How-to: Buy Expired Domains

Here is a quick video on how-to-buy expired domains with high domain-rank. A prerequisite for this tutorial is that you’ll need access to Ahrefs & a copy of Scrapebox. I would also recommend buying some proxies for your Scrapes. TL;DW Login to Ahrefs >> go to More >> Ahrefs Rank >> Select a domain Go… Read More

Installing Memcached

Memcached is a general-purpose distributed in-memory object caching system, which is often used to speed up and optimize back-end dynamic database performance. It does this by temporarily storing data and objects in the servers RAM/memory (like rendering a popular WordPress page on your blog). This reduces the number of direct requests to your databases, saving… Read More

Force SSL on a WordPress

I’ve noticed that a .htaccess redirect works from the root folder down, but if you access the website from an old link you won’t be forced to HTTPS. Updating the WP URL structure does not help The Redirect This will work to force the redirect: If you are running WordPress in a sub folder, the… Read More

Programming the DJI Tello [Mac]

Starting off, let’s all admit, you are going to crash into stuff, so more space you have the better. How-to: Program Tello to do backflips with Scratch 2.0! Install brew.sh on your Mac, If you are unfamiliar with brew! Homebrew is a free and open-source software package management system that simplifies the installation of software)…. Read More

Backup VestaCP with Restic [Ubuntu]

Now that my VestaCP install is north of 100GB, backups are becoming more challenging. To achieve an extra level of security, I started backing up my server to S3 using Restic. Here are the steps I took to achieve this. 1. SSH into your box.ssh root@IP 2. Install Resticapt install restic *if you don’t have… Read More

Add Quick Keys in Safari (or any Program on your Mac)

I constantly test “disable Javascript” in my web design work. To make the process a lot faster, I added a quick key. Here is how I did it. System Preferences Go to System Preferences, Click on the Keyboard icon. Shortcuts In Shortcuts, go to the App Shortcuts tab, adding your desired shortcut by clicking on the “+” icon in… Read More

How to Verify SHA1 and SHA256 Checksum on Mac

It is incredibly easy to add a malicious components (malware) to DMG files,  uploading them to file sharing websites like sourceforge.net, & infecting computers on a mass scale.  SHA checksum is added to DMG files like TransmissionBT1, & Handbrake.fr2 to detect file tampering. How to check SHA checksums: In terminal, find the file(s) you’d like to… Read More

Remove a repository in source list using terminal

List You can remove the repository from the sources list using terminal. Find First you need to find your lists: sudo ls /etc/apt/sources.list.d Command Look for your desire PPA here and then remove the PPA using the following command: sudo rm -i /etc/apt/sources.list.d/PPA_Name.list

Installing RKHunter on Ubuntu

SSH into your VPS host: ssh root@IP sudo apt-getco update sudo apt-get install binutils libreadline5 libruby1.8 ruby ruby1.8 ssl-cert unhide.rb mailutils Once it has finished downloaded, extract the files and enter the resulting directory: tar xzvf rkhunter* cd rkhunter* Install RKHunter: sudo ./installer.sh Initial Test Runs The first thing we should do is ensure that… Read More

DDoS Trojan attacks

Have you encountered with DDoS Trojan attack? It’s a familiar issue to all SysAdmins, when we work on DDoS attack. Normally, the top command shows a suspicious process with a random name like, Xdrgwdjd, jjiiyaykzg etc or some system commands like ls, ifconfig, pwd, ping, awk, telnet etc. When we kill that task another random… Read More