Find modified and hacked files
Finding files, uploaded and left by hackers, as well as files, which they have modified, is a complex event. It might be enough with one […]
Continue reading »Notes from the Expert
Finding files, uploaded and left by hackers, as well as files, which they have modified, is a complex event. It might be enough with one […]
Continue reading »In the past few weeks we’ve been looking into different MySQL configuration options and were running many simple tests. Even though all tests were different […]
Continue reading »In this part we are targeting MySQL cache. On most of our shared-hosting serversĀ more than 50% of all queries are served by MySQL cache. […]
Continue reading »Today I wrote new tests. Today tests are targeting 3 large tables, containing from 100’000 to 1’700’000 records. We do huge number of random selects […]
Continue reading »MySQL is a most popular database management system. It can be configured to match your needs using huge amount of options and settings. But which […]
Continue reading »Sometimes, e.g. when your partition gets full during update or other server hangs during update your RPM database might get corrupted and updates with yum […]
Continue reading »When you need to move wordpress to another URL, there are few steps you should do: Step 1: Force to use new domain. The easiest […]
Continue reading »