4GoodHosting
Live Help
24/7 Support
4GoodHosting Canada 1 866 708 4678
Blog Menu G
Search
Categories
m

Category: Domain Related

vlog 1210
reading time Reading Time: 6 minutes

The appeal of the notebook computer in comparison to the desktop is that the notebook allows for portable personal computing, and that’s a big plus for people nowadays. More often than not people’s laptops will be plugged in when they’re resting on a desktop at home, but when they’ve got them tagging along outside of it then there’s few things worse than seeing your notebook’s battery start to wane dangerously low. Some notebooks are worse than others with the way they tear through a battery reserve in very little No time, and these days many of you have likely seem the new Chromebook commercials that promote a product with a superior long-life battery to prevent any of the ‘we’re dying over here’ as they say in the commercial. No matter what you might be doing on your laptop, a near-dead battery while you’re still a long way from home is definitely not cool. Here at 4GoodHosting, we’re like the individuals at any good Canadian web hosting provider who will be similarly anxious anytime our devices are dipping way too much for our liking. One of the things the nature of our job does for us is it has us in a position to soak up a lot of information on the world of computing, and we soak it up pretty readily. When we learned of these tips for getting more battery life for your notebook, we thought it’s exactly the kind of information that would be well received in our blog. So here goes for this week. Start with a Visit to Power Settings Every laptop battery is built to handle a certain number of charge cycles. This number is typically somewhere around 500 full cycles — and in some instances more. A charge cycle equals one full discharge down to 0% before recharging back up to 100%. Similarly, a discharge down to 50% and then topping up to 100% would equal half a cycle. Over the course of the battery’s working life, each charge cycle decreases its capacity from the original design specification. The less often your drain it, the longer the battery will last. A good place to...

You may find this interesting too.
adobestock 163919461
reading time Reading Time: 5 minutes

With all the talk about the ongoing advent of supercomputers and all they’re poised to do and having major ramifications for our day-to-day existences, there hasn’t been a whole lot of talk about the technological discoveries that are enabling these new mega processor computers to do what they do. Often times it’s not that they’re doing something which they weren’t capable of doing previously, and more that they’re doing them infinitely faster than they could before. Size is only part of it, as most of these new super computers are nowhere near the room-taking behemoths that were seen in the late ’70s and early 80s. Here at 4GoodHosting, we imagine there isn’t so much as one reliable Canadian web hosting provider who’s not keeping close tabs on these developments. Given the nature of the business we’re in, this stuff is especially relevant and we’re quite confident in guessing that it’s similarly must-read stuff for those of you with business interests that tied to what the World Wide Web is capable of as well. So today we’re going to look at how one particular component of computers that have been part of them since the beginning – magnets – are now having being supercharged in a very particular way. If this is something that interests you, read on. The Power in Disrupted Magnetism A necessary scientific preface here; magnets rapidly recover their magnetic properties following any sharp hit that disrupts their magnetism. Over recent years there’s been more research into this phenomenon, and it appears that was for good reason. Lasers were fired at slim magnets, and what happened after the laser beam hit it was that the magnetic spins of the material’s atoms started behaving more like a fluid, rather than a solid. As a result the magnetic properties formed ‘droplets’. The researchers then compared the magnetic activity to filling a jar with oil and water, and then shaking the container. How all of this is relevant is in how the spins of zapped magnets act like those in superfluids, with the magnets increase the expanse and concentration of properties due to the new molecular arrangement that is promoted by...

You may find this interesting too.
adobestock 109401734
reading time Reading Time: 7 minutes

