• Set Up Two-Step Verification for Microsoft 365

    Microsoft 365 users enhance the security of their accounts by setting up Multi-Factor Authentication (two-step verification or MFA). In this guide, we explain the available options within the Microsoft 365 environment and provide you with a step-by-step process to configure MFA. Follow these steps to set up Multi-Factor Authentication (MFA)…

  • Increase the PHP memory_limit

    When confronted with errors such as “Fatal Error: Allowed Memory Size” or “XXXXX Bytes Exhausted”, it is best to increase the memory limit. Follow these steps in the control panel:

  • Increase PHP apc.shm_size

    When faced with the error “Unable to allocate memory for pool” then you may want to change the apc.shm_size. Follow these steps in the control panel to change the apc.shm_size:

  • Change the PHP version and settings

    It is very easy to make changes to your PHP settings via the control panel. New versions are also always immediately available at Combell. Ideal if you want to use the latest technology directly with your website. Using the latest PHP versions on your website is a good best practice….

  • What does a 403 error mean?

    A 403 error is an HTTP status code that indicates that access to the requested resource on the server is denied. The server understands your request but refuses to authorize it. There are several reasons why a server might return a 403 error. Below, we discuss the most common causes…

  • Why aren’t my emails being delivered?

    When your emails fail to reach the recipient, it can be frustrating and problematic for both personal and professional communication. This issue can have several causes, ranging from simple configuration errors to more complex problems with your email server or the recipient’s spam filters. In this article, we explore the…

  • What do domain hijacking and cybersquatting mean?

    Domain hijacking and cybersquatting are similar but have different intentions. In domain hijacking, an existing domain is taken over to gain access to company data or to misuse the brand identity. Cybersquatting involves registering certain domain names early with the intention of reselling them later for a significant profit. In…

  • Getting started with Node.js

    Follow this guide to get started with Node.js. To do this, you must first purchase a Node.js package as an option on your web hosting. Step 1: uploading your Node.js app into git Deploying your Node.js application is done with your code retrieved from an online git repository (e.g. GitHub,…

  • Why don’t I see https anymore?

    HTTPS is the secure version of HTTP, a protocol used for transmitting data between a web browser and a website. HTTPS is crucial for protecting the integrity and confidentiality of your users’ data. If you notice that you no longer see HTTPS in your browser’s address bar, this could have…

  • Setting up server-side tagging with our sGTM server

    The classic way to set up Google Tag Manager is through client-side tracking. The tracking then goes through your visitor’s browser or your user’s phone. The data is sent from there to your various tracking tools. With server-side tracking, tracking is done on a separate server. The browser sends data…

Couldn't find a solution?

support_bottom_contact_alt

Our specialists are available 24/7 to provide you with free support. Feel free to contact Joachim and his colleagues via e-mail or by phone.

support_bottom_contact_alt
Joachim Coessens Specialist Support