Entries by Hemn Chawroka

How to use SMTP Server to Send WordPress Emails

Are you having trouble receiving or sending emails from your WordPress site? One solution for that is to use third party email services such as Mandrill. However, these services will cost you extra money. In this article, we will show you how to use a SMTP server to send WordPress emails. The Problem with WordPress […]

WordPress Easy SMTP

Easy WP SMTP is a user-friendly SMTP plugin for WordPress. It allows you to send emails from your WordPress Site via one of your preferred SMTP server. This will improve the email deliver-ability from your server. The plugin also adds an “Settings > WP Easy SMTP” page which allows you to configure the settings from […]

iPhone 7 & 7 Plus: Early free mockups

As many of you know, “September 9, 2016” Apple unveiled the iPhone 7 and iPhone 7 Plus at its See You on the 7th media event in San Francisco. The smartphones have a stainless steel Apple logo and come in a new glossy jet black colour, as well as simple “black” (with a black Apple…

Best Personal Blog Templates for Designers

If you are looking to create your own blog or a website and don’t know where to start from then you are at right place, we have put together a list of personal blog templates. 1. Live Live is an easy and intuitive modern blogging template. Live features make it dynamic, user-engaging and vivid. It’s […]

15 New Frameworks for Your Next Projects

A web framework is an essential tool for web development, framework consists files, packages and tools that helps developers to build innovative and useful web applications easily. By making use of frameworks, developers can develop a maintainable, well structured, and upgradable websites in less time. For this article we have chosen Fresh Frameworks for developers, […]

.htaccess rules to Harden your website’s Security

Below you see a list of the important rules that you can add to your .htaccess file to harden security, by greatly limiting the exposure of your website to many types of attacks. Some of these rules include basic redirects, locking outside access to particular files, or more advanced functions such as preventing image hotlinking. […]