment that can execute... What is PPC and how PPC works? Have you seen the top search results of Google? Notice anything different? Well, usually the top... What is RAID and why you use it? What is RAID and Why Use ItIt is not a secret that technology has been advancing at a rate... What is Reseller Hosting? There are different methods you can use if you wish to provide hosting services. You can try and... What is Robots.txt file? Nowadays, search engines are the go-to tool when internet users want to find new information on... What is SQLi and how to defend yourself from it Cyber-attacks are executed in a nearly uncountable amount of ways. One such style of attack is an... What is SSL? What is SSL?SSL known as Secure Socket Layer is a cryptographic technology which secures any... What is VDI? Virtual Desktop Infrastructure What is VDI?Being able to access your work computer from any endpoint on a network is convenient... What is VPS hosting and how to use VPS server? With plenty of different hosting options available, from shared hosting to dedicated servers,... What is Web hosting? So you want to get your website up and running but do not know how? The go-to solution for most... What is Woocommerce? What is WooCommerce?WooCommerce is a plugin used on WordPress. I will take you through... What is WordPress Hosting? Hosting is the most important part of the equation when you plan to have a website of your own.... What is WordPress? WordPress is an online, open source website creation tool written in PHP. It is the simplest,... What is a CDN? What is CDN? CDN stands for Content Delivery Network. In short, this is a series of servers... What is a CMS? Since the internet’s popularization, having a website is a common practice for many internet... What is a DDoS attack? What is DDoS?A DDoS or Distributed-Denial-of-Service attack is an unauthorized attempt to... What is a Proxy server? What is a Proxy Server? What happens when you browse the web? You type an address on your... What is a Web application firewall? We have all heard of a proxy before. It acts as an intermediary for requests between the client... What is an SSH key? SSH key is an access credential for the SSH secure shell network. The authentication and... What is domain privacy protection? Why do I need it? Anyone who has previously registered a domain knows that they need to provide certain contact... What is latency and how to reduce it In general, most people assume that their bandwidth is their internet speed, however that is not... What is the OSI model? The OSI model or Open System Interconnection model is a conceptual model that describes the... What is the difference between TELNET and SSH? Both Telnet and Secure Shell (i.e. SSH) are network protocols used to connect to remote servers... What software is best for virtualization? If you wish to use multiple operating systems on the same machine, virtualization is the go-to... What you need to know about changing from http to hhtps If you’re going to collect sensitive information or conduct transactions online, you should plan... What's Incognito mode on Chrome? In web surfing, browsers store information like cookies, certificates, domain names in order to... What's new in Webpack 4 IntroductionWebpack is a static module bundler for modern JavaScript applications. It helps to... Why you should use WordPress for your Website WordPress was initially started as a blogging tool, but after time it has evolved itself into the... Windows 10 safe mode Use the System Configuration tool (msconfig.exe) to enable Safe ModeIf you can log into Windows... Windows Server Hosting Control Panels A control panel (in the web hosting industry) refers to the web interface given by the hosting... Windows VPS server vs. Linux VPS server What is difference of Windows VPS Server & Linux VPS Server?So you have decided that you need... WordPress social login plugins Membership plugin with Social Port Social Login account WordPress Social Login is an extension... XPath injection attacks and prevention Like in SQL injection, XPath injection attacks occur when a website constructs an XPath query for...
« Back