If you live in one of the major metro areas of the country you will very likely have never had to deal with insufficient internet connectivity. Consider yourself fortunate, as that’s exactly the frustration that many people in more rural areas of the country have had to tolerate for a good long while now. The fact is that Gigabit internet speeds were something that you did without if you were living somewhere without much in the way of population. Which is a shame, as quite often those spots are the best places to be in the country if you want an especially high quality of life. The good news of course is that this is changing. Long-awaited gigabit internet speeds are slowly but surely coming to a growing number of smaller communities in Canada, as fiber infrastructure improves and companies offer ultra-fast service packages. Here at 4GoodHosting, this is something that we’ve heard lamented by people in these areas, and that’s likely the case for nearly every good Canadian web hosting provider too. So what we’re going to do here this week is share what we know about ways you can be best prepared for the high-speed Internet revolution that may well be on your horizon too if you’re living in smaller town Canada. Here’s 5 simple and very doable suggestions for you Set Up Quality Wired Connections Wired connections tend to be better for gigabit speeds due to their reliability and lack of interference. To benefit from the best of gigabit internet, the right wired connections go a long way and if you’re on a desktop most of the time this is the way you want to go. Start with evaluating the wired connection from the internet modem to your router. Most modern Ethernet ports manufactured in the last few years are gigabit Ethernet capable. However, if you have a router or other wired device that’s older than that, then it may be using an older type of Ethernet connection and possibly one that will not be able to support Gigabit Internet speeds. In this scenario what’s going to happen is the router will bottleneck your entire home network,...

You may find this interesting too.
adobestock 177633886 1024x585 a
reading time Reading Time: 7 minutes

There are few if any shortened terms that are as immediately recognizable as Wi-Fi, and the way it’s universally understood to mean a wireless internet network for people to access the web via mobile internet browser devices. Unless you’re the type of person who never leaves home you probably take advantage of them more than a few times every week, and for any number of different reasons. This ultimate digital convenience isn’t likely to be any less popular anytime in the future considering we live in a world that’s increasingly digital all the time. It’s for this reason that Wi-Fi Direct is definitely deserving of some fanfare, and while many of you may already be familiar with it there’s plenty of others who might enthusiastically welcome an introduction to anything that puts them online without having to dip into their monthly data allowance. Here at 4GoodHosting, we imagine we’re like any other Canadian web hosting provider in that we’re no different than the rest of you in that regard. We need to start with this, though - Wi-Fi Direct is not new at all. In fact, it’s been enabling versatile, peer-to-peer wireless connections for almost 10 years now, but it’s kind of been flying under the radar the whole time it would seem. So what we’re going to talk about here is what it is, what it can do, and what you need to know when using it. What Exactly is Wi-Fi Direct? The simplest and most accurate definition here is that it is a connection that allows for device-to-device communication. It links devices together without a nearby centralized network. The first device acts as an access point, and the other one connects to it using WPS (Wi-Fi Protected Setup) and WPA/WPA2 (Wi-Fi Protected Access) security protocols. It was in the early 2000s that this standard was developed and incorporated into web browser equipped devices. Some of the more knowledgeable of you may now be saying to yourself that sounds like the working of Bluetooth technology. It does sound like it, but it’s not the same operation here. The difference is that Wi-Fi Direct can handle more information at higher...

You may find this interesting too.
adobestock 219422541
reading time Reading Time: 5 minutes

It’s pretty much a weekly occurrence for the world’s leading web world giant to be making a splash of some sort, and lately a good many of those splashes have been stark reminders of just how increasingly omnipotent Google has become in every aspect of digital life. On the one hand the way they’ve pushed the development of new technology has been of great benefit to all of u, while on the other there are times when we hear of news that makes you wonder if it’s a good idea to have so much power and influence consolidated in one pair of hands. Here at 4GoodHosting, it’s safe to say we’re much the same as any other Canadian web hosting provider would be in the way we regard this. The nature of what we do gives us a very valid first-hand overview of such proceedings, and offering genuine perspective on it is really something that comes with the territory. It’s also likely safe to assume that the majority of those trusting their web presences to us will have you understanding of what would be meant by ‘quantum supremacy.’ That term is definitely trending online right given what’s recently been announced as it regards Google’s latest accomplishment. It certainly has the potential to be quite a pivotal development in the world and one that is maybe even a little ominous too (read on), so we’ll make it the topic for this week’s blog. An End to Effective Encryption A term that most of you will know, however, is encryption. To encrypt something is to keep it locked behind some sort of code that is nearly unbreakable for some and entirely unbreakable for most. Up until now, encryption has been the means by which digital files and the like have been effectively kept out of the hands of those who should not have access to them. If what is being reported here now is true, however, Google’s new 53-qubit quantum computer has achieved ‘quantum supremacy’ and apparently it will soon come to mean that nothing is entirely secure, even with the best and most advanced encryption. To give you an idea of...

