Increased security is always a good idea, especially for important pages like your WordPress admin login. So this article will show you how to protect the wp-admin directory in a … Continue reading IP protecting the WordPress wp-admin directory on an IIS Server
In this tutorial we will be reinstalling WordPress after it’s been compromised or “hacked.” The tutorial assumes three things: 1) The MySQL database your WordPress site was using wasn’t compromised, … Continue reading Reinstalling a clean version of WordPress after a compromise
Note that some of the information presented here regarding .NET 5 is no longer valid, due to fundamental changes made on the way to .NET 5 becoming ASP.NET Core 1.0. … Continue reading Publishing an ASP.NET 5 (vNext) Application
Lately I’ve been evaluating some companies that offer email communication solutions and was introduced to SendGrid by a coworker. I found it offers a lot of great features to help … Continue reading How to use SendGrid for your newsletters or marketing emails
Note: beginning with Chrome version 46 the yellow caution triangle has been removed from the https URL when Chrome encounters minor errors such as those described in this article. If … Continue reading HTTPS “obsolete cryptography” message in Google Chrome, SSL certificates, SHA-1, SHA-2
As a major hosting provider, we deal with compromised sites on a daily basis, so we’ve seen just about every site compromise scenario. If your site is compromised you may … Continue reading Think your site can’t be hacked? Think again.
Michael Ossou is back with a new video, Getting Started With TFS 2013. If you’re new to TFS, or to setting up users in our Control Panel, check it out. … Continue reading Getting Started With TFS 2013 Video
In case you haven’t heard, Joomla versions 2.5.x and 3.1.x have a big security hole that will allow any user who browses your site to upload malicious PHP files regardless … Continue reading Serious Joomla security hole