Well, there are lots of news about GoDaddy.com being down, now more than 4 hours, but the question is: How Godaddy.com will compensate the losses?!People hosting their websites on Godaddy.com servers, and its resellers, lost lots of money in this outage.“Over 50 local Myrtle Beach hotels that use GoDaddy services through Fuel Interactive could be […]
Who to call in case of website emergency? Due to some yet unknown issue, WordPress version 2.8.2 might be causing server errors. Lunarpages, my “current” and might become “ex” webhosting company, shut down Gibni.com yesterday without any prior notice, saying they’ve taken an emergency action, as the “index.php” script in my wordpress root was using […]
This article describes the Windows Delayed Write Failed error, and gives you all the possible solutions for this issue, with great details.This article describes the Windows Delayed Write Failed error, and gives you all the possible solutions for this issue, with great details.This article describes the Windows Delayed Write Failed error, and gives you all the possible solutions for this issue, with great details.
Making money online… Making money online is one of the most researched topics for many of web developpers, bloggers and website owners. It takes a lot of efforts to produce quality content and get enough traffic, to be able to rank better in search results and improve your different ranking factors. After a while of […]
About Conficker: If you ever heard about Microsoft (the maker of Windows and a full bundle of problems attached to it), and if you have already heard about Conficker, or also called Downup, Downadup or Kido, I suppose that you’ve already taken steps on protecting yourself and your friends from this computer worm (or computer virus as some […]
About Conficker: On October 23, 2008, Microsoft released a critical security update, MS08-067, to resolve a vulnerability in the Server service of Windows that, at the time of release, was facing targeted, limited attack. The vulnerability could allow an anonymous attacker to successfully take full control of a vulnerable system through a network-based attack, the […]