Articles Search Results

  1. How Nexcess limits bad bots How Nexcess limits bad bots OverviewAt Nexcess, we block and restrict bots that tend to create performance issues for clients’ websites, although you may ask our support team to grant access to restricted bots as necessary.   What are bots, ... Read More
  2. How can I prevent my site from being compromised? How can I prevent my site from being compromised? Application exploits are a regular feature of the eCommerce landscape, but in most cases they can be avoided. When an application is compromised, the methods used are often involve something simple, s... Read More
  3. How to configure your local email client How to configure your local email client OverviewThis article provides basic settings for use with IMAP and POP clients and provides links to detailed instructions for a variety of those clients. What you need  Login information for the email acco... Read More
  4. What is a Nexcess site-to-site VPN Tunnel? What is a Nexcess site-to-site VPN tunnel? OverviewA site-to-site VPN is an IPsec-based encrypted tunnel that links your Nexcess-hosted environment with a remote site. Definition A site-to-site VPN is an IPsec-based encrypted tunnel that links your N... Read More
  5. How to protect your Magento store from the Credit Card Hijack exploit How to protect your Magento store from the Credit Card Hijack exploit OverviewThis article explains how Magento store administrators can address the Credit Card Hijack security breach by applying the latest patches and performing other critical tasks... Read More
  6. How to change your Magento 1.x admin password How to change your Magento 1.x admin password OverviewThis document shows how you can reset or change your admin password for Magento 1.x and provides references for additional critical security measures. Preferred method The simplest method for rese... Read More
  7. How to use the Nexcess Secure Password Generator How to use the Nexcess Secure Password Generator OverviewThis article explains how to use the Nexcess Secure Password Generator to create a secure password or evaluate one. It is critical that you use a complex, secure password for your Nexcess host... Read More
  8. How to configure ExpressionEngine permissions and ownership How to configure ExpressionEngine permissions and ownership OverviewThis article explains how to configure the correct permissions and ownership for files and directories within an ExpressionEngine installation. Hosting environments One of the first ... Read More
  9. How to secure your ExpressionEngine website How to secure your ExpressionEngine site Secure the permissions of your site Limiting the file permissions can improve the security of ExpressionEngine. However, this process can be tricky as file permissions depend on your hosting environment and t... Read More
  10. How to configure WordPress file permissions How to configure WordPress file permissions OverviewThis article presents how to set the correct permissions for files within a WordPress installation. But first... Only Nexcess Cloud clients have SSH access by default. If you are a Nexcess Classic (... Read More
Displaying 1 to 10 out of 23 articles found First Page Previous Page Page 1 of 3 Next Page Last Page