Categories
Categories
Articles
GnuPG keys use the “public key approach” to encryption. Messages are sent once...
After the clean up. What to do after your site is fixed.After the clean up. What to do after your site is fixed.May 31, 2011 ...
CAPTCHA Telling Humans and Computers Apart AutomaticallyThis tutorial is to explain CAPTCHA, an acronym which stands for "Completely Automated Public...
How To Use The IP Deny ManagerThis tutorial will teach you how to use the IP Deny Manager to block access to your web site from...
How do I block an IP address from accessing my site?If you wish to ban a user from accessing your website in any way, the best way to do this is to...
How do I configure hotlink protection?Login to cPanel. Locate and click on the "Hotlink Protection" icon within the "Security"...
How do I password protect a directory?Login to cPanel. Locate and click on the "Password Protect Directories" icon under the...
Leech ProtectLeeching occurs when users publicly post their username and password to a restricted...
SSH/Shell AccessSSH (secure shell) and Telnet are examples of network protocols that make remote server...
SSL/TLS ManagerThe SSL and TLS features will enhance your website's security. These features generate and manage...
What is hotlink protection?Hotlink protection is disabling external use of your resources. For instance, if your website has...