In this blog post, we tell you how best to protect yourself from phishing attacks and walk you through a couple of best practices in this area.
Read moreChoosing Character Sets in MySQL: A Short Guide
In this blog, we will look a little closer into the character sets available in MySQL – we will tell you what they are, and how best to work with them.
Read moreThe MySQL Server – mysqld
In this blog, we discuss the ins and outs of the MySQL daemon and tell you how best to improve MySQL performance & security.
Read moreThe Requirements for a Web Application Firewall: What’s On the List?
In this blog, we go through some of the requirements that can make or break a web application firewall.
Read more