Recent DDoS (Distributed Denial of Service Attacks) revealed that the smaller ones are more dangerous than powerful attacks that knock a company offline.

This is because it is now being used as a smokescreen to install malware or to steal important data.

According to a communications and analysis firm, DDoS “disrupts operations and distracts the security teams”, enabling the attacker to exfiltrate data and plant malicious software.

Because of this… Read More

Blog improvement on WordPress is as easy as 1-2-3, all you have to do is install some plugins!

With thousands of these add-ons (free and premium), you can integrate some awesome features into your blog or website.

Here are 10 WordPress functionalities you may not be aware of, along with the WordPress plugins that make these things happen:

 

Editing Website Front-Ends Live

 

Before publishing, you have to make sure… Read More

In the first quarter of 2015, Arbor Networks – a provider of DDoS and advanced threat protection solutions – detected the largest attack so far: a 334Gbps attack that targeted a network operator in Asia.

That wasn’t the only unsettling fact though: the company also reported that 25 attacks bigger than 100Gbps occurred around the world in the first quarter alone.

The occurrence of a DDoS attack strikes fear into… Read More

In 2002, several major websites which included names such as eBay, Amazon, Yahoo and CNN were rendered inaccessible.

The culprit? A distributed denial of service (DDoS) attack that lasted for as little as 30 minutes on some sites to as long as three hours for others.

Since that event, a document called Best Current Practice #38 (BCP38) was published and detailed ways to prevent the most common form of DDoS… Read More

Managed VPS plans image

Virtual Private Servers, or VPS for short, are the ideal solution for businesses who need full access and control over their servers. They’re a cost-effective answer to dedicated servers, yet still yield similar results in terms of control and bandwidth. VPS are great because they are completely customizable, just like… Read More

How Secure is SSH - Really? image

Every day, millions of network administrators rely on the SSH (Secure Shell) protocol. SSH enables them to log in to servers remotely, tunnel into networking equipment and transfer files between different machines. For most of its life, SSH has been regarded as “impenetrable” by many security experts.… Read More

What is ELK Stack image

Analyzing data is a critical element to running a successful business. Whether that data comes from a structured or unstructured source, it is crucial to understanding how the business is performing and what steps might be taken to improve that performance. The ELK stack is perfect for this. The… Read More

How to Configure a Name-Based Virtual Host with VPS image

There are two types of virtual hosting: named-based and IP-based. Named-based virtual hosting, which we will be discussing today, describes a scenario in which a webmaster is hosting multiple websites on a single IP address – even though these websites all have different names.… Read More

What is MongoDB image

 

MongoDB is a relatively new open-source database platform. Also known as NoSQL, MongoDB uses dynamic schemas to integrate certain application data types more efficiently than other databases. The program is cross-platform and actually powers the back end for many well-known consumer sites, including Craigslist, LinkedIn, Expedia, the New York… Read More