Articles

 How to Protect WHMCS?

Move the attachments, downloads & templates_c folders The three folders "attachments",...

 How to handle the Google Attack Page?

When you see the dreaded Google attack site warning, you should immediately email :...

 How to protect Directory Indexing?

Apache web server allow directory browsing by default. It?s always good to disable directory...

 My Joomla has been hacked!

A Joomla is usually compromised when it or its components / modules are outdated. Another very...

 My account was hacked!

If you are the victim of a hacker, immediately email support@realitsolution.com or open a ticket...

 SQL injection, insertion!

SQL injection is an attack where malicious code is passed to an SQL Server for execution. The...

 What happens to someone abusing system resources?

The offending site will be suspended and the owner will be given an opportunity to fix the...