Joomla 3.0

Joomla 3.0 Tutorials. Find our animated Joomla 3.0 tutorials in this section.

There are no articles in this category. If subcategories display on this page, they may contain articles.

Subcategories

XYZulu Hosting Blog

  • No doubt you have heard of and are probably well acquainted with Gmail. It’s an email interface most of us have used. You may be less familiar with Google’s “other” email offer: Inbox What makes it better than Gmail? It’s much faster at reading/processing emails than Gmail, especially when it comes to newsletters. Inbox provides … Continue reading "3 Reasons why you should use Google Inbox instead of Gmail"

  • Opera Browser (free) now includes a free VPN. Apart from the security benefits, this can also be handy when it comes to testing your own website from another location, especially when doing web development. Read more about the VPN security features in this post discussing the release of Opera Browser 40: www.opera.com/blogs/desktop/2016/09/free-vpn-in-opera-browser-40/ How does this … Continue reading "Opera – a free VPN Browser"

  • When people receive an email from you, do you want to them to see this image in place of your avatar/profile picture? Do you want people to think your business hasn’t setup email correctly? Currently, if you are sending emails and not providing SPF or DKIM records in your DNS zone, Gmail/Google users will now see the … Continue reading "Is your email authenticated? If it’s not, will recipient’s trust you?"

  • We all use email, and probably these days simply take it for granted. Are there some things to be aware of when choosing how to setup your email? Yes! Let’s explain. Email is like a mobile phone number, it’s not something you want to change often (if at all) and it’s also something you want … Continue reading "Email essentials"

  • Almost every week a new item hits the news about compromised computer systems and stolen passwords. Do you know that passwords are actually sold on the black market for real money? Why? Because compromised passwords can, and are, being used to steal real money from internet users. compromised passwords are being used to steal real … Continue reading "Has your password been stolen?"