The Way Your Website Looks Changes How Your Visitors Feel

When you visit a website for the first time, it probably doesn’t take you long to judge whether the website is “good” or “bad.” It’s simple: Either you like it or you don’t. Either it’s easy to navigate or it’s not. First impressions mean a lot in the world of website design and marketing.

The post The Way Your Website Looks Changes How Your Visitors Feel appeared first on WPWebHost.

from – WPWebHost…

Read More

Have You Checked Your Hard Drive Lately?

Do you actually check your hard drive? For all you know, your hard drive is about to crash and you just don’t know it. The signs are all showing but you’re probably not aware of them. Even worst, you’re ignoring them.

Your computer’s hard disk drive (HDD) works diligently at storing and protecting your data, including files, operating system, and software. Although rarely visible, unless it is an external drive, this workhorse is consistently performing its duties. That is until your computer starts crashing.

Maybe you have seen your PC blue-screen and reboot, or your system takes an unusual amount of time to open a folder. Possibly the hard drive is producing strange noises you have never heard before, or you have noticed files seem to be disappearing.

If any of these events have occurred with your computer, whether it be Windows or a MAC, these signs are indicative of a failing HDD. When your hard drive dies, which it will eventually, without a proper backup, your data can perish as well. To prevent this demise from happening, here are six free sites that will help detect issues with your hard drive.


Yes, there are six free sites that can help you check your hard drive. Take note that these six sites can just detect issues with your hard drive. They will not, in any way, prolong the life of your hard drive. Nonetheless, it wouldn’t hurt to try them out.

The PassMark DiskCheckup boasts of its Self-Monitoring Analysis and Reporting Technology feature.

Although Windows OS has tools such as Error Checking built-in, there are alternatives that may provide greater insight to your problems. For example, this HDD test that works for most hard drives using Windows 10/8/7/Vista/XP and Windows Server 2008/2003. It’s easy to use with two types of self-tests: short (5 minutes) and long (up to 45 minutes), and can be configured to email you when specific events occur.

In addition, DiskCheckup can help predict HDD failure by tracking Self-Monitoring Analysis, and Reporting Technology (SMART) attributes such as spin-up time, the number of start/stops, hours your system is powered on and the hard drive temperature. Unfortunately, DiskCheckup cannot scan SCSI or RAID devices and is not free for commercial use.


HD Tune can monitor the performance of both the hard disk and SSD. It also works well with memory cards.

HD Tune works with several types of storage devices including internal, external hard drives, solid state drives, and memory cards. The program is easy to use and offers useful tests such as a benchmark read test, run & error scan.

As with DiskCheckup, HD Tune can help determine the health of your hard drive using (SMART). Although earlier versions of this tester only support Windows 7/XP/Vista and 2000, the latest edition, HD Tune Pro 5.70 works with Windows 10. Only personal and home use are permitted.


Macrorit Disk Scanner can tell you if your hard disk is not safe to store any more data.

Checking for bad sectors on your system’s hard drive is easy with Macrorit Disk Scanner. It is fully portable and does not require installation. This scanner works well on several operating systems including Windows

Read More

Learn how to Record and Replay Linux Terminal Sessions Activity

Generally, all Linux administrators use history command to track which commands were executed in previous sessions, but there is one limitation of history command is that it doesn’t store the command’s output. There can be some scenarios where we want to check commands output of previous session and want to compare it with current session. Apart from this, there are some situations where we are troubleshooting the issues on Linux production boxes and want to save all terminal session activities for future reference, so in such cases script command become handy.


Script is a command line tool which is used to capture or record your Linux server terminal sessions activity and later the recorded session can be replay using scriptreplay command. In this article we will demonstrate how to install script command line tool and how to use script tool to record Linux server terminal session activity and then later we will see how the recorded session can be replayed using scriptreplay command.

