Wednesday, October 17, 2018
  PEM or Privacy Enhanced Mail is a Base64 encoded DER certificate. Privacy Enhanced Mail certificates are frequently used for web servers as they can easily be translated into a readable data using the simple text editor. In generally when...
505 errors in the HTTP cycle: This article illustrates the 505 error. If any of the clients go through the following cycle when it communicates with the Web server:Obtain an IP address from the IP name of the site...
What is IP address? An IP address can be static or dynamic address. The IP address is a unique address for each device.  An Internet Protocol address is an identifier for computers or device on a TCP/IP network.Static Internet Protocol address A...
Cloaking Technique: A cloaking technique is of providing different content to the search engines and user. It provides users with a different result rather than providing what they have expected.  In other words, the definition of the cloak is, the web server...
Depending on the hardware and software configuration, you may experience SSH connectivity issues to make it alive. SSH is a common tool. When using SSH, the connection may get disconnected if the SSH connection is idle for some time...