User contributions
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)
- 22:31, 16 May 2014 (diff | hist) . . (+1,150) . . Geography, lesgislation and terms of service
- 21:45, 16 May 2014 (diff | hist) . . (+1,034) . . Geography, lesgislation and terms of service
- 21:36, 16 May 2014 (diff | hist) . . (+1) . . Secure connections
- 19:56, 16 May 2014 (diff | hist) . . (+2,466) . . Geography, lesgislation and terms of service
- 19:33, 16 May 2014 (diff | hist) . . (+441) . . Website (→Basic Technical)
- 19:15, 16 May 2014 (diff | hist) . . (+616) . . Website (→Hosted CMS)
- 18:45, 16 May 2014 (diff | hist) . . (+669) . . Website (→DIY CMS)
- 22:23, 15 May 2014 (diff | hist) . . (+257) . . Choose a hosting provider (→Criteria)
- 22:22, 15 May 2014 (diff | hist) . . (+262) . . N Geography, lesgislation and terms of service (Created page with "For Activists, Journalists, NGOs or any Civil Society online participants, legal and geographic jurisdiction should be forefront when considering where to host their websites....")
- 22:19, 15 May 2014 (diff | hist) . . (+201) . . Brute Force DDOS
- 22:18, 15 May 2014 (diff | hist) . . (-29) . . Secure hosting guide (→Step 3: Plan for contingency and threat mitigation)
- 22:17, 15 May 2014 (diff | hist) . . (-141) . . Secure hosting guide
- 22:17, 15 May 2014 (diff | hist) . . (+475) . . Secure connections
- 22:15, 15 May 2014 (diff | hist) . . (+1,990) . . N Secure connections (Created page with "When communicating data to/from a server it is important that the infromation not be susceptible to man-in-the-middle attacks. If data is communicated over open, plain text me...")
- 22:00, 15 May 2014 (diff | hist) . . (+1,943) . . Brute Force DDOS
- 21:48, 15 May 2014 (diff | hist) . . (+134) . . Data Encryption (→Data Store Encryption)
- 21:47, 15 May 2014 (diff | hist) . . (+2,010) . . Data Encryption
- 20:54, 15 May 2014 (diff | hist) . . (+361) . . Access Restrictions (→Shared Hosting)
- 20:45, 15 May 2014 (diff | hist) . . (+810) . . Access Restrictions
- 20:26, 15 May 2014 (diff | hist) . . (-150) . . Access Restrictions
- 20:34, 7 May 2014 (diff | hist) . . (+30) . . Secure hosting guide (→Step 3: Plan for contingency and threat mitigation)
- 20:33, 7 May 2014 (diff | hist) . . (+1,431) . . N Brute Force DDOS (Created page with "As well as hacking attacks on servers and infrastructures a common approach to block access by users to content is to perform a Distributed Denial of Service(DDoS) attack. Thi...")
- 20:23, 7 May 2014 (diff | hist) . . (+444) . . N Data Encryption (Created page with "There are a number of options for data encryption for secure server hosting, however, for Shared Hosting or CPanel style hosts encryption options are very limited. For Dedicat...")
- 20:17, 7 May 2014 (diff | hist) . . (-3) . . Access Restrictions
- 20:16, 7 May 2014 (diff | hist) . . (+2,127) . . Access Restrictions
- 20:13, 7 May 2014 (diff | hist) . . (+771) . . N Access Restrictions (Created page with "Restricting access to data based on roles, rights and responsibilities is an integral part of any security policy. It is equally true in the framing of secure hosting. In thi...")
- 20:09, 7 May 2014 (diff | hist) . . (+398) . . Data Backup
- 20:03, 7 May 2014 (diff | hist) . . (+2) . . Data Backup
- 20:03, 7 May 2014 (diff | hist) . . (+1,135) . . Data Backup
- 21:05, 6 May 2014 (diff | hist) . . (+285) . . N Data Backup (Created page with "==Data Backup== Backup is a core part of any digital security or hosting strategy. One of the most common causes of data loss, above hacking or malicious attack, remains acci...")
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)