Installation of Script tool on RHEL 7/ CentOS 7

Script command is provided by the rpm package “util-linux”, so install it on your CentOS 7 / RHEL 7 system in case it is not installed, run the following yum command,

[[email protected] ~]# yum install util-linux -y

On RHEL 8 / CentOS 8

Run the following dnf command to install script utility on RHEL 8 and CentOS 8 system,

[[email protected] ~]# dnf install util-linux -y

Installation of Script tool on Debian based systems (Ubuntu / Linux Mint)

Execute the beneath apt-get command to install script utility

[email protected] ~]# apt-get install util-linux -y

How to Use script utility

Use of script command is straight forward, type script command on terminal then hit enter, it will start capturing your current terminal session activity inside a file called “typescript”

[[email protected] ~]# script
Script started, file is typescript
[[email protected] ~]#

To stop recording the session activities, type exit command and hit enter.

[[email protected] ~]# exit
Script done, file is typescript
[[email protected] ~]#

Syntax of Script command:

~ ] # script {options}  {file_name}

Different options used in script command,


Let’s start recording of your Linux terminal session by executing script command and then execute couple of command like ‘w’, ‘route -n’ , ‘df -h’ and ‘free-h’, example is shown below


As we can see above, terminal session logs are saved in the file “typescript”

Now view the contents of typescript file using cat / vi,

[[email protected] ~]# ls -l typescript
-rw-r--r--. 1 root root 1861 Jun 21 00:50 typescript
[[email protected] ~]#


Above confirms that whatever commands we execute on terminal that have been saved inside the file “typescript”

Use Custom File name in script command

Let’s assume we want to use our customize file name to script command, so specify the file name after script command, in the below example we are using a file name “session-log-(current-date-time).txt

[[email protected] ~]# script sessions-log-$(date +%d-%m-%Y-%T).txt
Script started, file is sessions-log-21-06-2019-01:37:39.txt
[[email protected] ~]#

Now run the commands and then type exit,

[[email protected] ~]# exit
Script done, file is sessions-log-21-06-2019-01:37:39.txt
[[email protected] ~]#

Append the commands output to script file

Let assume script command had recorded the commands output to a file called session-log.txt file and now we want to append output of new sessions commands output …

Read More

Looking For A Deleted Phone On Your iPhone? Try These Apps.

You didn’t mean it but it happened. Your fingers accidentally got on the “delete” icon and a photo just disappeared. If only your iPhone had a safety net like that of a Recycle Bin in your desktop, then you wouldn’t freak out so much. Wait. There probably is a safety net. You just don’t know it yet.

For many people, photos are the single most important content on their iPhone. So losing your photos can be something of a catastrophe.

The good news is that even if you accidentally delete some (or all) of your photos, there are a few ways to get them back.


There’s really no need to despair over a deleted photo on an iPhone. There are a couple of apps that you can use to recover deleted photos. The first of which is the Photos app. This particular app has a “Recently Deleted” folder.

Some people might not realize that Apple provides a “recently deleted” photo folder in the Photos app — think of it like the Recycle Bin on your computer desktop. It holds all the photos that have been deleted for 30 days. On day 31, a deleted photo is deleted permanently — but until then it’s easy to recover.

1. Open the Photos app.
2. Scroll down the list of Other Albums and tap “Recently Deleted.”
3. Tap “Select” at the top right of the screen.
4. Select every photo that you want to return to your iPhone.
5. In the lower right corner, tap “Recover All.”


You can also recover your photos from your backups in iCloud.

If the photos are already gone from the Recently Deleted folder, then you may be able to get your photos back by restoring your phone to a backup.

The disadvantage of this approach is that you will need to replace all the other content on your phone — apps, data, text messages, and so on — with an older backup, which you might not want to do. If the backup you want to restore is fairly recent though, it might be worth it.

If you use iCloud to back up your phone, follow these steps.

