English
+370 5 205 5502 sales@monovm.com

Everythings you want and need to know in one place.

Search

Search:

03

Sep, 19

Like in SQL injection, XPath injection attacks occur when a website constructs an XPath query for XML data from user-supplied information. Thus, the issues that occur when using XML to store data are quite similar to those faces with SQL. XPath injection is a type of attack where malicious user input can be used to grant unauthorized access or reveal sensitive information such as XML document structure and content. This style of attack is carried out by making the user’s input be used in the construction of the query string. Unlike SQL attacks which depend on the SQL dialect used by...

26

Aug, 19

How Does SMTP Work?

What is SMTP? We all have heard the term IP, short for Internet Protocol. We need an IP to access the internet but the thing that might have slipped through is the SMTP (Simple Mail Transfer Protocol) which takes care of all the emails. SMTP is the most widely used email protocol and is a part of the TCP/IP protocol which is used to send and receive emails. So, how does it work? As part of being a protocol in the application layer, the SMTP server is always waiting for a request. When a mail is sent through an email client (Gmail, Yahoo, Outlook), a TCP connection is made which results in...

There are numerous ways that a site’s security can be compromised. One possible method of attack is an injection attack (i.e. the attacker provides untrusted input to a program). The two most common types of injection attacks are: SQL injection (SQLi) and Cross-site Scripting (XSS) attacks. Today we will discuss the latter and how to protect your site from XSS vulnerabilities. Cross-site Scripting is a type of computer security vulnerability which allows attackers to inject client-side scripts into web-pages viewed by other users. The attack is carried out when the victim actually...

19

Aug, 19

In this tutorial, we will guide you through the process of setting up mail forwarding for an email address in Plesk. Log in to Plesk and go to Mail > Email Addresses. Select the "Forwarding" tab > select the “Switch on mail forwarding” checkbox. In the available space, write the email addresses (one or more) to which you want the mail forwarded to, then click "OK". (Note: when entering multiple emails use spaces, commas, semicolons or start from a new line) If you want to turn off mail forwarding then simply untick the checkbox and click "OK". If you don’t...

Setting up and using mailing list on Plesk (Windows) If you are looking to send emails to a bunch people at once, then it’s time to get a mailing list. The mailing list contains emails of users who have subscribed to receive emails. These email messages can contain promotional materials, links, newsletters, educational material, presentations or even plain text. I will take you through setting up your mailing list in Plesk and managing it. Useful Tip: Don’t add people to your mailing list if they don’t want to hear from you (if they didn’t subscribe). First Login to...

16

Aug, 19

Cyber-attacks are executed in a nearly uncountable amount of ways. One such style of attack is an injection attack (i.e. when an attacker supplies an untrusted input to a program which is the executed). There are many types of injections attacks, however, the most common ones are SQL injection (SQLi) and Cross-site Scripting (XSS). Today we will delve a little deeper on what exactly is a SQLi attack, how it is carried out and how to defend yourself against it. What is SQLi? SQL injection (SQLi) is a type of injection attack that allows the execution of malicious SQL statements. This style...

08

Aug, 19

The Ultimate CMS Comparison

In our previous article about content management systems, we explained what is a CMS, its components, and its uses along with the advantages and disadvantages of using one. Now, let us delve a bit deeper into the most popular CMSes available, their strengths, weaknesses and the cases in which each one supersedes the rest. Firstly, let us state that there is no one-fits-all solution. Each CMS is designed with certain use cases in mind and although they all serve the same purpose, each one does it in a different manner and offers unique features and customization options. As in most areas of...

How to increase site speed? Nowadays we won’t visit a site which takes ages to load. I mean when there are so many options out there, why wait for something which is slow. Low site speed is one of the main reasons which reduces the traffic to your site. A few seconds will make a huge difference. If your site won’t load within 2 seconds, then say goodbye to more than half of your visitors. I will guide you through the do’s and don’ts in order to increase your speed. Fast response to requests. When you get requests to your website and there is a delay, then there's...

Despite the global efforts in cybersecurity, the internet is still a very dangerous place, filled with malware and spyware. Having a quality antivirus is crucial to the safety of your data and even hardware. This article will explain how you enable virus protection for your emails on your server running Plesk. Here's what you need to do: Go to the Mail tab. Click on the email address you wish to configure the antivirus on.      Click on the Antivirus tab and select the checkbox: "Switch on antivirus protection for this email address". Choose the desired mail...

02

Aug, 19

What is a CMS?

Since the internet’s popularization, having a website is a common practice for many internet users. Unfortunately, up until about a decade ago, internet users needed in-depth programming knowledge in order to create and edit content within a website. This made managing websites’ content not only difficult but also expensive without prerequisite knowledge. In order to combat these issues, content management systems (i.e. CMS) were developed. A web content management system is a computer software designed to create, edit, organize, publish and manage the content of a website....