How to enable HSTS on your server

How to enable HSTS on Apache, NGINX and Lighttpd

First we will understand What is HSTS Technology?

HSTS (HTTP Strict Transport Security) is an advanced security mechanism which was developed by IEFT and intended to secure the website and users against the cookie hijacking and protocol downgrade attacks. The main function of the HSTS policy is the web browser will only communicate with the server using secured HTTPS connection but not with the HTTP connection.

As per the HSTS policy, the browser should only access the server with the secured channel.

Let’s see the practical examples of HSTS Policy

A user enters HTTP version of a domain if HSTS is enabled the browser will load the HTTPS version of the website.

Check the image for more information.


How to enable HSTS in Apache2

To enable the HSTS in Apache2, you need to update the configuration file by adding the following line of code in VirtualHost section.

You can find the Apache configuration file here, (/etc/apache2/sites-enabled/website.conf)

# Optionally load the headers module:

LoadModule headers_module modules/


Header always set Strict-Transport-Security “max-age=63072000; includeSubdomains;”


As per the above line of code, when a user visits your website, the above header will load first and the expiration time is 2 years (63072000 in seconds).

Now to redirect your http website visitors into https version add following line of code in Virtual Host.

<VirtualHost *:80>



Redirect permanent /


Modrewrite is also another option to divers users into https version, here is the line of code you need to add in your VirtualHost section.

<VirtualHost *:80>


<IfModule mod_rewrite.c>

RewriteEngine On

RewriteCond %{HTTPS} off

RewriteRule (.*) https://%{HTTP_HOST}%{REQUEST_URI}



Save the config file and restart your Apache server, the HSTS will be active.

How to enable HSTS in NGINX

To enable the HSTS in NGINX, update the following line of code in config file’s server Block.

add_header Strict-Transport-Security “max-age=63072000; includeSubdomains; “;

Restart the NGINX server.

How to enable HSTS in Lighttpd

To enable HSTS in Lighttpd, update the following line of code in the configuration (.conf) file.

server.modules += ( “mod_setenv” )

$HTTP[“scheme”] == “https” {

setenv.add-response-header = ( “Strict-Transport-Security” => “max-age=63072000; includeSubdomains; “)


Restart the Lighttpd server.



Norwex Microfiber

Ask your Norwex Consultant about Norwex Microfiber

Change Remote Desktop RDP Port

Port 3389 is the home of the remote desktop protocol that powers Remote Desktop Services on all modern versions of Windows.  If your system has Remote Desktop enabled, it is listening for connections on port 3389.  Since this port is both well known and can be used to attack accounts, it is low hanging fruit for script kiddies and bots looking for an easy target.

Theoretically on a system that does not have an account lockout policy in place, which by the way is not a system default, the RDP protocol can be used to get the administrator password with brute force.  Brute force is a fancy way of saying trying all possible passwords.  If the system never locks out the account then time is the only barrier to eventually getting you password and logging in. 

The first defense is to implement a good account lockout policy but that does not solve the entire problem.  Any administrator of a public facing Windows web server will notice that their server is continiously attacked by bots looking for an easy target.  The bots will often lock out your accounts which can be very annoying.

To protect your system from the bots and script kiddies I always reccomend changing the default RDP port.  This will not fool an intelligent attacker but it will weed out the noise.

Follow these steps to change the Remote Desktop server port:

  1. Open up Registry Editor by clicking on the Start Button, type in regedit and then hit Enter.
  2. In Registry Editor, navigate to HKEY_LOCAL_MACHINE, SYSTEM, CurrentControlSet, Control, Terminal Server, WinStations and RDP-Tcp. 
  3. Right click on the PortNumber dword and select Modify. 
  4. Change the base to Decimal and enter a new port between 1025 and 65535 that is not already in use.
  5. Click OK and reboot.

Make sure to reboot to activate the change.

Keep in mind that the next time you want to connect to your system with RDP you will need to provide the port number.  You can do that from the Remote Desktop client by appending a colon after the host name or ip address followed by the port number.  For example, if I have a computer with host name of tweak with RDP running on port 1234 I would use tweak:1234 in the remote desktop client hostname field.

Win 500$ Cash!