1. Backup your phone so that if something goes awry, or you don’t like the content of the older backup and are willing to give up the photos, you can return to your current configuration. Follow the instructions in our article ” How to backup an iPhone to iCloud, your computer, or an external hard drive.”
2. After the backup is complete, perform a factory reset, and then restore the phone to a backup that’s old enough to include the photos you have lost. Our article ” How to restore your iPhone from a backup after taking the ‘nuclear option’ of a factory reset” has all the details to complete these steps.
3. When the restore is complete, check the Photos app to see if you recovered the photos you lost. If not, you can repeat the process and restore an older backup, or return to the most recent backup.
If the older backup has the photos you’re looking for, but you don’t like the rest of the older version, you can try emailing

Read More

Web Design Trends That Will Last Forever

Many web design trends are still in wide use today years after they have first made an impact. From the looks of things, these trends are going to last forever, and that any web designer worth his or her salt would do well to incorporate these timeless trends in their work.

The post Web Design Trends That Will Last Forever appeared first on WPWebHost.

from – WPWebHost…

Read More

Are Hybrid Solutions Best For Data Protection?

A business without data is dead. It just can’t go on. How can a business run, more so, thrive if there’s loss of data.? All kinds of businesses rely a lot on data. No matter what kind of business it is, it relies a lot on data. That’s the reason why businesses should take care of their data.

Businesses are well aware of the fact that IT environments generate data that needs effective storage technology and data recovery technology like backup and disaster recovery. This applies to all kinds of businesses regardless of the size (SMBs, SMEs, Large Enterprises).


Unfortunately, some businesses don’t put too much importance on data backups. Even worst, they don’t have a disaster recovery plan in place.

There’s no excuse for lack of data backups. Whether a business is big or small, it should have a reliable process to back up data. That way, they can always get back their data in case of an emergency.

A solid disaster recovery plan includes a reliable backup system. The problem is, some businesses don’t want to invest in it. They think it’s just too expensive.

So, why are SMBs, SMEs or startups reluctant about purchasing and setting up these technologies? It’s the price tag on them.
IT infrastructures tend to be very costly and besides these CapEx costs, there are OpEx costs to them as well. An IT infrastructure requires maintenance, power, cooling and teams that manage and maintain them.


A disaster recovery plan does not have to include costly IT infrastructures. There is a more affordable option for small businesses.

Instead of pushing IT environments into the corner, businesses can opt to setup value products and support their IT environments. There are a number of technologies available that can make this happen …


Small businesses can consider backing up to the cloud. There are cloud service providers that don’t even require their clients to set up any kind of IT infrastructure. Once the business is signed with the service, data from the computers are automatically backed up. Now, that’s pretty convenient but it doesn’t mean that it suits all kinds of businesses.

Cloud technology might sound convenient from the stand point of a small business owner. However, there are three things to consider when opting for the cloud.

o It’s good but not as efficient as on-premises infrastructure
o It gets complex when you integrate it for storage, backup and disaster recovery
o It’s susceptible to network connections, bandwidth limitations and file size limitations


While cloud technology has its limitation, it coud still be very useful especially when combined with a storage appliance. Hybrid solutions are best for small- or medium-sized businesses. They can definitely protect data since they make use of both cloud technology and a storage appliance.

Hybrid solutions are simply the combination of on-premises infrastructure with cloud based services. An example would be a Network Attached Storage (NAS) appliance with cloud connect services.


There are cloud service companies that provide both online backup and NAS. Small businesses don’t have to worry about investing in another hardware device since it comes with the service as well. With both online backup …

Read More

How to Install and Configure KVM on RHEL 8

KVM is an open source virtualization technology which converts your Linux machine into a type-1 bare-metal hypervisor that allows you to run multiple virtual machines (VMs) or guest VMs


KVM stands for Kernel based Virtual machine, as the name suggests KVM is a kernel module, once it is loaded into the kernel , then your Linux machine will start working as a KVM hypervisor. In this article we will demonstrate how to install KVM on RHEL 8 system but before start installing KVM on your RHEL 8 system first we have to make sure that your system’s processor supports hardware virtualization extensions like Intel VT or AMD-V and enabled it from BIOS.

