Archive2017

Nginx gzip_static: What it does and how to use it?

N

Like other top web servers, Nginx lets webmasters enable Gzip compression for their websites. It can compress scripts and stylesheets in a web page on the fly. The Gzip file’s size is significantly lower than the original file. Nginx supports 9 Gzip compression levels.1 is the lowest and 9 is the highest. To gzip a file, Nginx will use invoke a function and the function will use system...

Fast Velocity Minify: Plugin that combines CSS and JS files without breaking the site

F

WordPress repository is the home to 100s of minification plugins. Some plugins may break the site and some will do their job. Fast Velocity Minify is a free plugin that improves the loading speed of your site. The plugin has 20000 active users and it is easy to use. It is a great alternative to Autoptimize and WP Better Minify. FVM supports Nginx gzip_static module and it is compatible with 100s...

How to exclude pages or posts from sitemap in WordPress?

H

A blogger or webmaster may add the robots meta noindex or nofollow tag to irrelevant or thin pages or posts. When you add the attribute to pages, search engines will remove the pages from their index. If you don’t remove the no-indexed posts from the sitemap, search engines might crawl the posts even though they’re not relevant to your site. If you want Googlebot or Bingbot to crawl...

Business Continuity Analysis

B

This is post 12 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

An analysis of different data sources used in a forensics investigation

A

This is post 11 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Google AMP pros and cons: Should you implement AMP on your website?

G

After Googleweblight, AMP aka Accelerated Mobile Pages is the new initiative from the search engine giant Google to make the web fast. As of today, over 900K sites are powered by AMP. I’ve used AMP on my site for a month. Below, I’ve shared the Pros and Cons of Google AMP. Pros of Google AMP (Advantages) Easy to implement Google has published a detailed documentation which covers the...

Forensics in Business Continuity Planning

F

This is post 10 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

What is the Role of Computer Forensics?

W

This is post 9 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

A2 Hosting review: Is it the fastest shared hosting service?

A

A2 is one of the top 10 hosting companies in the world. The company has been operating since 2001/2002 and it has launched several hosting plans for every budget. As of today, over 10K sites are hosted on A2 servers. A2 offers cloud, VPS, dedicated and shared hosting service. Is it a reliable hosting firm? Are its plans affordable? Is its support staff customer friendly? Let’s find it out...

Monstroid2 review: A great multipurpose WordPress bootstrap theme

M

Monstroid2 is a premium multipurpose WordPress theme powered by Twitter Bootstrap and Cherry Framework, a secure modular open-source framework for developing themes and plugins. It is the successor to the Monstroid theme which had become a talk of the town within few months of its launch. Monstroid2 has new and powerful features. It also includes a powerful live theme customizer and page builder...

Malicious Code Detection

M

This is post 8 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

Remote Access Trojans

R

This is post 7 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

How to increase traffic to blog for free?

H

Starting a new blog is easy but making it popular is difficult. People find blogging as one of the easiest ways to make money online. Well, making money through a blog is not a piece of cake. Only websites getting decent traffic generate revenue for their owners. A successful blogger is one who earns enough money only to feed his family and pay internet and web hosting bills. Frankly speaking...

Presenting Digital Evidence

P

This is post 6 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

How to test WordPress plugins online without installing?

H

If your site is getting good traffic, and if a new version of the plugin you’re using has been launched, you’ll have the following two questions in the mind: Will the plugin break your site?Is the plugin worth installing? Even though the plugins are thoroughly tested before launch, it may have some bugs. If you install the update, your site may crash or it may add HTML code which...

Confusion over Terminology

C

This is post 5 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

How to disable or noindex WordPress attachment pages?

H

Attachment page is the built-in feature of WordPress. When these pages are not handled correctly by the website owner, Google and other search engines will index them. WordPress attachments are thin pages that don’t add any value to a blog. These pages should be used only on personal or photography blogs wherein you want the visitors to comment on the pictures, videos, and other media files...

Lessons Learned using Drupal’s Domain Access Module

L

Over the last few months my team has been developing microsites to accompany our main website. The requirements for these sites included having their own domain, theme and separate content. After reviewing options in Drupal 7, I decided the best approach given our situation was to use the Domain Access Module. The Domain Access Module provides a very solid and powerful framework for developing...

Data Hiding and Steganography

D

This is post 4 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me