Win 500$ Cash! Just join our site and on August 30th We will announce the winner. #mainprofile #domains #websites #startups via @MainProfiles

Online Certifications That Are Actually Worth Getting

13 Online Certifications That Are Actually Worth Getting


1) Google Apps Certification

Cost: $100

Link To Course

Description: An extremely valuable certification in the eye’s of many employers. The test consists of the user working with a real live domain and utilizing the Google Apps suite to accomplish common business tasks: this includes administering users, organizational units, groups, and access to services. Having this certification will send your resume to the top of the stack when interviewing for marketing jobs.

Other Google Certifications To Consider: 

2) Web Developer Bootcamp

Cost: $10

Link To Course

Description: This course is the sh*t! I took it several years ago and I here I am writing on the blog I designed and launched myself without the help of any developers. It covers HTML, CSS, JS, Node, and all the technology stacks required to build a website. They even give you working examples of websites where you get to build and tweak certain elements using the skills you learn along the way.

Related: 25 Subreddits That Make You Smarter

3) Beer Judge Certification

Cost: $10

Link To Course

Description: The first step in becoming a beer judge involves getting this $10 certification from the BJCP. The course consists of 200 questions and will test your knowledge of IPAs, Lagers, Stouts, Porters, and many more. Adding this certification certainly won’t get you your dream job on LinkedIn but will make you the most informed beer enthusiast when day drinking at your local brewery.

4) Psychological First Aid

Cost: Free

Link To Course

Description: Hosted by the National Child Traumatic Stress Network and promoted by the U.S. Department of Veterans Affairs.

You learn how to help disaster survivors get referenced to the professionals they need and how to triage those with more damaging psychological distress before it gets worse. Learn the signs, symptoms, and know where to forward the survivors to the proper agencies. Additionally there are some things on how to secure relief sites in consideration for physical and mental health.

5) HTML Certification

Cost: Free

Link To Course

Description: HTML is an extremely underrated skill that puts you head and shoulders above the competition, especially if you’re interview for a marketing position. It shows that you have a general working knowledge of how websites work and lets your future employer know that you have the required knowledge to update and tinker with their company site. Having an in-house employee who can make website changes instead of having to hire a contractor will certainly make you a more attractive candidate.

6) Project Management Certification (PMP)

Cost: $555

Link To Course

Description: Even if you’re not interested in strictly being a project manager this certification gives users the knowledge of how projects are started, managed, and maintained. A PMP certification gives you the ability to work in any industry and is often required for any upper-tier project management position.

7) Fema Certification

Cost: $350

Link To Course

Description: A long and somewhat repetitive test, a FEMA certification looks good to employers so they understand that you have knowledge of a basic command structure and how to handle adverse situations. Often times we think of FEMA as being the people who are first responders to natural disasters like Hurricane Katrina but it’s so much more than disaster relief. The course covers the psychology and organizational factors that go into handling extraordinary circumstances.

8) SaleForce Trailheads

Cost: Free

Link To Course

Description: The TrailHeads program will teach you how to use and operate any part of SalesForce and is completely free. Lots of companies don’t understand how to operate their own salesforce so this could get you a high paying job free. There is robust and ever-expanding cottage industry based solely around administering SalesForce.

9) HubSpot Inbound Marketing Certification

Cost: Free

Link To Course

Description: HubSpot is the global leader in inbound marketing education. They also offer a suite of tools that help marketers understand the value of SEO (Search Engine Optimization), content marketing, lead generation, and much more. Getting an inbound marketing certification is especially useful for recent college graduates who plan on entering the digital marketing space.

10) Database Administrator (DBA)

Cost: $370

Link To Course

Description: The average Database Administrator makes $106k per year. Let that sink in. If one were so inclined, one could completely forego college and study for this course and come out making six figures when they’ve completed it. DBAs are in high demand. Many top tech firms like FaceBook, Google, and Amazon require even the marketing positions to have this certification.

11) SCRUM Certification

Cost: Free

Link To Course

Description: SCRUM is an agile software development process that many startups are using to manage the development process. It prioritizes tasks based on what the company’s most important goals and needs are. Similar to the PMP certification, this course is shorter and will give users a general overview of how agile development works.

