Configure OpenVPN Client Devices for Andriod

23. April 2021 VPN 0
These instructions cover installing and configuring the OpenVPN Connect app  Client-Side Configurations: Android There are two main options for an Android OpenVPN client. The first is OpenVPN Connect on Google Play, the official client from OpenVPN Technologies, Inc., the parent company behind OpenVPN. The second option is OpenVPN for Android on both Google Play and ...

Free website hosting support in this COVID pandemic

Free website hosting support in this COVID pandemic
Hello everyone, The COVID-19 should have affected almost everyone in a way or another. When it comes to the small and medium level business, the impact may be worse. We have seen that several small scale businesses are down because of the financial crisis during this pandemic. As a hosting provider, we thought about how ...

How to disable Mod Security on Cpanel Server

ModSecurity is an open-source web application firewall that protects your websites from attacks. There are some cases that the ModSecurity rules may be blocking legitimate requests as well. You can disable the ModSecurity in such cases using the below steps. Step1: Log on to Cpanel Step: Open ” ModSecurity” You can open it using the ...

Best practices to secure WordPress websites

Best practices to secure WordPress websites
You might know that WordPress websites get hacked often and of course, it is not easy to find the root cause.  If you have time, it’s worth reading the article https://sucuri.net/reports/2017-hacked-website-report/ As we know installing WordPress and setting up a simple site is easy in WordPress.  Even non-techy people can do this after watching a ...

Malware attack alert

18. July 2019 Default 0
Malware attack alert
Possibility of a malware attack in android smartphones, named “Agent Smith” has been alerted by the Indian Cyber Crime Coordination Centre of Ministry of Home Affairs. This malware is disguised as a Google-related application which exploits known android vulnerabilities and automatically replaces installed apps with malicious versions without user’s knowledge or interaction. As per Checkpoint Research, this malware is ...