Padlock and password

Password deemed safe

How to create a safe password. Learn some tips here to properly protect your email accounts and utility accounts? You will see among other things how to have the best password possible without it being complicated or difficult to remember.

why sites are hacked

3 Main Reasons Websites Are Hacked

So many reasons could explain the cyber criminality committed on the internet. You’ll find in this article three of the main reason why a cybercriminal would like to hijack your website. You’ve been told that your website security has always been, and will always be important, after reading this blog you will better understand why.

2 types of common site attacks: DOS and SQL Injection

2 common website attacks: DOS and SQL Injection

Hackers have many ways of attacking your website, and it’s important to stay up to date on the most common attacks so you can do what you can to prevent them from occurring. Malicious individuals can attack your data via your computer or they can infect an entire network. Two of the most common website attacks are Denial of Service (DoS) attacks and SQL Injection attacks.

The growing need for a mobile friendly website.

WordPress Pros and Cons

Popular, customizable and easy to use. On the internet, you are often browsing on it without even noticing it. For certain it’s the ‘Eldorado’ and for others, it’s a nightmare. It doesn’t need much to get started and will offer a lot as long as you take care of it. Yes, you’ve guessed it, we are talking about WordPress. In this article we will take a look at the pros and cons of the content management system that is becoming more and more popular on the web.

Denial of service attack: How to protect yourself

DDoS Protection For Your Website

So what is the dreaded DDoS? A Distributed Denial of Service attack usually starts with hackers infecting thousands or even millions of unprotected servers and personal computers and turning them into zombies or bots. All these botted computers combine to create a massive network or botnet of compromised computers that will do whatever the hacker, sometimes called a bot herder, asks them to.