12) Social Media Analytics Certification

Cost: $84 (includes membership and access to other courses)

Link To Course

Description: Just because you spend a lot of time on FaceBook and Instagram doesn’t mean you have the in-depth knowledge required to secure a social media marketing position. This course does a deep dive into the world of social media analytics where users learn how to analyze what kind of content performs the best when sharing to social media sites.

13) SAP Cloud Platform Essentials

Cost: Free

Link To Course

Description: If you’ve ever wanted to get an in-depth knowledge of how cloud computing and SAS platforms work this course is a great place to start. It offers a practical approachto understand the execution and tools required to become a cloud computing professional.

Read more @


Why Is the USDA Killing Hundreds of Kittens?

Kittens USDA InvestigationThe internet erupted yesterday following claims that the U.S. Department of Agriculture (USDA) is killing 100 kittens every year in a research program that dates back more than three decades. Now, a spokesperson for the department has come forward in defense of the program.

The calls for an investigation were sparked after Rep. Mike Bishop of Michigan sent a letter to Secretary of Agriculture Sonny Perdue on May 7 expressing concerns about the USDA Agriculture Research Service facility located in Beltsville, Maryland. According to Bishop’s letter, each year kittens are bred, fed parasite-infected raw meat for two weeks and then killed by incineration.

“I’m shocked and disturbed that for decades the USDA — the very organization charged with enforcing animal welfare laws — has been unnecessarily killing hundreds of kittens in expensive and inefficient lab experiments,” Bishop said in a statement.

The experiments were brought to Bishop’s attention by White Coat Waste Project, a watchdog group that originally obtained the documents outlining the USDA’s research. The protocol for the experiment — which was approved most recently in 2015 but dates back to 1982 — calls for the kittens to be fed Toxoplasma-infected raw meat so that their feces can be collected to harvest the parasites. At the end of the experiment, the kittens are killed.

One of the main questions Bishop posed in his letter is why the cats have to be killed rather than adopted. He wrote that the USDA protocol indicates that cats fed the infected meat do not typically become sick. And given that toxoplasmosis is treatable in cats, “why then, are the kittens being killed after two weeks rather than treated and adopted?” He also asked Perdue if the USDA has a policy or procedure to allow for the adoption of animals no longer being used for its research purposes.

For its part, the USDA said that the use of cats is “essential to the success of this critical research,” and claimed the estimate of 100 cats used in the research each year was a serious overestimation. Spokesperson Kim Kaplan claimed the cats cannot be adopted at the end of the research period because of the risks they could pose to adoptive families. “Women newly infected with Toxoplasma during pregnancy and anyone with a compromised immune system should be aware that toxoplasmosis can have severe consequences,” she wrote.

The USDA’s statement does not address all the points Bishop raised in his two-page letter, including whether the USDA is looking into alternative research methods that are more humane. The letter read: “USDA states that Toxoplasma oocysts cannot be produced in cell culture or any other animal species. Elsewhere, scientists have reported on work to develop technology to replace cat use. What efforts, if any, has the USDA engaged in to create more efficient and humane alternatives to the use of cats and other live animals for producing Toxoplasma oocysts?”

Bishop also questioned whether the current project will be renewed when it expires at the end of the month. “It appears this project uses kittens as test tubes,” the letter concluded. “Put simply, it creates life to destroy life. While I support the objective of making food safer and protecting people and animals from infectious disease, we must ensure taxpayer dollars are used effectively, efficiently, and humanely.”

Restarting your computer periodically

Restarting your computer periodically is a good idea, especially if it’s a computer that is left on much of the time.  In Windows 7, you can easily schedule an after hours reboot by following these steps:

  1. Press Start, and in the search box type “Task Scheduler.” Atop your list of choices will be the Task Scheduler. Click it.
  2. Click the Action menu and then select Create Basic task.
  3. Choose a name for the task (like AutoReboot), type it in the Name box and click Next.
  4. Select Daily (if you want a daily reboot) and click Next
  5. Type the time you want to restart the computer, set recurrence to your liking, and click Next.
  6. Select Start a program and click Next.
  7. Click Browse and navigate to %SystemRoot%\System32 (that’s going to be C:\Windows\System32 for most people).  Find the file named Shutdown (.exe) and click Open. Type /F /R in the Add arguments (optional) box and click Next.
  8. Click Finish.

