Force the use of SSH protocol 2
SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol…
monkey business for the geek in you
SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol…
Logwatch is a customizable log analysis system. Logwatch parses through your system’s logs for a given period of time and…
Dedicated web hosting is different from shared web hosting in that your website is the only one on the server,…
A managed dedicated server is either one you rent or one you co-locate where someone else is in charge of…
Renting or Co-Locating a dedicated server that is not managed takes a lot of time and knowledge. You must be…
A dedicated server is a computer(server) that only runs one type of server software. The server is usualy constructed or…
Search engines recognise that, if they can identify a heading it is very likely to be relevant to the body…
Disabling root login via shh is a great way to tigthen security on your dedicated server.…
The dmoz directory is not a search engine. It’s a directory, like a phonebook. It has been categorizing the Internet…
There are millions of web sites trying to get listed in the top 20 spots of the major search engines.…
This is a quick guide on adding IPs to a system manually. I would only suggest it if you are…
Have you optimized your web pages in order to receive traff?c from the major search engines (SE) like Google, Yahoo…