Skip to main content

Posts

Showing posts from 2021

Share: SSL

SSL stands for Secure Sockets Layer. It is the standard technology to keep an internet connection secure, safeguarding any sensitive data that is being sent between two systems, can be server to server or a server and a client, preventing criminals from reading and modifying any information transferred. SSL uses encryption algorithms to scramble data in transit, makes sure that any data transferred between users and sites, or between two systems remain impossible to read, preventing hackers from reading it as it is sent over the connection. TLS (Transport Layer Security) is an updated, more secure, version of SSL. Not only is TLS more secure and performant, most modern web browsers no longer support SSL 2.0 and SSL 3.0. While SSL is still the dominant term on the Internet, most people really mean TLS when they say SSL. HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. The details of the certificate, including the issuing aut...

Share: Hosting

Hosting is where your website content such as images, videos etc are stored. Most of the websites share a server with others, some require an entire server. cPanel is a web hosting control panel software developed by cPanel, LLC. It provides a graphical interface (GUI) and automation tools designed to simplify the administration processes of hosting a website. cPanel also has command line and API-based access that allows third-party software vendors, web hosting organisations, and developers to automate standard system administration processes. Plesk is a web hosting control panel and data center software developed for Linux and Windows-based hosting services. It is developed by Plesk International GmbH. Plesk's user management model is suitable for dedicated and shared hosting, allowing server administrators to set up new websites, reseller accounts, email accounts, as well as edit and create DNS entries through a web-based interface. A dedicated hosting service, dedicated server,...

Share: Domain Name

A domain name is a website URL, is the address, is your website name where Internet users can find and visit your website. Computers use IP addresses, which are a series of number. However, it is difficult for people to remember. Because of this, domain names were developed and used to identify entities on the Internet rather than using IP addresses.   A domain name can be any combination of letters and numbers, and it can be used in combination of the various extensions, such as .com, .net and more.   The domain name must be registered before you can use it. Every domain name is unique. If someone types in www.yourdomain.com, it will and only go to your website.   Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name registered in the DNS is a domain name.   "Domain names are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-lev...

How-To: 4 Things You Need To Start A Website

These are the main things you need to start a website: 1. Domain Name - A name or domain name is your website url (address). This is how people can easily find and even remember you. For example, aesyonline.site is a domain name. A good domain name is normally short and easy to remember. For example google.com .   Do you need a domain name? Find your domain name here! 2. Hosting - Hosting or storage is where your materials for example images, creatives, videos, text, and more are stored on the net. This makes your website and materials are accessible 24/7. There are a few types of hosting as well as software to manage hosting services, for example the cPanel. 3. Design - Every website has a design. You can use a website builder to do it using templates, or you can write your own codes. For example THIS is built using Website Builder. WordPress (CMS) is another powerful website builder that gives you flexibility to custom and manage you website. 4. Content - Or pages o...

Share: Two-Factor Authentication (2FA)

Understanding Two-Factor Authentication (2FA): How It Works and Why It Matters Two-Factor Authentication (2FA) adds an extra layer of security to your online accounts by requiring not just a password, but a second method of verification. This makes it significantly harder for unauthorized users to gain access, even if they know your password. How 2FA Works When 2FA is enabled, logging into your account requires two things: Something you know – e.g. your password Something you have or are – e.g. a mobile device, fingerprint, or security key This second factor provides an additional checkpoint that only the real account owner should be able to pass. Common Types of 2FA Text Message (SMS) - A one-time code is sent to your registered phone number, which you must enter during login. Authenticator App - Apps like Google Authenticator, Microsoft Authenticator, or Authy generate time-sensitive verification codes, often considered more secure than SMS. Biometric Verification - Physical characte...

Share: About Pyramid Scheme

Pyramid Schemes: How to Recognize and Avoid Them A pyramid scheme is an illegal and deceptive business model that relies primarily on recruiting new participants, rather than selling actual products or services. While these schemes may look like legitimate businesses at first glance, they are designed to collapse, often leaving the majority of participants with financial losses. Warning Signs of a Pyramid Scheme Be cautious if you notice any of the following red flags: Income is tied to recruitment, not product sales - You're told that your main earnings come from bringing in new members, not from selling products or services. Often, they downplay or ignore product sales entirely and emphasize, “The more people you recruit, the more money you’ll make.” Mandatory inventory purchases - You’re required to buy and keep a large stock of products, even if there's no real demand or you have no intention of selling them. You’re encouraged to buy things you don’t need or want - Whether ...