Now your computer will automatically restart at the date, time, and frequency you specified.

If you’re going to have a scheduled task like this in place, make sure to develop the habit of closing documents and programs when you’re done using them, so the reboot won’t close them for you and cause you to lose unsaved work.


Cable Types and Speeds Cat 5-7

Cable Types and Speeds

Selecting the appropriate category

When selecting the appropriate category of cable to support your network, note that there are different grades within each category. A higher grade cable with the proper installation will allow for a higher margin of error, ensuring top performance today and an extra buffer to support future technology.



Properly selecting Cat5, Cat5e, Cat6, Cat6A, Cat7 or Cat7A solutions will optimally support current and future network speed requirements.


Cat5 supports speeds up to 100Mb/s (100 MHz)


Cat5e supports speeds up to a Gigabit Ethernet (1,000Mb/s) (100 MHz)


Cat6 supports speeds up to 10 Gigabit Ethernet and can be achieved with distance of 37-55 meters or less depending on the grade of the cable and quality of installation. (1,000Mb/s) (250 MHz)


Cat6A supports speeds up to 10 Gigabit Ethernet with distance up to 100 meters (10,000 Mb/s)(500 MHz)

Cat7 & Cat7A

Cat7 & Cat7A support speeds up to 10 Gigabit Ethernet with distance up to 100 meters (10,000 Mb/s)(1000 Mhz)

Examples of when you might use each type of network cable.

Cat5 – Cat5 cable is out dated. Do not install this.

Cat5e – Cat5e cable is suitable for Gigabit speeds and networks that change frequently. If the network changes frequently or is temporary in nature, Cat5e may be the optimal selection.

Cat6 – Cat6 cable is optimal for extra margin and higher performance. Cat6 cable will support gigabit ethernet, but will only support 10 Gigabit Ethernet if the total length and loss is low enough. If a project requires a 10 Gigabit Ethernet connection, Cat6A or higher is recommended.

Cat6A – Cat6A cable will support speeds up to 10 Gigabit. If a project requires a single installation solution to support the facility and is inteded to stand the test of time, Cat6A will protect the investment and serve as a reliable backbone for the company going into the future.

Cat7 & Cat7A – Cat7 cable will support 10 Gigabit Ethernet with plenty of margin to spare. Cat7 has pair-sharing capability, making it possible to use one cable to power several different devices at the same time utilizing each pair as needed. For the best and most versatile infrastructure Cat7 provides the solution.

How to Install and Run Android O.S. on Your PC the Easy Way



Google’s open source Android operating system has become one of the big hits in mobile technology. Many different types of handsets are appearing based on it, and it’s headed for non-phone platforms too. Android application development has also matured. Over the last few months, we have witnessed a tremendous growth of Android OS to the extent that it now commands over 43% market share in the mobile OS space.

While many of us are attached to our gadgets, we still rely heavily on our computers. What if you could just use the Android operating system on your computer? Fortunately, it is possible to do this. You can do this by creating a Live CD or VirtualBox.

The original plan of the Android-x86 project was to create patches for x86 support for the open source community. They later discovered that they can do more than just create patches for x86 support; they can allow Android to run on personal computers. Therefore, one of the primary goals of the Android-x86 project is to allow Android to run on your PC.

You can do this by booting from a Live CD or by using VirtualBox. In the case of a Live CD, the Android OS will run from the disk independent of Windows. If you want to run Android on your PC while your Windows OS is running in the background, we’d advise you to install it on VirtualBox. We have detailed both the processes below.

We have previously seen how to run Android apps on your PC with Bluestacks App Player, but if you want to work with the complete Android OS, this is a better approach.

Running Android on your PC using a Live CD


The first thing you need to do is download the CD image (ISO) file from the Androidx86 website (link below). This file contains the entire Android operating system. The Androidx86 website has several different versions of Android available.

Some of the downloads are available for specific tablets and laptops. If you want to run on your Android on your desktop computer, download the “generic” version. In this tutorial, we are going to use Android 2.2.


