3Get our response in 2 hours or less.

You can also email us at info @ intelliplans .com // Need Remote Support? Windows or Mac


Sales: (850) 320-8171
24/7 Phone Support: (850) 320-8171 | (480) 624-2500
Customer Service | Contact Form | Email


  • Level 3 Systems Administrator with over 15 years of experience managing server infrastructures and data-center operations across multiple platforms (Unix, Linux, Windows)
  • Effectively plan, install, configure and optimize the IT infrastructure to consistently achieve high availability and performance.
  • Proven ability to create and deliver solutions tied to business growth, organizational development and systems/network optimization.
  • Skilled problem identifier and troubleshooter comfortable managing systems, projects and teams in a range of IT environments.
  • LAN/WAN/NOC Administration
  • Project Management
  • Workflow Planning
  • Productivity Improvement
  • Systems Installation, Configuration & Upgrading
  • Security Solutions
  • Database Design &
  • Management
  • NOS Patches & Updates
  • Level 2 Technical Support, Training & Mentoring



How to Choose a Website Vendor

Not all Web design companies are created equal. Even a company with a great reputation may not be the best fit for your particular project. Here are a few questions and tips to help you evaluate your options and choose the right vendor for the job:

  • Is the vendor asking questions about your business and your goals? In order to create a custom website for your business, the vendor must first learn what you do and what you hope to accomplish. Your website should be designed specifically with your goals in mind.
  • What exactly is included in the price quote? Some vendors might include website and CMS maintenance in their quotes, or adding copy to the pages; others might charge an additional hourly rate or monthly fee for the same work. Make sure you’re aware of every service that will be—or, more important, will not be—included in the total price.
Continue reading
Rate this blog entry:
1943 Hits
1 Comment

What Are the Various Types of Websites

What Are the Various Types of Websites

Most websites today are built using a Content Management System, or CMS. The CMS is the architecture of a website that determines how you add and modify content, and attach applications to a website. Most content management systems allow Web-based content publishing, content formatting, collaborative revisions, editing, and an internal search engine.

A good CMS allows you to add, edit, and update content without knowledge of HTML or some other programming language. Most employ a simple user interface or “dashboard,” which looks like a word processing program (e.g., Microsoft Word).

The level of CMS you use to build your website will largely determine how customized the site is and how much it will cost. You should have a clear idea of your budget before you begin this process to help narrow your focus and avoid evaluating options out of your price range. The cost of building or even the website maintenance can range from just a few dollars per month with a DIY (“Do-It-Yourself”) website, to tens of thousands of dollars with a custom CMS built just for your business.

Continue reading
Rate this blog entry:
102240 Hits
1 Comment

How the Syrian Electronic Army and other hacker groups are attacking news Web sites

How the Syrian Electronic Army and other hacker groups are attacking news Web sites

By Hayley Tsukayama and Timothy B. Lee, Published: August 28 E-mail the writers

The hack of the New York Times’ Web operations this week has drawn renewed attention to a cyberattack that takes aim at a core function of the Internet: the Web address.

The attack, for which a group called the Syrian Electronic Army asserted responsibility, worked by kidnapping the news organization’s Web address — www.
nytimes.com — and redirecting anyone who tried to go to that site to another part of the Internet.

The intrusion, known as a Domain Name System attack, proved highly effective, limiting access to the Times’ news pages on the Internet for nearly 48 hours. Wednesday night, some readers still could not access the site.

Continue reading
Rate this blog entry:
39585 Hits
1 Comment

Joomla security threat

Joomla security threat

One can never underestimate the importance of upkeep and routine maintenance, especially when it comes to web sites and applications. When we do not practice due diligence or neglect our web applications, hackers can find holes, weaknesses, and exploits in our so-called “secure” sites.

That holds even more true when it comes to “canned” applications such as Joomla. We have learned that Joomla version 2.5, and 3.1.x have a security hole that can allow anyone to upload malicious files through your application.

The malicious files can perform cross-site scripting (injecting a string of code to your web pages, which can redirect users to a phishing site), or distribute malware or Trojan files that can affect your visitor’s computers.

The security hole in Joomla is its Media Manager, which offers you a tool to upload files to the website. This is a necessary function in a CMS such as Joomla. Joomla comes with its own filtering mechanism that prevents anyone uploading files with specific extensions that can be malicious in nature. Files with extensions such as .exe or .php should not be uploaded as they can infect your web application.

Continue reading
Rate this blog entry:
2125 Hits

Protection against a critical Joomla file upload security bug

Protection against a critical Joomla file upload security bug

There’s been a lot of discussion recently about a critical Joomla security bug that allows “hackers” to upload malicious PHP script files to Joomla sites, then run them. This would allow hackers to use your site to send spam, or to replace any file on your Web site.

Although our customers running Joomla should always upgrade to the latest versions when available, we’ve also put rules in place to protect against this vulnerability.

Exploit Details

The way this exploit works is that although Joomla prevents evildoers from uploading files with names like evil.php, it doesn’t prevent them from uploading files with an extra dot on the end of the name, such as evil.php..

Continue reading
Rate this blog entry:
741626 Hits