Share: About Scam

Scam Alert: Don’t Fall for Impersonation Tricks Scammers are increasingly using sophisticated tactics to trick people into giving away personal or financial information. One of the most common methods is impersonation, pretending to be from a trusted source such as a government agency, a well-known business, or even a charity. They may contact you claiming to represent: The Police Department, Anti-Corruption Agency, or other government bodies A bank, telecommunications provider, or e-commerce platform A charity or emergency service Some even use technology to spoof phone numbers, making it appear as though the call is coming from a legitimate organisation. What Scammers Might Say: "You are under investigation," or "You owe money or have committed a crime." "Your account has been compromised. We need to verify your information." "You’ve won a prize, but you must pay a fee to claim it." "Your computer is infected and needs urgent fixing."...

How-To: Shop With Confidence

Smart & Safe Online Shopping: Tips to Protect Yourself Online shopping has become part of everyday life — convenient, fast, and often more affordable. However, it's important to stay alert and shop wisely to avoid scams and fraud. Here are some essential tips to help you shop safely online: 1. Shop Only on Trusted Platforms Always use reputable and established platforms like Shopee, Lazada, eBay, Amazon, or official brand websites. These platforms typically offer: Buyer and seller protection Clear refund/return policies Reliable dispute resolution processes Avoid purchasing from unknown sources such as forums, random social media posts (e.g., Facebook, Instagram), or shady websites. A legitimate online store should provide clear information including: Business or owner identity Company background Contact details Physical store address or registered office Customer support options 🔍 Tip: If something seems too good to be true, it probably is. If you're unsure, don't buy...

How-To: Be More Secure Online

In today’s connected world, safeguarding your online accounts and personal data is more important than ever. Here are six simple but powerful ways to enhance your digital security: 1. Use Unique and Strong Passwords Never reuse passwords across different accounts. For example, if your Facebook account is compromised, a unique password will prevent hackers from accessing your email or other platforms. A strong password should: Be long and unpredictable Include a mix of letters (upper and lowercase), numbers, and symbols Avoid common patterns like password123 or qwerty ✅ Example of a strong password: G89?klz01?8955hjk Consider using a password manager to help you generate and store complex passwords securely. 2. Turn On Two-Factor Authentication (2FA) Two-Factor Authentication (2FA) adds an extra layer of security by requiring a second form of verification, such as: A one-time code sent to your mobile phone An authenticator app Biometric data (fingerprint or face recognition) With 2FA en...

Share: Morse Code

Morse code is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes or dits and dahs. Morse code is named after Samuel Morse, an inventor of the telegraph. International Morse Code, also known as Continental Morse Code, encodes the 26 English letters A to Z, some non-English letters, the Arabic numerals and a small set of punctuation and procedural signals (prosigns). There is no distinction between upper and lower case letters. Morse code can be transmitted in a number of ways: as electrical pulses along a telegraph wire, as an audio tone, a radio signal with short and long tones, or as a mechanical, audible, or visual signal e.g. a flashing light  or even a car horn. Some mine rescues have used pulling on a rope, a short pull for a dot and a long pull for a dash. Morse code is transmitted using just two states - on and off. Historians have called it the first digital code. Morse code may be...

Share: Phonetic Alphabet

The phonetic alphabet is a list of 26 words, for each letter of the alphabet. Each word represents the letter that it begins with. The phonetic alphabet is often used to clear up any misunderstanding over the pronunciation of letters, e.g. a “M” for a “N” or a “B” for a “P”. In certain countries, there is no standard phonetic alphabet. Instead, contact centres often use names and cities to identify letters, e.g. A - Adam, B - Boy, C - China, etc. Notes: * First introduced by NATO in 1955. * The NATO (North Atlantic Treaty Organization) Phonetic Alphabet is currently officially denoted as the International Radiotelephony Spelling Alphabet (IRSA) or the ICAO (International Civil Aviation Organization) phonetic alphabet or ITU (International Telecommunication Union) phonetic alphabet. * The NATO Phonetic Alphabet is also known as telephone alphabet, radio alphabet, word-spelling alphabet, or voice procedure alphabet.