You may find this interesting too.
adobestock 23394485411
reading time Reading Time: 5 minutes

It’s nearly impossible to veer away from web security and privacy concerns these days, as it’s a pressing issue in the digital world and the frequency with which new hacker attacks are arriving makes this types news as necessary as it is overwhelming. As we discussed in an earlier entry here, hackers are motivated by money, as there’s dirty dollars to be made selling sensitive information acquired from people without their consent, approval, or anything or the sort. So here we are into the second last month of 2019 and – not surprisingly – another new and urgent software vulnerability is pushing its way to the forefront of what’s new and noteworthy in the world of web hosting. Here at 4GoodHosting, it’s likely that we’re not different from any other good Canadian web hosting provider in that we don’t have the luxury of not paying attention to developments like these, and so here we are again today. Most of you will be familiar with Horde, as it’s one of the most popular free and open-source web email systems available to consumers these days. In truth, it’s the epitome of what a quality open-source web resource should be, as it’s been very responsibly built and is a good example of what can and should be done to ensure that software does not eventually become exclusive to deep-pocket development businesses. However, unfortunately it seems that a major security flaw with Horde has been exposed and we believe it’s always best to put users in the know as soon as possible regarding this stuff. We’ll try to go short on the technical stuff, but this vulnerability is related to CVE 2018-19518, an IMAP (Internet Message Access Protocol) and it exists in the ‘imap-open’ function that is used to open an IMAP stream to a mailbox. Invisible Thieves In most cases where security is compromised and information or identity theft occurs – both in the digital world and otherwise – there’s more often than not some type of identifiable evidence of an unwelcome guest having been on the ‘premises’. Not so here, as a prominent web security researcher claims they’ve detected several vulnerabilities in...

You may find this interesting too.
adobestock 294546326 editorial use only 2 768x561
reading time Reading Time: 7 minutes

There’s no family of phones that make quite the splash like iPhones when a new one arrives. These days it’s the iPhone 11 that’s come onto the scene with a whole lot of fanfare, and for good reason. It’s quickly becoming regarded as a big step up from its predecessor, and not surprisingly they’re being snapped up big time by consumers who don’t mind the somewhat pricey tags attached to them. The tech giants out there in Mountain View, CA truly don’t ever rest on their laurels, and the iPhone 11 is a testament to that. Here at 4GoodHosting, we’re thinking it’s likely that every quality Canadian web hosting provider is going to have plenty of customers who are iPhone faithful. We’re no exception there and we have more than a few of them here ourselves. If you’re going to shell out the big bucks for the newest iPhone then you’ll be expecting a superior product. Now to be clear we’re not suggesting the iPhone 11 isn’t one, but it is true that – as is the case with any tech product – there’s often a few kinks that need to be worked out. These issues aren’t so major that they’ll be any type of deal breaker that will have an owner second guessing their decision to buy the newest iPhone, but they’re significant enough that any ‘fix’ for them will likely be most welcome. So that’s what we’ll have for you here today, an overview of common problems with the iPhone 11 Pro and very straightforward ways of addressing them. Eventful OS It’s true that the number of reported issues with iOS 13 makes up quite a list. In response to this Apple has released a series of updates to respond to them, offering fixes to mitigate issues with the hardware. Here are a few initial iPhone 11 problems we’ve discovered around all three versions of the new phone so far and some tips on how to fix them. Problem & Fix 1: Wireless Charging This issue is definitely the most widespread of all, so it gets top spot on our list. The most common issue here is when...

You may find this interesting too.
adobestock 220758728 e1571688322657
reading time Reading Time: 6 minutes

It’s likely fair to say that people who are loyal to MACs are more fervently that way than their opposites, meaning people who are PC. Whether that has anything to do with Apple’s advertising campaign of 10 years ago or so where MAC was a young, hip, and casual and PC was older, inflexible, and suit n’ tie guy all the way. But the truth of the matter is for those with certain prerogatives when it comes to their computing device – especially for creative work – a MAC is the only way to go much of the time. It’s for this reason and the ongoing popularity of the iMAC and MACBook that today’s subject is worthy of some attention. There’s been a pronounced rise in the number of phishing attacks against MACs, especially in recent years. Here at 4GoodHosting, we can assume that many of you are MAC devotees as well, and that’s why as a leading Canadian web hosting provider we can relate to how anything that puts you more up to speed on what might be threatening your Mac is going to be quite welcome. So what’s this all about, and what’s the need-to-know here and what’s just noise? We’ll do our best to lay it all out for you here today. The Mac Myth of Malware Immunity That MACs are immune to malware is a myth, but it’s certainly a popular one. It is true that the risk of attack for Apple’s computers is significantly less than for Windows computers, but they can still be compromised and infected. Look no further than the Zoom infection that hit up many users earlier this year, and something that did get quite a bit of coverage. This is confirmed with a report a few months back from antivirus firm Kaspersky, which published a report claiming that phishing attacks on Mac users could double from their 2018 rates by the end of this year. That’s going to be a cause for concern for anyone using a Mac. The report states that in the first half of 2019, Kaspersky software detected some 6 million or so phishing attacks targeted at Mac...

