Monthly Archives: February 26, 2015

Secured Socket Layer (SSL) and related Vulnerabilities

Secured Socket Layer, more commonly called as SSL, is a protocol in which data is transferred in an encrypted format to ensure security. This data transfer between client and the server is established with the help of certificates. SSL certificate is an absolute necessity for e-commerce sites as end users need to submit critical information… Read more »

Dangerous commands on Linux

As Linux servers are handled using commands, the following points should be taken note of while executing certain commands that could be potentially destructive. These commands should be used only after careful analysis. Test the performance of these commands on a test environment, so that you could understand how it would affect the server performance… Read more »

Prevent your server from being hacked

Millions of websites are being hacked every day at different corners of the globe. Another million websites are prone to be a victim of this unfair phenomenon. A callous approach in maintaining the servers is the chief reason for hacking. The following are some ways by which hacking can be controlled to a great extent.

How to speedup Word Press websites

Among the most popular tools for websites based on Content Management System, Word Press has established itself as one of the leaders. As of August 2013, Word Press is used by more than 22% of the top 10 million websites. Also it is the most popular blogging system in use, in more than 60 million… Read more »