RHEL 8 KVM Lab Details:

  • OS = RHEL 8
  • Hostname = rhel8-kvm
  • Ethernet Cards = ens32 – & ens36 – 192.168..1.12
  • RAM = 4 GB
  • CPU = 2
  • Disk = 40 GB Free Space (/var/libvirtd)

Let’s Jump into the KVM installation steps

Step:1) Verify Hardware Virtualization is enabled or not

Open the terminal and execute the beneath egrep command

[[email protected] ~]# egrep -c '(vmx|svm)' /proc/cpuinfo
[[email protected] ~]#

If output of above egrep command is equal to 1 or more than 1 then this confirms that hardware virtualization is enabled and supported.

Alternate way to check whether hardware virtualization is enabled or not , execute the beneath command,

[[email protected] ~]# lscpu | grep Virtualization:
Virtualization:      VT-x
[[email protected] opt]#

If there is no output in above command then it confirms that Virtualization is not enabled from BIOS.

Note: To enable hardware virtualization reboot your system, go to bios settings and then look for Intel VT or AMD virtualization option and enable one of this option which which suits to your system architecture.

Step:2) Install KVM and its dependent packages vsing dnf

Run the following dnf command to install KVM and its dependent packages,

[[email protected] ~]# dnf install qemu-kvm qemu-img libvirt virt-install libvirt-client virt-manager -y

Once above packages has been successfully, run the below command to confirm whether KVM module has been loaded into the kernel or not,

[email protected] ~]# lsmod | grep -i kvm
kvm_intel             245760  0
kvm                   745472  1 kvm_intel
irqbypass              16384  1 kvm
[[email protected] ~]#

Step:3) Enable and Start libvirtd service

Run the following systemctl command to enable and start libvirtd service,

[[email protected] ~]# systemctl enable libvirtd
[[email protected] ~]# systemctl start libvirtd

Step:4) Create Network bridge and attach Interface to it 

In RHEL 8, network scripts are deprecated, We have to use Network Manager (nmcli / nmtui) to configure network and network bridges.

I have two Ethernet cards on my server, ens36 will attached to bridge br0 and ens32 will be used for management .

[[email protected] ~]# nmcli connection show
NAME    UUID                                  TYPE      DEVICE
ens32   1d21959d-e2ea-4129-bb89-163486c8d7bc  ethernet  ens32 
ens36   1af408b6-c98e-47ce-bca7-5141b721f8d4  ethernet  ens36 
virbr0  d0f05de4-4b3b-4710-b904-2524b5ad11bf  bridge    virbr0
[[email protected] ~]#

Delete the existing connection of interface “ens36”

[[email protected] ~]# nmcli connection delete ens36
Connection 'ens36' (1af408b6-c98e-47ce-bca7-5141b721f8d4) successfully deleted.
[[email protected] ~]#

Create a Network Bridge with name “br0” using mcli command,

[[email protected] ~]# nmcli connection add type bridge autoconnect yes con-name br0 ifname br0
Connection 'br0' (62c14e9d-3e72-41c2-8ecf-d17978ad02da) successfully added.
[[email protected] ~]#

Assign the same IP of ens36 to the bridge interface using following nmcli commands,

[[email protected] ~]# nmcli connection modify br0 ipv4.addresses ipv4.method manual
[[email protected] 
Read More

A More Practical Way To Recover Data From Ransomware

Ransomware is scary. It’s a computer virus you’d want to stay away from. If your computer isn’t protected, it’s going to be pretty hard to stay away from it.

Sad to say, the most common remedy to this particular virus is to pay an exorbitant fee to get back your data. That’s ridiculous! Why should you have to pay for your very own data?

Unfortunately, that’s the way it goes. Once your computer is infected by ransomware, everything in it is held hostage. If you think that’s totally surreal and it can’t happen to you, well, think again.

Every 14 seconds, a new business is targeted by ransomware — a virus that holds its software systems or data hostage until a ransom is paid for their safe return.


The last thing your business needs is to be in the mercy of hackers. You simply cannot afford to have all your confidential data turned over to a bunch of crooks.