You may find this interesting too.
adobestock 145566016 e1570943110134
reading time Reading Time: 7 minutes

Internet privacy is one of the hottest of the hot button issues in the digital world these days, and it has been for quite some time. There’s so many different ones that are still discusses at length, and for good reason. News over recent years has indicated the surprising extent to which people’s private and other information has been exposed. There are ongoing efforts to counter this trend, but as is the case with many things it takes time to put effective measures in place. Browser fingerprinting is one of them, and when one digs deeper into this particular issue it’s fairly common to have greater concerns about it. Here at 4GoodHosting, we are one of the many reputable Canadian web hosting providers who see the ‘insecurity’ of the World Wide Web to be as big a problem as it really is. As such we choose to make people informed of what they can do to protect themselves against the prying eyes that they likely have no idea are watching their moves online. So what’s at issue here, how concerned should you be, and what can people do to be proactive in defending themselves against browser fingerprinting. Let’s look at all of this today. Pervasive Peeping A good number of people who use VPN services to hide their IP address and location may believe that by doing so they don’t have to worry about their browsing privacy being violated. This is the best place for us to start here, because that’s simply not true. With browser fingerprinting you can be identified and tracked. One thing there’s no getting around is that every time you go online, your browsing device then provides highly specific information about your operating system, settings, and even hardware, to the site you’re visiting. This in itself is perfectly normal, and ideally shouldn’t be any cause for concern. However, when this information is used to identify and track you online then you’ve experienced browser fingerprinting, and unfortunately many unique details and preferences can be exposed through your browser. Once a sufficient amount of information has been collected, you are now regarded as having a ‘fingerprint’ for tracking...

You may find this interesting too.
adobestock 284508738 editorial use only e1570544507642
reading time Reading Time: 6 minutes

It may be the name of a particularly scenic island off the Southern California coast, but Catalina is now also the name of the newest Mac OS that has recently arrived. Like any successful company they’re not ones to rest on their laurels at Apple, and as such these new and improved operating systems keep on coming. For most Mac owners that’s a good thing, and there’s a LOT of R&D efforts and budget directed towards determining what new wrinkles users will find most appealing. Here at 4GoodHosting, we imagine that nearly every other quality Canadian web hosting provider is also going to be taking note of the new features seen with Mac OS Catalina. Considering that Macs are the computers of choice for people who employ their devices for creative purposes, we can go ahead and assume these development will appeal to enough of our customers that they’re definitely worthy of a blog post. So let’s do that here today – have a look at the Top 5 New Features with Mac OS Catalina. With its release, the new MacOS brings with it a laundry list of changes, including a host of new features, a few updated apps, and the demise of a beloved app. But among these features, five really stand out from the rest. Here are the five best features in MacOS Catalina. Apple Music, Podcasts, and TV – Replacing iTunes To be certain, there are a LOT of people who are none to pleased to have heard of iTunes’ coming demise. Whether or not that’s going to be problematic for you, the general consensus is that over time these users will also come to appreciate the appeal of what’s being introduced here with Catalina as it regards entertainment via the devices. Beginning with Catalina, iTunes is will be replaced with Apple Music, Apple TV, and Apple Podcasts apps. And, in our opinion, if you’re open to new things you’ll quickly come to see how this is all a good thing. The general consensus is that the Apple Music app is lightning fast and will provide users with a library of some 50 million songs, playlists, and...

You may find this interesting too.
On This Page G
Explore 4GOODHOSTING
Copyright © 2025 4GoodHosting. All Rights Reserved.
+1 866 708 4678