Backup

Disaster Recovery is an organization or business’s process of recovering access, functionality, and continuation of crucial IT infrastructure and systems after a natural disaster—or a planned one, such as a cyber attack. It is essentially the organization or business’ method of responding to and recovering from such an event.

Read More

CMS Types

A headless CMS uses only the backend portion of the application. The frontend (think of this as the head) is removed. Then, the CMS functions as a content repository that delivers content in a  format compatible with a variety of devices. This results in the ability to deliver content for websites, desktop applications, mobile apps, and other internet-connected devices from one data source.

Read More

Open source refers to source code that is made publicly available for anyone to view, modify, and distribute. Software developed under the open source model relies on community efforts and peer review.

Read More

Hosting

A cron job is a repetitive task on a web server that runs as a shell script or command line function on the basis of a timing pattern established by administrators. On a technical level, a cron job operates on Linux web servers as directed by the settings in the crontab or cron table file at fixed intervals of time. 

Read More

Public_html or public html is the folder that contains all website files that will be shown to a viewer who visits your website. It is located inside your website directories.

Read More

Localhost is the default hostname a computer uses to identify itself and its own internal network. It’s a respective term all computers apply to themselves. No matter what computer you are using, that computer always refers to itself as localhost.

Read More

A virtual server is the virtualization of the computing resources of a physical server. It operates in a multi-user environment, where many virtual servers can run on the same physical hardware.

Read More

A physical server functions very similarly to a regular computer, just on a different scale. It’s a hardware server that includes memory, hard drive, network connectivity, and runs operating systems and applications off its internal hardware resources.

Read More

Domain transfer is the act of switching your domain name from one registrar (E.g. from GoDaddy) to a different one (E.g. to NameCheap).

Read More

In computing, different cache types play an essential role in improving performance and reducing input/output workload. Nearly every layer of the IT ecosystem benefits from multiple types of hardware and software cache types. Central Processing Units (CPU) operate faster, operating systems run quickly and smoothly, and web servers and applications are more reliable and responsive.

Read More

MySQL is an open-source relational database management system (RDBMS) that allows you to add, access, and process data stored in a computer database.

Read More

PHP (Hypertext preprocessor) is an open source server side language for web development․ PHP uses an easy to understand syntax and can be used on all major operating systems. It can also be embedded into HTML, it is used to create user friendly, interactive, and dynamic pages.

Read More

Error logs are text files containing lists of errors that occur during application run. They are generated by computer systems to identify and correct issues.

Read More

A web server’s access log file contains detailed information about each request made to the server.

Read More

In computing, caching data improves performance and user experience by temporarily storing previously requested data in a cache for faster retrieval upon later requests.

Read More

Microsoft Internet Information Services (IIS) is a web server for hosting websites and web applications. Like other web servers, it accepts requests for web pages or web applications and responds with the appropriate data.

Read More

Nginx is a free, open-source, and powerful web server with asynchronous architecture. If configured correctly, it can solve a number of significant computing issues, from HTTP caching to the creation of a reverse proxy. 

Read More

Apache is a free open-source web server software well-suited for a diverse set of computer types and software packages. The two main reasons for its popularity are its flexibility when it comes to configuration and its success in enabling large-scale projects.

Read More

To understand SFTP, we first need to define FTP. File Transfer Protocol FTP) is the standard way to transfer files from your computer to another computer through a client-server connection, for example the internet.

Read More

A staging environment is essentially an exact replica of your website. It is where you can test changes, such as plugins, themes, and custom codes, without affecting your live website. Once you are done testing and the changes are to your satisfaction, you can push the staging environment to live.

Read More

In the web hosting industry, a data center stores all the files and assets that websites and web applications need to function properly.

Read More

Secure Shell (SSH), sometimes called Secure Socket Shell, is a network communication protocol that uses the client-server model to let two computers communicate via a secure remote connection.

Read More

Many desktop computers, laptops, and web servers use Solid State Drives (SSD) for storing and accessing data. Compared to traditional Hard Disk Drives (HDD), their improved data speeds and performance provide a faster, more stable environment for operating systems, applications, media, games, etc. 

Read More

Hosting Types

WordPress is a free and open-source content management system (CMS) that powers over 43% of all websites. Since its market share is so big, many web hosting providers have created WordPress-specific hosting plans. While it is by no means absolutely necessary for you to choose WordPress hosting if you're using WordPress, it does make the process of installing and configuring WordPress, improving performance and security, and otherwise managing a WP site much easier.

Read More

Web hosting is where a website “lives” on the internet. A website is securely stored on a special computer called a server, and visitors can access it if they type the web address of said site into a browser or web client.

Read More

VPS hosting architecture is set up in a way that your website shares a physical server with other websites, but your part of the server is safely isolated.

Read More

Shared hosting is a type of web hosting where a single physical server hosts multiple sites. Many users utilize the resources on a single server. System resources are shared on demand by customers on the server, and each gets a percentage of everything—from RAM and CPU to other elements such as the single MySQL server, Apache server, and mail server.

Read More

Cloud hosting is a network of virtual servers managed by your cloud hosting provider. The cloud server’s performance, security, and control are similar to those of a dedicated server. The notable difference of cloud hosting when compared to dedicated hosting is the affordable pricing.

Read More

Dedicated hosting is a type of hosting where a physical server is dedicated to a single client. Customizability is a key factor in this type of hosting, as clients get complete control over the server to install and configure any software. It is an ideal type of hosting for large businesses or organizations with high traffic and a high amount of ecommerce transactions.

