I’ve owned the Amazon Echo Buds wireless headphones for over a year now, since they were first made available in the UK. And while the headphones have served me well for the past 12 months, I’ve had several issues that has left me overall disappointed with the product.
- Home
- Blog
Blog
Hardening Apache Using Security Configuration
When setting up a new Apache server to run your application, it’s always a good idea to setup some initial security settings as part of the process. Luckily, Apache comes with a default security.conf file that can be enabled and updated to add basic hardening to your server.
Apache, Hardening, SecurityReporting cPanel cPHulk IPs to Abuse IP DB
But did you know that you can configure cPanel, and specifically cPHulk Brute Force Protection to automatically report abusive IPs to the IPAbuse database.
Brute Force, cPanel / WHM, cPHulk, Security3 Tools to Help Secure Your Server or Website
In a recent project, I’ve been liaising with web security experts to carry out security testing on a number of client servers. During my research, I’ve come across various free tools that can help you identify any potential issues.
Penetration Testing, Security, Server Configuration, SSLCreating Symlinks to Libraries in Composer
When developing a new library in PHP, it’s sometimes useful to symlink the library into a project while you work on it. Find out how to update your Composer config to achieve this.
Composer, Development, PHP, TutorialMaking Ajax Calls Sequentially using jQuery
In a recent project, there was a need to make ajax calls to a remote server in a sequential manner to synchronise data. Each call would wait for the previous one to complete, before triggering the next one. See the code here.
Ajax, JavaScript, jQuery, Tutorial