KTX Hosting KTX Hosting

CALL NOW!(ID:249947)
+1-855-211-0932
HomeKTX Hosting News

KTX Hosting News


Jan
19
2017
3:24 pm

G Suite Promo Code

Get your G Suite Promo Code! At KTX Hosting we use G Suite to help run our company and think other businesses can benefit from it too. You can use Gmail, as well as Google Calendar, Drive, Docs, and other tools that allow you to get things done from anywhere on any device. G Suite[continue...]


Jan
05
2017
8:58 am

How to set up Memcached on a WordPress-based website (tutorial)

WordPress is indeed an amazing application, which has long since settled in the hearts of users. With its reliable back-end, user-friendly front-end and tons of fancy themes coming out every day, it's perhaps the best tool to start your new blog or web hosting store (or whatever other type of site you might think of)[continue...]


Dec
27
2016
12:24 pm

Critical Vulnerability in PHPMailer. Affects WP Core. – Wordfence

A critical remote code execution vulnerability in PHPMailer has been discovered by Polish researcher Dawid Golunski. The vulnerability was announced on legalhackers.com yesterday but proof of concept exploit details were not included. Unfortunately someone posted a proof of concept to exploit-db and to github a few hours ago demonstrating how the vulnerability can be exploited in the[continue...]


Dec
08
2016
1:41 pm

Gravatar Advisory: How to Protect Your Email Address and Identity – Wordfence

Update: We’ve added comments at the end of the post pointing out that the National Institute of Standards and Technology (NIST) considers an email address to be personally identifiable information or PII. Gravatar is a service that provides users with a profile image that can appear on many sites across the Net. It is integrated with[continue...]


Nov
27
2016
12:22 pm

A new Python Manager is now available in the Control Panel

Following the feedback of clients, KTX Hosting has added a new functionality to the Advanced section of the Hepsia Control Panel – the Python Manager. The new Python Manager will allow users to edit the current Python version and to enable Python-compatible applications for their projects. Located right next to PHP Settings, it gives you[continue...]


Nov
07
2016
12:48 pm

9 proven tricks to protect your WordPress site from attacks (2016 update)

WordPress is one of the most popular CMS solutions available today. As such, it is being used by a very large number of websites on our network. However, its popularity among users also means that it’s extremely popular amongst hackers as well.  Here are 9 proven tricks to protect your WordPress site from attacks: 1.[continue...]


Oct
31
2016
3:15 pm

The Dirty COW Linux exploit patched successfully

It has been some time since the nightmarish Proxy and Poodle vulnerabilities scared Internet users out of their wits, and now the web faces a new security exploit – a Linux kernel flaw bearing the ‘user-friendly’ name “Dirty COW”. Dirty COW represents a privilege-escalation vulnerability that hackers can exploit and do harm to web servers[continue...]


Oct
27
2016
1:20 pm

What your customers are really afraid of this Halloween – TrustedSite Blog

If there’s one thing business owners want to know, it’s what’s on their customers’ minds. What they want, what they don’t want, why they do and don’t want these things. Makes sense, right? If you know what people are thinking, you can better service their needs and wants. And, since it’s Halloween, we decided that[continue...]


Oct
21
2016
5:21 pm

The biggest threats inside your company, cybersecurity & voting, and more: Link Roundup – TrustedSite Blog

If you’re not already aware, October is National Cyber Security Awareness Month. According to the US Department of Homeland Security, which has developed and promoted the campaign for over a decade, NCSAM is designed “to raise awareness about cybersecurity [and] provide [the public] with tools and resources needed to stay safe online.” With that in[continue...]


Oct
11
2016
12:18 pm

Endpoint vs Cloud Security: The Cloud WAF Bypass Problem – Wordfence

ResearchSource: Endpoint vs Cloud Security: The Cloud WAF Bypass Problem - Wordfence


Pin It on Pinterest