Menu Request FREE Quote
Request FREE Quote

Category “everything else”

If you’ve heard the term ‘Initial Coin Offerings’ (ICOs) bandied about, you may be wondering what they are. ICOs first appeared in 2013. Since then their number has grown exponentially to in excess of 200, and over $2bn has been invested in them. Examples of ICOs include: • Filecoin: a…

Read More...

Blockchain is something that is starting to garner greater public interest as its applications are becoming more widely recognised and, in many cases, being used today. Many believe it will cause a revolution in the way we carry out all manner of day-to-day tasks and that, in the near future,…

Read More...
27
Jun

Ransomware FAQs

Posted by: Jacob in everything else

As you maybe aware, there is currently a global ransomware cyber attack. What is a ransomware attack? It is a virus that encrypts all the files on your computer and then demands money in order to decrypt them, if you pay, sometimes you get your files back and sometimes you…

Read More...

Continuous integration or (CI) as it’s often referred to, is a process used to increase the quality of a code, without adding too much extra pressure to the developers responsible for it. Regularly carrying out continuous integration will provide rapid feedback on any issues that have occurred within the code…

Read More...

You must know the signs. You get up to move around the office and you have to practically “unfold” yourself. Your fingers, shoulders, legs and everything in between feels stiff and you blink like a vampire at dawn. Everyone who works at a computer is guilty of it at some…

Read More...

TLD stands for top level domain. Most of us will be well aware of them – you see them all over the internet. They are the prefixes which follow after the dot in all web addresses, so every time you type a URL into your computer or smartphone, you are…

Read More...

When it comes to e-commerce software, Magento is the most popular one there is. With its popularity, however, comes risks – the biggest one being that it is subject to the largest number of attacks. The attacks are usually carried out by experienced hackers with the aim of getting into…

Read More...

Here at catalyst2 nothing is more important to us than you, our customers. We value your opinions, and strive to ensure our already stellar products and services are constantly evolving and improving to serve you even more effectively. To that end, we run an annual survey to gather information on…

Read More...
12
Dec

One of the security measures on our Linux cPanel servers is that if the server sees a lot of susicious requests from a certain IP address, it will likely block the IP address from the server. This could be due to multiple incorrect logins to cPanel, it could be due…

Read More...

Thank you so much to everyone who filled in our 2016 Annual Survey. We had some great comments and feedback. “Never had a problem in 10 years great service!” “As always another year of outstanding service!!” “The team respond to any question (no matter how silly) very promptly and go…

Read More...
Page 1 of 512345