Menu

Our Blog

It is safe to say that mobile phones have become an integral part of our day to day life and the thought of travelling anywhere without the ability to keep up to date with friends and relatives back home and also see what is going on in the news seems…

Read More...

You must know the signs. You get up to move around the office and you have to practically “unfold” yourself. Your fingers, shoulders, legs and everything in between feels stiff and you blink like a vampire at dawn. Everyone who works at a computer is guilty of it at some…

Read More...

We thought it was about time we looked at Let’s Encrypt and tackled some of the questions and concerns surrounding it. We have been quite slow to adopt Let’s Encrypt due to its relative newness, and certain concerns about security and trust signals. Here’s a full explanation of the good…

Read More...

TLD stands for top level domain. Most of us will be well aware of them – you see them all over the internet. They are the prefixes which follow after the dot in all web addresses, so every time you type a URL into your computer or smartphone, you are…

Read More...
14
Mar

What is HTTP/2?

Posted by: Jacob in software

HTTP has served as the internet’s underlying protocol since its inception in 1991, so why do we need HTTP 2? The answer is simple, HTTP has its limitations. What was fine in 1997 when the current version of HTTP was released, is not sufficiently adaptable for today’s high bandwidth resource…

Read More...

When it comes to e-commerce software, Magento is the most popular one there is. With its popularity, however, comes risks – the biggest one being that it is subject to the largest number of attacks. The attacks are usually carried out by experienced hackers with the aim of getting into…

Read More...

Digital crime and internet fraud is an ever-growing issue in today’s society, becoming a very real threat to the security of individuals as well as corporations and nations. It is more important than ever to be aware of how to keep your online security protected, through making sensible use of…

Read More...

Sometimes the support team will ask your for your IP address, by going to http://findip.co . This video shows you how to do it.

Read More...

We are now supporting Two Factor Authentication across our shared hosting platform, you can see the instructions below on how to enable Two Factor Authentication for cPanel, Plesk and our Billing Control Panel (WHMCS). cPanel – Linux Hosting Login to cPanel Click the Two Factor Authentication button. Then follow the…

Read More...

Around 31st January, the new version of Google Chrome, known as ‘Chrome 56’ was released. The update was created with one main goal in mind – to create warnings for users entering insecure websites. When Google first announced that this update would be occurring, the initial reaction was positive. However,…

Read More...
Page 1 of 1512345...10...Last »