Some times we might have noticed that there are large number of tiny files are created on the home directory with the name of the cron file. For example if your cron url is https://www.hostingahead.com/cron your home directory will have files like cron.1, cron.2 etc.. A typical cron command will be like this : wget ...
Thank you for your continued support and for the confidence that you have placed in us. The Holiday Season is here and we have a gift for you!. Drop us an email at
[email protected] to place new orders and grab your gift before it’s too late! Offer valid till end of this December
There is no question on Google’s reliability. Earlier google was providing email and another services such as calendar drive, GTalk, Google docs under the label “Google Apps. Now google has used another term called G-Suite and this covers all of these awesome services. Business Email Every company need business email though there are still companies ...
Official announcement from CloudLinux Are you running an older kernel? This might cause server crashes during CloudLinux 7.3 update. Here is how to upgrade safely. During the recent update to CloudLinux OS version 7.3, some servers have crashed due to a race condition between kmem uncharge and charge reparenting. The issue is not present on ...
In a DDoS (distributed denial-of-service) attack, attacker sends several packets to the server and it consumes all resources of the server. When genuine visitors try to access server at this time will have to wait a long time to load the site or it may not load at all. Attackers used large number of compromised ...
We all started to hear about ransomware attacks when they first became popular in 2005. However, the first instance of a ransomware attack goes back to as far as 1989. Although this malicious practice started taking place in Russia, it has been international for quite a long time now, much to the dismay of everyday ...
Scenario: Mysql was removed by a user without knowing what he was doing. He tried to install it again and not sure what all steps he followed. If you try to install you will face below problem you cannot set MySQL root password MySQL will not be started after installation you will see MySQL dependencies ...
What is Ransomware ? Let me give you quick answer on what is Ransomware. You open some email attachment, or install some program from a infected website which eventually encrypt all your important files. For example some ransomware may encrypt your word file, excel file, photo etc. Now if you try to open these files, ...
ImageMagick, an open-source image processing software suite, has released versions 7.0.1-1 and 6.9.3-10 to address a vulnerability in previous software versions. Exploitation of this vulnerability may allow an attacker to take control of an affected system. Evidence : http://arstechnica.com/security/2016/05/exploits-gone-wild-hackers-target-critical-image-processing-bug/ https://www.us-cert.gov/ncas/current-activity/2016/05/04/ImageMagick-Vulnerability You can fix it by edit policy.xml file. Add following lines to policy.xml file <policy ...
When you try to install a certificate in IIS you may see error like ASN1 bad tag value. You can d o below steps to fix it. Step1: Install the certificate using MMC Open the Certificate Snap-In from within the MMC Start -> Run -> Type “mmc” -> File -> Add/Remove Snap-in -> Add -> ...