Jump to content

Leaderboard

Popular Content

Showing content with the highest reputation since 06/06/2022 in all areas

  1. Whenever you purchase a new smartphone, how long do you have to use it before you replace it? Some users never replace their smartphone unless the phones stops being functional or it's developed too much faults. The maximum I can use a phone is 2 years and I'm having it replaced.
    1 point
  2. Whenever you want to buy a new laptop, which brand always comes to your mind first? There are so many of them out there like Dell, HP, Acer, and so on. Which one are you currently working with and would you consider changing it now?
    1 point
  3. I can remember some years ago when almost everyone was making use of Yahoo mail till Google broke into the market with their services in Gmail. A lot of users dumper Yahoo mail for Gmail but I'm sure there are still some users of Yahoo mail services.
    1 point
  4. I have never counted the number of email accounts I have but I think I have more than 50 email accounts. I have email with gmail, outlook, custom email (wit my own domain), and proton email. I use all of these emails. I created a large number of email for marketing purpose.
    1 point
  5. I work on my laptop, I spend 10-12 hours on my laptop. It is not possible to work on my laptop without charging multiple times in a day. Normally it takes 90 minutes to full charge my laptop and I can work only for 3 hours without connecting to power socket.
    1 point
  6. I update my device whenever it asks for update. Updating software is very necessary to ensure the safety of your device from unwanted bugs, malwares, and virus. However, make sure to update only when your device has more than 80 percent power baackup.
    1 point
  7. How was your website hacked? Here are several possible scenarios: If you have your FTP details stored locally on your computer, someone may have stolen them using various Tojan Horses, Spyware, etc. Several times in the past attackers used stolen FTP credentials to successfully pull off large scale attacks. A solution in this case would be to run a full scan of your computer and change your FTP credentials via the Site Management > FTP Manager section of your Web Hosting Control Panel. Also, be careful when you enter login information on public computers. Someone used your hosting Control Panel password and hacked your website(s) - this case is quite similar to the one mentioned above and the solution here is an immediate update of the account password, which could be done via the My Account > Change Login Credentials section. If you are using scripts, such as Joomla, WordPress, etc., for the purposes of your website, the site may have been hacked using various methods like database injection, remote file inclusion and many others. The problem is that all these are open source applications and anybody has access to their code, which allows hackers to find security holes, especially if the applications are not updated regularly and/or different add-ons with unknown origin are installed. This is a topic that can be widely discussed and there are many materials providing more detailed information that can be found on the Internet. In case you find your website(s) hacked, we recommend that you cover these few bases: Take your site off-line - Take your site off-line temporarily, at least until you know you have fixed things. Damage Assessment - It is a good idea to figure out exactly what the hacker(s) were after. Were they looking for sensitive information? Did they want to gain control of your site for other purposes? Look for any files, which have been recently modified or created that you cannot recognize or you haven't edited yourself. Check for any suspicious activity inside your Web Hosting Control Panel, such as newly created email accounts, FTP accounts, etc. Determine the scope of the problem — do you have other sites that may be affected? Recovery The absolute best thing to do here is a complete re-installation of all application(s) using a fresh and updated copy acquired from the respective script vendor. It is the only way to be completely sure you have removed everything the hacker may have done. After the fresh re-installation, use the latest backup that has been made to restore your site. Do not forget to make sure the backup is clean and free of hacked content too. Update any software packages to the latest versions. This includes things such as blogs, content management systems, or any other type of third-party software installed. Change your passwords - the application admin password, the hosting account and the FTP passwords. Restoring your online presence - Get your site(s) back online and keep an eye on things, as the hacker(s) may try again. To request removal from the list of reported malware sites, use this one, provided by stopbadware.org: https://www.stopbadware.org/request-review
    1 point
  8. I have wireless mouse as well as wired mouse, however, I don't use any of these. I use my laptop's touch pad. While using my laptop, it is quite uncomfortable to use another mouse. By the way, I think wired mouse is better because you do not have to spend extra money on batteries.
    1 point
  9. Do you know if you can have too many htaccess rules?
    1 point
  10. Not really for me but I try at least to use my phone for 2 years before thinking about changing it. Whenever I'm getting a new one, it must not be more than 5 months old after its release. I won't use a phone that's 1 year old after production.
    1 point
  11. Hi, If your educational organization / Institution is located in European community, you can register .edu.eu domain on https://register.edu.eu They are official and accredited registrar
    1 point
  12. Thank you for sharing this with us . Do make sure that the e-mail is not spam . Very often such spam messages are sent by hackers providing links to download security patches or making you visit a page that is used to still the log in credentials of the visitor and gain access to their e-mail or server. We have not received any such notification for a major vulnerability of the PHP. Let us know if we can do anything else for you .
    1 point
×
×
  • Create New...