Do You Need A Virtual Private Server?

Do You Need A Virtual Private Server?

Posted by Kelly Kirkham

If you are in the market for web hosting, you may be feeling overwhelmed by all the choice available. All packages claim to be a perfect fit for your requirements, but how do you really…
Historic Hacks: Gary McKinnon

Historic Hacks: Gary McKinnon

Posted by Kelly Kirkham

In our Historic Hacks segment, we like to look back at internet events that shocked, surprised, or horrified us. Today we look at the biggest military computer hack of all time, even though it might…
Historic Hacks - Melissa

Historic Hacks – Melissa

Posted by Hayden Smith

In this historic hacks article, we'll be taking a trip back to 1999, and looking at the Melissa macro virus, known as the first successful mass-mailing virus. Unsavory Files On the 26th March 1999, David…
SSL, TLS, And Their Role In Security On The Internet

SSL, TLS And Their Role In Security On The Internet

Posted by Hayden Smith

When the internet was first devised, it was envisioned as a tool to connect universities, research establishments, and the military. As computers were so expensive at the time, the number of internet users were limited.…
Historic Hacks - Kevin Mitnick

Historic Hacks – Kevin Mitnick

Posted by Hayden Smith

This time on historic hacks, rather than concentrating on a specific hack or piece of malware, we'll be looking at the hacker’s profile. In this case, we'll be looking at some of the exploits of…
What is Public Key Encryption And Why Does It Matter?

What is Public Key Encryption And Why Does It Matter?

Posted by Hayden Smith

Public key encryption is one of the most used security technologies on the internet. In this post, we provide an overview of what private key encryption is, how it works and why it's important. How…
Historic Hacks - The Morris Worm

Historic Hacks – The Morris Worm

Posted by Hayden Smith

Welcome to Historic Hacks, where we'll be shining a light on some of the more notable hacks in history. Today we'll be traveling back to the 2nd November 1988, and looking at the Morris worm.…
Hashing Explained

Hashing Explained

Posted by Hayden Smith

When it comes to security, the weakest link in the chain is usually the good old-fashioned password. Hackers often publish tables of usernames and passwords as they find them when breaking into systems, meaning that…
What Is Encryption?

What Is Encryption?

Posted by Hayden Smith

In recent years, encryption has become something of a hot topic. Mentions of the word have increased dramatically in light of Edward Snowden’s government surveillance leaks. Security revelations have led to a number of disagreements…
How Hard Is It Really To Migrate From Shared Hosting To VPS?

How Hard Is It Really To Migrate From Shared Hosting To VPS?

Posted by Hayden Smith

A Virtual Private Server (VPS) is a common next step for shared hosting users who are looking to upgrade their website hosting. VPS offers superior performance when compared to the limited shared resources of shared…

over 200,000 servers launched

and counting worldwide...