LiteSpeed Cache can be a great way to maximize your website speed using only the default configuration. LiteSpeed Cache communicates directly with the LiteSpeed installation on the server to save and handle static copies ofContinue reading
How to activate Redis on Smarthost server?
On our servers for new hosting packages based on the Litespeed server there is a Redis cache system – in-memory data structure store. How to activate Redis on Smarthost server? To enable Redis, log inContinue reading
Web Application Firewall
We have implemented WAF (Web Application Firewall) protection system on all our hosting servers. The system along with the security rules are used by our administrators. What is WAF? WAF is a system for protectingContinue reading
Adding reCAPTCHA in WordPress for Contact Form 7 plugin.
It is often that we come across attempts at sending unwanted SPAM messages from unsafe forms in WordPress. The solution most widely used on web services is „CAPTCHA”. It is a solution engineered by GoogleContinue reading
Changing domain name in WordPress
During changing our domain,where we have wordpress to another we meet a problem with changing site url addresses and wordpress’s addresses which are assigned to actual installation. We will show a few ways to editContinue reading
Do you use the Duplicator plugin? Be sure to read it!
Duplicator is a popular backup plugin (over 1 million downloads), site cloning or migration. Unfortunately, vulnerability has recently been detected that allows remote code execution. What can such an attack manifest itself? If strange contentContinue reading
Turning on the SSL certificate in WordPress – guide
Turning on the SSL certificate in WordPress If You want your site working on secure connection, or the method you use does not work fully, I encourage you to read this guide. A secure, encryptedContinue reading
Infected WordPress Plugins
Thousands of WordPress, Joomla and Drupal plugins have been discovered that contained a “gateway” that would allow access without user’s knowledge. By accessing fake websites that resembled the original ones, the Internet user actually downloadedContinue reading