If your computers have not been infected by ransomware, then good for you. However, that does not mean that you’re going to be spared from it at all times. Your computers can still get infected. You just don’t know when.

It’s just very unfortunate that businesses have to pay to get back their data. They don’t really have much of a choice, do they?

Once businesses are hit, they have 2 options: Pay hackers to return the data, or pay ransom-busting startups to recover it.


Even if you don’t resort to paying the hacker, you’re bound to spend a lot as well.

But, according to a new ProPublica report, those 2 options are often the same: Most “high-tech” data recovery startups merely pay the hackers behind the scenes — and then pocket the extra fees.


While ransomware recovery companies offer a valuable service to help you in times of trouble, you would still have to pay. In most cases, you would have to pay a lot.

The business model is simple: Ransomware recovery companies charge their clients fees that are far higher than the ransom amounts, so they make money no matter what.
Some firms are upfront about the fact that they negotiate with hackers — sharing data with law enforcement agencies and security researchers to prevent future thefts — but most intentionally obscure their payouts.


It’s hard to tell how ransomware recovery companies go about their business. The thing is, their service is useless if they just end up paying the hackers. Why hire a company to do that when you could do it yourself, right? Besides, paying the hackers will only pave way to more cases of ransomware.

But paying ransoms perpetuates the extortion industry: Cyberattackers who routinely collect $6m or more from secretive “data recovery” companies have every incentive to continue ransoming their way to riches.


So, what can you do in case your computers get infected by ransomware? To start with, you should make sure your computers are all protected. If they’re not, protect them now. Ransomware is on the rise and you need that layer of protection now.

Ransomware rates continue to rise for businesses: Ransomware attacks have increased 97% in

Read More

Change And Reset Password On Your Mac Computer

Need to change your Mac password? If you need to, don’t worry. You can easily do it.

Changing your password from time to time is important. It actually is a good practice to change your password regularly. Of course, you just have to remember it. If you forget it, there’s still no reason for you to worry. You can easily change and reset your password on your Mac computer.

Here’s are the simple steps that can help you change the password in your Mac computer.

If you know your password, you can login to your account and reset it with a few easy steps.

1. Log into your Mac.

2. Open the Apple menu (the Apple logo at the top-left of your screen) and choose “System Preferences.” You may also have it pinned to your menu bar (it’s a gray gear).

3. Click “Users & Groups.”

4. Select your user account on the left of the box and click the padlock in the bottom left to make your changes.

5. Click “Change Password.”

6. Enter your current password, your new password (twice) and a hint to help you remember your password (don’t make it too obvious). Click “Change Password” to complete the process.


Changing password is a lot different from resetting it. To say the least, the latter leaves you clueless as to what your password is. You really have no idea what it is but you shouldn’t worry about it. You can always reset your password but before you do so, keep this in mind.

Before you attempt to reset your password, check that you’re typing the correct upper and lower case letters and that Caps Lock isn’t turned on. Your password field may also have a question mark, which will display a password hint when clicked.


It’s not just your mom or grandma who usually forgets passwords. Everybody forgets passwords. When you do forget yours,  you can refer to these simple steps to reset.

There are two ways you can reset your Mac password. First of which is by using your Apple ID.

You may be able to reset your password using your Apple ID.

1. To trigger this option, keep entering passwords until you’re given the prompt that you can reset your password using your Apple ID.

Note: If you don’t see this message after 3 or more password attempts, then you don’t have this option and will have to try another method.

2. Click the arrow next to the prompt message and enter your Apple ID.

3. Create a new password and password hint.

4. Restart your Mac and log in using the new password.


You can also use your admin user to reset your Mac password.

If you’ve got multiple users on your Mac, and one of them is an admin, then you can log into that account and use it to reset your password.

1. Log into the admin user account.

2. Open “System Preferences” from the Apple menu or on your menu bar (it’s a gray gear).

3. Click “Users & Groups.”

4. Click the lock symbol and enter the admin name and password.

5. Select the name of the user

Read More