How to set up two-factor authentication in the xneelo Control Panel Enabling two-factor authentication (2FA) on your xneelo account adds an extra step in the authentication process. Read article
Security and Reliability Information regarding the responsible security measures we have in place to protect our customers’ data and intellectual property. Read article
How to tell if a website is secure Customers will know that they have an active SSL session with a website when their browser displays ‘https://’ and the padlock icon in the address bar. Read article
How do I identify Domain Name Scams? There are deceitful companies running domain name scams intended to mislead you. Here is advice on how to identify and deal with some of these domain scams. Read article
Why am I receiving non-related bounce messages in my mailbox? Faking email headers, by viruses or spammers, is called Email Spoofing and is a common in the distribution of viruses and spam mail via the internet. Read article
How to secure your database There are scenarios where databases can become vulnerable to hackers. These situations can be prevented by securing scripts and MySQL statements. Read article
How to reset or update your passwords Use this step-by-step guide to reset or update the various passwords on your hosting account, including FTP, email, and database passwords. Read article
Why am I being prompted for a strong password when I create or update a mailbox password? konsoleH assists customers by enforcing strong passwords. These measures have been put in place to protect your online assets. Read article
Why does my home page have a virus? If your home page has been altered this may be as a result of Malware that has been embedded in your code through a Trojan virus on your local computer. Read article
How to secure your website against hackers We use advanced security protocols to secure our network and servers. Your website needs to be secured by you as we do not have access to this layer. Read article
Why a hacker wants your website Why are small or insignificant websites attacked? Because it contains a collection of resources that hackers can steal or exploit for further attacks. Read article
How to repair a hacked website Sites are most often hacked through vulnerabilities in the website code, compromised Content Management Systems or by accessing the site via FTP. Read article
How do I secure my files and folders using permissions? Permissions on files and folders can be modified using the File Manager, through a normal FTP client or via SSH. Read article
What do I do if my website has been compromised by using my FTP access details? A compromised website is a result of your FTP access details being harvested and then used for spam mailing & the hosting of illegal content. Read article
About DDoS attacks A distributed denial of service (DDoS) attack is when a number of compromised computers, on the internet, bombard a target server. Read article
How to protect a directory via a .htaccess file Our Help Centre article provides a step-by-step guide to help you securely protect your directory via a .htaccess file on your domain. Read article
How to add an SPF record Use the Manage DNS tool to create an SPF record for your domain and prevent spammers from spoofing your email address. Read article
The Protect Directory tool and how it works With the Protect Directory tool, you are able to restrict access to specified directories on your domain and grant privileged access to multiple users. Read article
How to add DKIM records for mail A DKIM record allows recipient mail servers to check whether an email that is claiming to come from a specific domain, is authorised to be sent. Read article
About SSL/TLS & digital certificates SSL/TLS is a technology that creates an encrypted connection between the web server and your visitor’s web browser so that confidential information can be transferred securely. Read article
WordPress security tips Follow our WordPress security tips so that you can secure your WordPress website against vulnerabilities, e.g. weak permissions, weak passwords etc. Read article
Mailbox Security Checks A common method of fraud is to crack the password of a mailbox and then add an email forwarder, allowing the skimming of private information. Read article
How to block unwanted traffic to your website from specific IPs Malicious or unwanted traffic to your website can be blocked by adding a snippet of code to the .htaccess file within your site content. Read article
About brute force attacks This is a means of breaking in to the back end of a website with relentless successive attempts, using thousands of possible username/password combinations. Read article
Mailbox Security Tips Simple ways to protect your mailbox from hackers, including tips on creating strong passwords, and how to check if your mail is secretly being intercepted. Read article
How to activate HSTS for your domain What is HSTS? HTTP Strict Transport Security (HSTS) is a web security policy mechanism that helps to protect websites against protocol downgrade attacks and cookie hijacking. It allows web servers… Read article
Our role in protecting your data on our managed hosting products A component of our Shared and Dedicated Managed hosting products is the storage of customers’ Website and Email data. Read article
How to order and install an SSL/TLS certificate Xneelo offers free Let’s Encrypt SSL certificates. This article explains how to order and install certificates from alternative Certification Authorities. Read article
How to deal with phishing scams Phishing is a fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details. Here’s how to avoid becoming a victim. Read article
How to store your passwords securely Consider using a password protection app that allows you to store all your vital information in a central, encrypted space. Read article
How to set up two-factor authentication in konsoleH Enhance the security of your konsoleH account by activating two-factor authentication (2FA). Read article
How to set up two-factor authentication in Webmail 2FA for your email account can be set up using a mobile app or your email address. Read article