The UK Metropolitan Police have published the first Cyber Scams Book/eBook. The book has been elaborate to help UK businesses to act the necessary measures to protect the companies/personal information and customers against cyber criminals and Protect the data information from the hacker to reduce the risk being a victim. Read more

Installation Guide:

  1. How to Setup Postfix/DKIM/SPF on Ubuntu with or without Plesk Onyx
  2. How to setup DKIM/SPF/DMARC in Ubuntu with Plesk Onyx
  3. How to setup SPF (Sender Policy Framework)
  4. How to setup DMARC and Benefits
  5. Generate a public and private key from OpenSSL (if require)
  6. How to install/setup dkim in cPanel
  7. Server Speedtest from command
  8. User unknown in virtual alias table

Important Tools

For DKIM Checker: Read more

For 10 years, Microsoft has been studying and analysing the threat landscape of exploits, vulnerabilities and malware. We’ve used data gathered from more than 600 million computers worldwide to develop one of the most complete security data sets in the world.

Our year-round research is then collected and published in The Microsoft Security Intelligence Report, a globally accredited, 160-page report that comprehensively addresses the security landscape. This year, in an effort to drive awareness of key insights and trends, we’ve also developed A Quick Guide to the Most Important Insights in Security, an abridged, to-the-point resource that readers can use to learn the important factors in the complex matrix of Cybersecurity. Read more

How to Optimise WordPress


21 Expert Tips to an Ultra-Fast WordPress Website



There is much research that indisputably shows that the loading speed of a website is really important. In an age where new tech- nologies appear every day, where the speed of computers and the Internet increases greatly with each new innovation that becomes widely used, the attention span of the visitor is much shorter than it used to be a few years ago. Read more

Create SSH key pair

You need an SSH key pair to complete this quick start. If you have an existing SSH key pair, this step can be skipped.

From a Bash shell, run this command and follow the on-screen directions. The command output includes the file name of the public key file. Copy the contents of the public key file to the clipboard. Read more

E-book: What you need to know about Shadow IT

Shadow IT is on the rise. More than 80 percent of employees admit to using non-approved SaaS apps in their jobs, and Gartner estimates that by 2020, a third of successful attacks experienced by corporations will be on their shadow IT resources. While the urge to eliminate all shadow IT applications is understandable, it’s rarely the best solution. Read more