Search results

Page title matches

  • ...n [http://moz.com/blog/the-definitive-guide-to-wordpress-security Guide to secure Wordpress set-up] * The Engine Room's [[Responsible Data Forum on Hosting]]
    3 KB (493 words) - 20:45, 4 June 2014

Page text matches

  • * [[Secure hosting guide]] * [[np1sec|(n+1)sec: a secure multi-party communication protocol]]
    613 B (79 words) - 13:23, 12 December 2017
  • ...ems of insecure email communication. Demonstrate how some services provide secure login but insecure account use. Draw a diagram of an international communic ...cal and national network can easily read unprotected email. In most cases, secure email must be present on both sides of the communication channel, to mainta
    2 KB (353 words) - 17:18, 6 August 2013
  • ...n [http://moz.com/blog/the-definitive-guide-to-wordpress-security Guide to secure Wordpress set-up] * The Engine Room's [[Responsible Data Forum on Hosting]]
    3 KB (493 words) - 20:45, 4 June 2014
  • '''Hosting Requirements''' * Dependent on hosting package, support and updates will be handled by provider reducing need for
    5 KB (744 words) - 05:29, 25 August 2015
  • ...o they work in the field of human rights, software applications or general hosting *Supported provided - this is an essential aspect when choosing a hosting company. It should also be considered in terms of language support, whether
    17 KB (2,624 words) - 19:06, 28 May 2014
  • Backup is a core part of any digital security or hosting strategy. One of the most common causes of data loss, above hacking or mali Many hosting providers will provide backup mechanisms as part of a package but this shou
    2 KB (386 words) - 16:28, 18 May 2014
  • ...l part of any security policy. It is equally true in the framing of secure hosting. ...e, access should be clearly separated into roles at different levels. When hosting a web application a separate password and user should be used for database
    4 KB (646 words) - 15:22, 26 May 2014
  • ...CPanel style hosts encryption options are very limited. For Dedicated/VPS hosting, administrator's have the option of encrypting the entire disk or encryptin
    3 KB (554 words) - 15:22, 26 May 2014
  • ...ct communication channels to and from the server, though no system is 100% secure. ...ntially subject to snooping, either at the ISP level, at the level of your hosting provider or at a level that specifically targets your site's users locally
    3 KB (482 words) - 19:10, 28 May 2014
  • ...get a website up and running these days, but it's pretty tough to keep it secure and stable against a continually evolving and maturing array of cyber attac * knowing your hosting provider's terms of service and their readiness to protect you during an at
    2 KB (268 words) - 16:27, 27 November 2015
  • ...ite you already have, you will have to look into the complicated market of hosting providers, where making the right choice can be hard. To understand what yo ..._hosting_provider detailed guide] is available for those considering their hosting options.
    2 KB (328 words) - 16:30, 2 December 2015
  • There are also a number of DDoS mitigation and secure hosting providers ranging from large corporate run services like [https://cloudflar
    1 KB (183 words) - 16:48, 24 November 2015

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)