Read More

Email hosting is a service that is particularly specialized in the operation and hosting of emails, in which email messages and relevant files are stored on a server.

Read More

Managed WordPress hosting is a specialized type of web hosting that offers many built-in features and tools made specifically for WordPress sites.

Read More

Security

WordPress security is a set of measures and solutions implemented to protect a WP website from unauthorized access, use, modification, destruction, or disruption.

Read More

Malware is dangerous or plain annoying software designed to infect and covertly access a device without the knowledge of its owner. There are several types of malware: spyware, adware, phishing, Trojans, ransomware, viruses, worms, rootkits, and programs aimed at taking control of the browser.

Read More

2FA or two-factor authentication is a mechanism for authentication. It’s when you use a second method (besides the password) to confirm that a user is the owner of said account.

Read More

CAPTCHA is a pretty lengthy abbreviation, it’s almost a whole sentence: Completely Automated Public Turing Test To Tell Computers and Humans Apart. It’s popularly known as simply captcha. In simple terms, this is a test for telling robots from people.

Read More

A security breach is any incident that results in unauthorized access to digital data, applications, networks, or devices. As a result of such an incident, access to information is gained by those for whom it isn’t intended and they might even be able to modify it. As a rule, this happens if the hacker manages to bypass the protection mechanisms.

Read More

An SSL certificate is a digital certificate that authenticates a website and allows an encrypted connection. The abbreviation SSL stands for Secure Sockets Layer, a security protocol that creates an encrypted connection between a web server and a web browser. Companies and organizations need to add SSL certificates to websites to secure online transactions and keep customer data private and secure.

Read More

WordPress user roles are created to provide a site owner with security through the ability to dictate what other users can and cannot do throughout their site. WordPress has six predefined roles: Super Admin, Administrator, Editor, Author, Contributor, Subscriber.

Read More

Malicious code is a code that takes on various forms (viruses, worms, spyware, Trojan horses, etc.) that is intentionally developed to cause harm to a computer and/or compromise data on a system.

Read More

Cross-site Scripting (XSS) is a type of security vulnerability found in some websites and web applications that accept user input. It is when malicious scripts are injected into web pages in the form of browser side script, to be sent to unsuspecting users. It occurs when the web application accepts user input without validating or encoding it.

Read More

A brute force attack is a type of attack in which the perpetrator aims to gain unauthorized access to accounts, systems, and/or networks by repeatedly submitting different combinations of login credentials until the correct one is guessed.

Read More

A Distributed Denial of Service (DDoS) attack is a type of DoS attack that uses multiple devices to attack a target. Whereas a Denial of Service (DoS) attack uses a single computer to launch an attack.

Read More

A Denial-of-Service (DoS) attack is a type of cyber attack in which the perpetrator aims to shut down a machine, information systems, or network resource by interrupting its normal functioning, making it inaccessible to its intended users.

Read More

Web Tech Basics

The Domain Name System (i.e., DNS) is a decentralized naming database that identifies and translates internet domain names that are readable by humans into comprehensible IP addresses for machines that store the information called for by the browser.

Read More

For a simple definition: Website cookies or HTTP cookies are small pieces of information that are stored on a user’s computer while they’re surfing the Web.

Read More

A domain name registrar is an organization authorized to create/register new domain names and renew the validity of existing domain names. The organization also ensures the transfer of the necessary information about the domain and its administrator to the Registry and does domain maintenance.

Read More

The domain name along with its corresponding IP address are referred to as a DNS record. Designated nameservers are responsible for storing DNS data—keeping everything functioning smoothly.

Read More

A web address or uniform resource locator (URL) is the internet or intranet location of a website, file or database. Using a web address, users can visit a website, download a file or send an email.

Read More

In the simplest terms, a website domain is a website's name, which makes it easier to remember the address of a website. Examples of domains are google.com, facebook.com, youtube.com, etc. 

Read More

A category of programs called file managers are used to access and manage files and directories through a graphical interface. File managers allow you to view, edit, move, copy, create, and delete files, whether they be on your computer or on a server.

Read More

An IP address is a unique number assigned to a specific device or a domain name. This number is an identifier. In other words, the IP address is the coordinates to your device or domain and ensures that the correct data is routed to and from the correct device or domain. 

Read More

A web server is a computer with software designed to receive requests via HTTP (Hypertext Transfer Protocol) and other protocols, process them, and deliver the requested data stored in the database (text, image, video, etc.) over the internet.

Read More

Website Management

The Wordpress Dashboard is the first screen that will be visible when you log into the administration area of your website. It is the control panel for the entire WordPress website that serves as an overview, and is where you can create and manage all content pertaining to the website. You can always navigate to the WordPress admin dashboard by adding /wp-admin to the end of your WordPress website.

Read More

REST API is a way for websites and web applications to interact with a server. It is also called RESTful. The term consists of two abbreviations, which are deciphered as follows. An API (Application Programming Interface) is a code that allows two applications to communicate with each other, for example, a client application communicates to its server. REST (Representational State Transfer) is a way to create an API using the HTTP protocol.

Read More

WordPress multisite is a feature by WordPress that allows users to manage multiple websites more efficiently from one dashboard. It acts as a network for all sites. If a person or business owns multiple websites, WordPress multisite allows them to log in to one WordPress dashboard and switch between any of the sites by using a dropdown menu. This is contrast to having to log in and out of multiple dashboards dedicated to specific individual sites.

Read More