Articles

 How To Use The IP Deny Manager

This tutorial will teach you how to use the IP Deny Manager to block access to your web site from...

 How to Password Protect a Directory

This tutorial will teach how to password protect a directory. Password protecting a directory...

 How to Protect WHMCS?

Move the attachments, downloads & templates_c folders The three folders "attachments",...

 How to handle the Google Attack Page?

When you see the dreaded Google attack site warning, you should immediately email : hostmaster...

 How to protect Directory Indexing?

Apache web server allow directory browsing by default. It?s always good to disable directory...

 My Joomla has been hacked!

A Joomla is usually compromised when it or its components / modules are outdated. Another very...

 My account was hacked!

If you are the victim of a hacker you can mail to our support department and our experts will...

 SQL injection, insertion!

SQL injection is an attack where malicious code is passed to an SQL Server for execution. The...

 Using Hotlink Protection

Hotlink Protection prevents other web sites from directly linking to certain files (typically...

 What happens to someone abusing system resources?

The offending site will be suspended and the owner will be given an opportunity to fix the...

Powered by WHMCompleteSolution