Burn Android CD


After downloading the file, you need to burn it to a blank CD or DVD. Programs such as ISO Recorder, Image Burn, and Free ISO Burner allow you to burn an ISO file to a CD. By default, Windows 7 comes with its own disc image burner. Before burning the file, you need to insert a blank CD or DVD into the disc drive. If you are using Windows 7, right-click the ISO file and select “Burn disc image.”

Now you can boot from this CD and run Android on your PC. If you cannot boot from the CD, you need to change the boot order from the BIOS settings.

Running Android on VirtualBox

It is also possible to run Android from VirtuaBox—a well-known virtualization package. All you need is the ISO file (download link below).

Run Virtual Box and click “New” to create a virtual machine. This is the virtual machine you will be creating for Android. Give the virtual machine a name (We decided to call our virtual machine Windroid).

Create a New Virtual Machine

Select “Other” from the “Operating System” and “Version” drop-down menus.

Name the OS


Select the amount of memory you want to allocate to the virtual machine. It is best to use at least 1 gigabyte of memory. Remember this was originally a smartphone operating system, so it doesn’t need a lot of memory.

Adjust Memory


Create a fixed-sized storage disk for the virtual machine. It is recommended for the virtual hard disk to be at least 2 gigabytes.


Adjust Disk Space


Now you just need to set up the virtual machine. Right-click the virtual machine you have just created and select “Start.”

Start the Virtual Machine

This will automatically run the setup wizard. In the “Select Installation Media” window, click on the “Next” button to proceed.

Virtual Machine Setup Wizard

Click on the small folder icon and a new window will open and lets you choose the Android OS ISO file.

Select Installation Media


Next, select the Android CD Image or ISO file as the media source. Now your virtual machine should be ready to go.

Select the ISO File


Screenshots of Android OS Running on VirtualBox

Android Boot Screen

Here’s the familiar Android 2.2 Home screen.

Android UI

The application icons would show when you click on the menu and select the Apps option.

Android Apps

Final Thoughts:

If you like Android, but don’t have a handset yet – you’ll surely want to try this out. The Android-x86 project is still growing, and we might see more support and compatibility for it in the future. New versions of Android are also released regularly from the Android-x86 project.








 All of our domains are also available for lease or Rent-To-Buy.  It’s simple: Name Servers and Contact Information stay in our possession until the domain is paid in full. 
 The following are common terms of domain leasing:
Lease term:
Domain leases are usually between 2 years – 10 years in length. Monthly or quarterly payments are standard.

Down payment:
Some Lessors demand that the lessee pay a non-refundable down payment at the start of the lease.

Lease Payment Amount: 
The periodic payment amount for leasing the domain.

Purchase Option:
Most domain name leases have some sort of purchase option (lease option) allowing the lessee to buy the domain name by paying the lessor a predetermined sum. Domain Leasing can include the option to purchase the domain within the lease period, at the end of the lease period, or both.

Transaction Example

Sarah wants to buy the premium domain name to start a new business. Historically earned an average of $250 a month from parking. Sarah and George (the owner of agree on a sale price of $60,000 but Sarah doesn’t have the cash to buy the domain. Sarah and George then agree to a domain lease containing the following terms:
Domain Lease Period: 3 years (36 months)
Down Payment: $0.00
Lease Payment Amount: $500
Purchase Option:$75,000

Let’s examine the benefits of domain leasing to buyers and sellers using the above example:


Domain Use:

John is able to fully use the domain to start his business. John develops the domain with a great website filled with original content. He also invests in marketing and promotion for the site. 

Easier than financing:
Because the terms of the domain name lease are created directly by the seller and buyer, John avoids the hassles and high costs of domain financing. If John had to take out a traditional domain loan he would have had to put down $24,000. It would also cost him 15%-25% annual interest. Once John has paid the total amount of the domain sale price the name servers and control account are transferred to him.  If payment is not made by the 5th of each month there is a $25 a day late fee. After 10 days the domain name servers are locked as unresolvable until payment is made, domain is paid off or a new payment plan is agreed upon. After 30 days we retake possession of the domain and put it back up on the market.

