Currently, web hosts are increasingly offering SSL certificates as standard completely free of charge. These are usually Let’s Encrypt or Comodo branded certificates. These are fully, properly functioning certificates, recognized as trusted by 99+% ofContinue reading
How do SSL certificates work? What are the types of SSL certificates?
In the past, the green padlock in browsers was a security symbol, indicating an encrypted connection using SSL/TLS. But now browsers such as Google Chrome, for example, have changed the way security is presented, removingContinue reading
Comments in WordPress
Comments in WordPress are an inseparable element of this CMS. Contrary to appearances, despite the boom in discussions in social media, traditional comments are still widely used on blogs or on some websites, where expressingContinue reading
A direct connection between Smarthost and Cloudflare
Our customers are constantly increasing their expectations regarding page loading speed and protection against attacks (DDoS). To meet their expectations we are directly connected to the Cloudflare network and this means specific benefits for ourContinue reading
Post publication date in WordPress
The post date is one of the basic elements that is displayed when a post is published. However, not everyone knows that we can set not only the date format, but also the publication timeContinue reading
DNSSEC – technical aspects of additional security for your domain
The way the internet works closely depends on the DNS (Domain Name System). When you type in a domain name in your browser, such as smarthost.eu, or send an email, you don’t usually think aboutContinue reading
DNSSEC – basic information.
DNS was designed many years ago, when network security was not a priority. For this reason, it is vulnerable to various types of attacks. The most well-known is the “DNS spoofing” attack, also known asContinue reading
Generating DNSSEC keys in cPanel
Having a domain delegated to our DNS servers, the keys can be generated in the cPanel hosting panel. The keys should be configured according to the parameters that are supported by the domain registrar. HowContinue reading
Fake e-mails from hackers and other dangerous messages.
For a long time, despite the use of various spam filters, suspicious messages from blackmailers can occasionally be observed in email inboxes. They claim to have allegedly hacked the email account’s passwords or taken controlContinue reading
How to detect email sender spoofing?
Recently, the most common way to steal data and infect computers is by sending emails with malicious content. These emails appear very serious, seemingly from a “legitimate” sender that the recipient recognizes. The emails areContinue reading