Search:

Type: Posts; User: manoharparakh; Keyword(s):

Page 1 of 18 1 2 3 4

Search: Search took 0.01 seconds.

  1. In India, Host.co.in is one of the trusted and...

    In India, Host.co.in is one of the trusted and reputed hosts offering colocation services. It is present in the Indian hosting arena for more than a decade now. Besides server hosting, they also...
  2. Replies
    131
    Views
    40,182

    Colocation or colo is a data center service...

    Colocation or colo is a data center service where the provider leases out his space and provides server storage as well. The client himself is the owner of these servers and holds complete ownership...
  3. Replies
    22
    Views
    2,067

    If you want to give the buyers the possibility to...

    If you want to give the buyers the possibility to pay with credit and debit cards, having a payment gateway is essential. Without it, you wouldn’t be able to accept payments.

    In general, providing...
  4. Replies
    25
    Views
    843

    Page jacking does not mean taking over a page on...

    Page jacking does not mean taking over a page on the original site. In fact, the original site can be completely unaware that the theft has occurred.

    Page jackers siphon off traffic indirectly...
  5. Replies
    18
    Views
    296

    The SSL protocol, "Secure Socket Layer", is the...

    The SSL protocol, "Secure Socket Layer", is the predecessor of the TLS protocol "Transport Layer Security". These are cryptographic protocols that provide privacy and integrity in communication...
  6. Replies
    14
    Views
    294

    In basic terms Secure Socket Layer (SSL) is a...

    In basic terms Secure Socket Layer (SSL) is a security protocol used to secure data between two machines using encryption.

    An SSL certificate allows you to create a secure connection between your...
  7. Replies
    5
    Views
    76

    Cross site scripting is hacking technique in...

    Cross site scripting is hacking technique in which a hacker inject some malicious java script code into a vulnerable website for doing some malicious activity or stealing browser history or for...
  8. Replies
    7
    Views
    768

    The Payment Card Industry Data Security Standard...

    The Payment Card Industry Data Security Standard (PCI DSS) is a lot of necessities proposed to guarantee that all organizations that procedure, store, or transmit charge card data keep up a safe...
  9. Replies
    4
    Views
    1,248

    Some viruses attack the computer’s boot sector,...

    Some viruses attack the computer’s boot sector, the area on the hard drive that hosts the code for the start-up routine. Such a root code virus causes havoc because it runs itself every time you...
  10. Replies
    17
    Views
    3,830

    Scalability turned hosting into a utility,...

    Scalability turned hosting into a utility, because you could now dial usage up or down according to your needs. Instead of paying for lots of redundant machinery, you would now only pay for the disk...
  11. Replies
    3
    Views
    668

    Malicious code is the term used to describe any...

    Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.

    Examples of...
  12. TLS stands for Transport Layer Security that is a...

    TLS stands for Transport Layer Security that is a protocol which creates a privacy between client-server applications on the internet. TLS is a cryptographic protocols that designed to provides...
  13. Replies
    16
    Views
    1,406

    Update website software. blank index.html...

    Update website software.

    blank index.html documents for folders that you do not want the directories viewable.

    Proper permissions for files and folder. Have seen so many problems caused...
  14. Dealing during peak time One of the most...

    Dealing during peak time

    One of the most important capabilities of cloud is “scalability”. The enterprise can deal with increased activity and more visits in a dynamic way.

    Substantial Cost...
  15. Replies
    19
    Views
    619

    In basic terms Secure Socket Layer (SSL) is a...

    In basic terms Secure Socket Layer (SSL) is a security protocol used to secure data between two machines using encryption.

    An SSL certificate allows you to create a secure connection between your...
  16. TLS stands for Transport Layer Security that is a...

    TLS stands for Transport Layer Security that is a protocol which creates a privacy between client-server applications on the internet. TLS is a cryptographic protocols that designed to provides...
  17. Replies
    18
    Views
    1,356

    Hyper Text Transfer Protocol Secure (HTTPS) is...

    Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of...
  18. Replies
    3
    Views
    668

    Malicious code is code causing damage to a...

    Malicious code is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools. Malicious code can either activate itself or be like a...
  19. Replies
    18
    Views
    1,776

    1. Keep WordPress updated. It's easy now that it...

    1. Keep WordPress updated. It's easy now that it auto-updates the core. However, keep all plugins updated as well.

    2. Reduce the number of plugins used to an absolute minimum. Over the past year...
  20. Replies
    6
    Views
    616

    Protect yourself from harmful email attachments...

    Protect yourself from harmful email attachments by taking the following steps:

    Follow the steps in the Safe Computing for Students and Safe Computing for Faculty and Staff sections of this...
  21. They have the resources to solve probably any...

    They have the resources to solve probably any problem..

    Generally small to medium sized ecommerce businesses face problems like :

    Low conversion rate
    Low sales
    Low Margins
    ...
  22. Replies
    2
    Views
    399

    In my experience e-commerce is one of the areas...

    In my experience e-commerce is one of the areas most susceptible to experience IT security problems (the other one being e-healthcare). I would say their main concerns are:

    Customer data...
  23. Replies
    15
    Views
    12,385

    E-commerce needs protection because there are...

    E-commerce needs protection because there are several important factors you need to protect. As you can understand, there will be transaction of good and money on the website and these need to be...
  24. Replies
    103
    Views
    33,282

    Online shopping is great. It’s fast, less...

    Online shopping is great. It’s fast, less time-consuming, offers a huge selection and usually even better prices, however there’s major threats out there that buyers are usually not aware of.

    ...
  25. Replies
    11
    Views
    1,176

    Firewalls are similar to proxy servers in that...

    Firewalls are similar to proxy servers in that they enforce security primarily based on an IP-address and network-offerings protection policy. However, you may alter a firewall's policy much more...
Results 1 to 25 of 434
Page 1 of 18 1 2 3 4

  Find Web Hosting      
  Shared Web Hosting UNIX & Linux Web Hosting Windows Web Hosting Adult Web Hosting
  ASP ASP.NET Web Hosting Reseller Web Hosting VPS Web Hosting Managed Web Hosting
  Cloud Web Hosting Dedicated Server E-commerce Web Hosting Cheap Web Hosting


Premium Partners:


Visit forums.thewebhostbiz.com: to discuss the web hosting business, buy and sell websites and domain names, and discuss current web hosting tools and software.