If you would like to add DNS managed by us there is a additional cost of $5.00 per month added to the lease or rent-to-buy agreement.


Option to buy is Rent-to-Buy:
John has the opportunity to buy the name at anytime for $75,000. He can exercise this option anytime within the lease period.



Easier sales:

George greatly increases his chances of a successful sale, something he has been trying to do for several years. He will potentially be able to get way above his asking price ($75,000 instead of his $60,000 asking price).

Earn high lease payments: 
While George waits for Sarah to buy the domain he collects a monthly lease payment of $500. That is 200% higher than the historical monthly earnings from parking ($250).

Increased domain value: 
During the lease period the domain’s value increases as Sarah builds a great site that gets traffic, search engine rankings, links, and PageRank. If Sarah defaults or decides not to buy the domain, George will get it back and retain all previous payments.



There are, however, security concerns from both parties regarding the domain name leasing:

Buyers are concerned about the seller disrupting the transaction (canceling it or changing the DNS settings) during the lease term.

Sellers are generally concerned with how the buyer uses the domain while they make monthly payments. The buyer can do a number of things to devalue the domain including unauthorized use of trademark or copyright material, using the domain for any illegal purpose, using the domain for SPAM, or conducting “Black-hat” SEO techniques.

Were still researching the best way to continue forward with this option, if you have any suggestions or can help then feel free to speak up here in the comments section below..  More to come soon…

RESHARE: You can help abandon animals just by sharing our posts.

RT: You can help abandon animals just by sharing our posts. We donate 30% of all our sales to help abandon animals via @MainProfiles and @yourmatrix and @anthonylomb You can help today with just a click. What are you waiting for? Join this list


Internet access today is very easy, and is becoming more popular with each passing day. As Cris Dias would say : “the internet is here to stay” . 
Exactly because of this, it becomes increasingly necessary to be very careful with the use of the internet. As in “real life”, on the internet there are a lot of malicious people who take advantage of this popularization to steal important and sensitive information and data. Here are some simple tips to help you increase your Internet safety.



It seems obvious, but it never hurts to warn. There are several free solutions available on the internet. But currently, I recommend Avast antivirus. I use this antivirus on my desktop, in my notebook and even in my smarphone.


Free antivirus typically has a very limited spyware detection function. It is a tactic that developers use to convince the user to migrate to the paid solutions they make. So I recommend using with your antivirus, the SpyBot search and Destroy program , to scan your PC for spy programs and password stealers.


“Firewall” according to Wikipedia , “is a device of a computer network that aims to apply a security policy to a certain point in the network. The firewall can be of the type packet filters, proxy of applications, etc. Firewalls are usually associated with TCP / IP networks. This security device exists in the form of software and hardware. “If you do not want to download, install, and configure a complete Firewall, (such as ZoneAlarm , for example), at least let the standard Windows firewall be enabled. It can help you avoid too much headache.


You may have the best antivirus at all, but if it is out of date, it will not do any good. Enable automatic updates for your antivirus, as well as Windows updates. Security packages are always released, which close newly discovered breaches.


Links and attachments in emails or instant messages – BEWARE of them! Particularly if the message was not requested or asks for personal information or the verification of a password.


When sending sensitive information, such as credit card details, use encrypted connections. When you finish the operation, log off, particularly if you are not using your own computer.


Do not come up with 123456, your birthday, or any other obvious passwords too. Truly secure passwords combine uppercase letters, lowercase letters, numbers, and special characters. AND FOR THE LOVE OF GOD, do not write down your password in a post-it pasted on your monitor (I know someone who did this with the bank account password – seriously!). It is preferable NOT to write down your password anywhere other than your brain.


Always try to download your programs directly from the developers website. If you do not know what the developer site is, use superdownlods, bajaki, or


In May of that year, the cartoonist Laerte lost 12 years of work when he had the computer stolen . It is therefore advisable to save your data on several different media. Pendrive, external HD, in cloud services (like Dropbox , SkyDrive or Google Drive ), DVD’s or BluRays – All is valid to ensure that you will not lose your life if your computer is stolen or damaged.

If you take these and other basic precautions now and in the future, at a minimum, you will increase your security and the secrecy of your information.