GnuPG keys use the “public key approach” to encryption. Messages are sent once...After the clean up. What to do after your site is fixed.
After the clean up. What to do after your site is fixed.May 31, 2011 ...CAPTCHA Telling Humans and Computers Apart Automatically
This tutorial is to explain CAPTCHA, an acronym which stands for "Completely Automated Public...How do I block an IP address from accessing my site?
If you wish to ban a user from accessing your website in any way, the best way to do this is to...How do I configure hotlink protection?
Login to cPanel. Locate and click on the "Hotlink Protection" icon within the "Security"...How do I password protect a directory?
Login to cPanel. Locate and click on the "Password Protect Directories" icon under the...How To Use The IP Deny Manager
This tutorial will teach you how to use the IP Deny Manager to block access to your web site from...Leech Protect
Leeching occurs when users publicly post their username and password to a restricted...SSH/Shell Access
SSH (secure shell) and Telnet are examples of network protocols that make remote server...SSL/TLS Manager
The SSL and TLS features will enhance your website's security. These features generate and manage...What is hotlink protection?
Hotlink protection is disabling external use of your resources. For instance, if your website has...