Christmas 2016

Thank you for your continued support and for the confidence that you have placed in us. The Holiday Season is…

7 years ago

G-suite for India

There is no question on Google’s reliability.  Earlier google was providing email and another services such as calendar drive, GTalk,…

7 years ago

CloudLinux 7.3 update for older kernels

Official announcement from CloudLinux  Are you running an older kernel? This might cause server crashes during CloudLinux 7.3 update. Here…

7 years ago

Free DDoS protection for all servers

In a DDoS (distributed denial-of-service) attack, attacker sends several packets to the server and it consumes all resources of the…

8 years ago

UNDERSTANDING RANSOMWARE ATTACKS AND HOW TO PREVENT THEM

We all started to hear about ransomware attacks when they first became popular in 2005. However, the first instance of…

8 years ago

Reinstall MySQL on Ubuntu on a broken previous installation

Scenario: Mysql was removed by a user without knowing what he was doing. He tried to install it again and…

8 years ago

Block Ransomware

What is Ransomware ? Let me give you quick answer on what is Ransomware.  You open some email attachment, or…

8 years ago

Fix ImageMagick vulnerability

ImageMagick, an open-source image processing software suite, has released versions 7.0.1-1 and 6.9.3-10 to address a vulnerability in previous software…

8 years ago

SSL installation error on IIS ASN1 bad tag value met.

When you try to install a certificate in IIS you may see error like ASN1 bad tag value. You can…

8 years ago

Why small business should move to cloud

True story – "We are moved to cloud" I’m Cathy, a real estate service provider in London. We are a…

8 years ago