Author Archives: Bogdan
How to use live.com for domains
What is live.com for domains? If you remember the old times where google.com had a free version of Google Apps for domains, then you would probably understand faster if I say this is a similar free version of that, only this is managed by Microsoft mail server, live.com to be exact. Live.com and Google apps
Debug your mail server using exigrep for Exim main log
About Exim mail server Exim is one of the most used message transfer agent (MTA) on the internet, it is being used by cPanel since as long I can remember and has been giving tremendous support and reliability so far. Exim is actively supported by the University of Cambridge, currently is at version 4.80.1 and
How to install modules using NPM (Node Packaged Modules)
About NPM In my earlier tutorials I’ve shown you how you can install node.js on a CentOS or Debian operating system, the process is almost the same on all distribution, you just need to use the proper repository and use the linux package installer to install node.js and / or npm. In this article however,
Image optimization within a website page
Image optimization within a website page Welcome back to another article about website optimizations, in this article I thought of writing something about image optimization (again). In my other articles I’ve told you how you can optimize your images so that your website overall is faster, however I missed one little thing there so I
How to install node.js on Debian and CentOS linux
How to install node.js on Debian and CentOS What is node.js? From their website, node.js is a platform built on Google Chrome JavaScript runtime for building fast and scalable network application. I did however seen lots of users still thinking they can install this on a shared hosting service, and here I am confirming that
Nginx block sql injection and file injection
Nginx block sql injection and file injection Currently most hackers are looking for two major things when trying to hack a website, they are testing if its possible to inject their own sql queries for reading the actual database for other information, but also testing for file injection, and this is a major security that