Skip to main content


Share: DDoS

Distributed denial of service (DDoS), happens when attackers send requests to a target’s IP address, causing the server or network to become overwhelmed, resulting in a denial-of-service to normal traffic. Symptoms of a DDoS attack: - a site or service is suddenly very slow or unavailable - suspicious amounts of traffic from a single IP or IP range - suspicious amounts of traffic from users who share the same profile, device, etc - odd traffic patterns, spikes at odd hours, etc Some methods to reduce or even to prevent DDoS: - monitor web traffic - restriction (for example country) - use cloud - increase bandwidth - have plans (for example security plans)
Recent posts

Share: Money Game

Money game schemes, also known as 'Skim Cepat Kaya', are schemes dressed up as an investment-platform. They look legitimate but in fact they are illegal. Often, they falsely promise much higher interest rates, returns or profits to attract potential victims. They have no intention to uphold their promises. They seek to lure new victims. They use the new depositors' money to repay the earlier depositors. Eventually, these money game schemes will collapse and the depositors will lose their investments and money. Members of these money game schemes will approach the victims at various locations. They normally come with luxury cars to convince the victims. During sharing, they will emphasize someone to be successful after joining the investment scheme. Remember: * Only deposit and invest with parties licensed by the authorities. * When in doubt, check with Bank Negara Malaysia, the Securities Commission or other relevant authorities about a company before making any decision.

Share: SSL

SSL stands for Secure Sockets Layer. It is the standard technology to keep an internet connection secure, safeguarding any sensitive data that is being sent between two systems, can be server to server or a server and a client, preventing criminals from reading and modifying any information transferred. SSL uses encryption algorithms to scramble data in transit, makes sure that any data transferred between users and sites, or between two systems remain impossible to read, preventing hackers from reading it as it is sent over the connection. TLS (Transport Layer Security) is an updated, more secure, version of SSL. Not only is TLS more secure and performant, most modern web browsers no longer support SSL 2.0 and SSL 3.0. While SSL is still the dominant term on the Internet, most people really mean TLS when they say SSL. HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. The details of the certificate, including the issuing aut

Share: Hosting

Hosting is where your website content such as images, videos etc are stored. Most of the websites share a server with others, some require an entire server. cPanel is a web hosting control panel software developed by cPanel, LLC. It provides a graphical interface (GUI) and automation tools designed to simplify the administration processes of hosting a website. cPanel also has command line and API-based access that allows third-party software vendors, web hosting organisations, and developers to automate standard system administration processes. Plesk is a web hosting control panel and data center software developed for Linux and Windows-based hosting services. It is developed by Plesk International GmbH. Plesk's user management model is suitable for dedicated and shared hosting, allowing server administrators to set up new websites, reseller accounts, email accounts, as well as edit and create DNS entries through a web-based interface. A dedicated hosting service, dedicated server,

Share: Domain Name

A domain name is a website URL, is the address, is your website name where Internet users can find and visit your website. Computers use IP addresses, which are a series of number. However, it is difficult for people to remember. Because of this, domain names were developed and used to identify entities on the Internet rather than using IP addresses.   A domain name can be any combination of letters and numbers, and it can be used in combination of the various extensions, such as .com, .net and more.   The domain name must be registered before you can use it. Every domain name is unique. If someone types in, it will and only go to your website.   Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name registered in the DNS is a domain name.   "Domain names are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TL

How-To: 4 Things You Need To Start A Website

These are the main things you need to start a website: 1. Domain Name - A name or domain name is your website url (address). This is how people can easily find and even remember you. For example, is a domain name. A good domain name is normally short and easy to remember. For example .   Do you need a domain name? Find your domain name here! 2. Hosting - Hosting or storage is where your materials for example images, creatives, videos, text, and more are stored on the net. This makes your website and materials are accessible 24/7. There are a few types of hosting as well as software to manage hosting services, for example the cPanel. 3. Design - Every website has a design. You can use a website builder to do it using templates, or you can write your own codes. For example THIS is built using Website Builder. WordPress (CMS) is another powerful website builder that gives you flexibility to custom and manage you website. 4. Content - Or pages on yo

Share: Two-Factor Authentication (2FA)

2FA works by adding an extra layer of security to your account. It requires an extra login credential to gain account access, and getting that second credential requires access to something you own, something you are or something you know. For example fingerprint. Common 2FA methods: 1. Text Message - Receive a login code (SMS). 2. 2FA Application - Mobile application that generates an authentication code. 3. Bio-metric - This method requires you to physically present something to gain access to your account. Common methods of bio-metric verification include retina scans and fingerprint. An account that uses 2FA is much more secure than a mere username and password login, but that doesn’t mean it is 100% safe.You may lose access if you lose your phone or unable to receive the login code if your phone number is inactive. Mobile number portability is an opening for hackers to impersonate you and switch your number. Others may be able to use or access to your device (apps) when