Let’s learn to generate a Certificate Signing Request and Install a standard SSL certificate or a Windows server running Plesk. Generate a Certificate Signing Request in Plesk. SSL certificate generated…
Author: anilr
Have you created a Certificate Signing Request (CSR)? If not then you need to create it and order your certificate.Below are the steps to create a CSR request – Steps…
How to Resolve MySQL High Memory Usage?
July 12, 2016 / Web HostingWhat is MySQL? MySQL is the most popular database used in web applications. It’s free, easy to administer, and is supported by all hosting providers. There’s a common issue that…
Why and How to Disable Mod_Security?
July 5, 2016 / General DiscussionAn Apache module that helps to secure your website from several attacks is called Mod_security. Commonly known exploits blocked with mod_security by using regular expressions and rule sets. It helps…
GLIBC GHOST – How to Deal with it?
June 15, 2016 / Web HostingA critical vulnerability in the glibc library has been announced by Red Hat Product Security, assigned as CVE-2015-0235, and is commonly called as ‘GHOST’. What is a GHOST? A buffer-overflow…
Generally, considered to be an advanced firewall, CSF blocks external IPs (Inbound Connections) to avoid Brute force attacks or attacks similar to that (Multiple login failures, hacking attempts, etc.) on…
The ‘du’ command in Linux is a standard Unix/Linux command to check the capacity of the disk used by files and directories on a machine. There are several parameter options…
“As cloud computing grows in popularity the demand for high-capacity storage devices diminishes. Lowering the amount of money you have to spend to save your company’s data.” We are living…
Planning to activate disaster recovery as a service? That’s a crucial step for your business. Evaluating the business requirements for DR by revising the business impact analysis (BIA) results that…
Today, organizations completely depend on virtual machines for storing their critical data as well as applications and need them to always remain available. This is where virtual disaster recovery comes…