Short Introduction of email spoofing!

12 years ago

Email spoofing is the creation of email messages with a forged sender address – something which is simple to do…

How to change the VEID from SSH?

12 years ago

How to change a VEID from SSH To change a VEID from SSH, simply do: 1- Stop VPS Instance 2-…

Linux Screen Commands!

12 years ago

# Start Screen: screen -S scan # Detatch Screen: Ctrl-a d # Re-attach Screen: screen -x or screen -x PID…

Steps to clear the browser cache and cookies!

12 years ago

If you face any issues with the website accessibility...then do please clear the browser cache delete the cookies files and then…

Steps to enable the telnet under Window’s 7!

12 years ago

User can enable the telnet on their Window's 7 machine with the help of below easy steps: 1. Start 2.…

Hacking prevention precautions!

12 years ago

Nowadays hackers are trying the all possibilities for cracking the websites with the help of simple tricks like password combination,…

Steps to install Anti-Malware Plugin!

12 years ago

Installing the Antimalware plugin wget http://www.pyxsoft.com/software/antimalware/anti_malware.tar.gz tar -xzf anti_malware.tar.gz cd anti_malware sh install.sh Uninstalling the Antimalware plugin Execute the following…

Easy steps to upload the contents under the hosting account!

12 years ago

You can easily make the ftp connections with your ftp client with the help of below details: Hostname/Domainname/ HostAddress :…

Importance of Dedicated IP with respect to Isolation!

12 years ago

Email delivery is required for authentication process to complete processes of mails. A dedicated IP address involves a manual set…

Steps to Mask the domain with the domain masking?

12 years ago

Some times it should be better to mask the domain instead of domain redirection and this can be done with…