The Importance of Clearing your Browsing History and Cookies

Connecting to any website using a previous link from your browser history can result in viewing yesterday’s news, old information or no connection to the website at all.

Ideally, you should type the URL into your browser each time, such as

Even with that, your browser tends to hold onto old information, and over time this can cause problems with logging in to or loading websites. It is always a good idea to clear out your cache, or browser history, and clear cookies on a regular basis.

When you use a browser, like Chrome, it saves some information from websites in its cache and cookies. Clearing them fixes certain problems, like loading or formatting issues on sites.

To clear your browsing history in Chrome, on Windows, macOS, or Linux, click the three dots menu > More Tools > Clear Browsing Data.
In most computer-based web browsers, you can open menus used to clear cache, cookies, and history, by pressing Ctrl-Shift-Delete (Windows) or Command-Shift-Delete (Mac).

Clearing your browsing history deletes the following: Web addresses you’ve visited are removed from the History page. Shortcuts to those pages are removed from the New Tab page. Address bar predictions for those websites are no longer shown.

Clearing out this old information a couple times each week will allow you a better, faster connection to the latest updates!

HTTP — hypertext transfer protocol. HTTP basically refers to the way that we communicate on the Internet.

HTTPS, otherwise known as hypertext transfer protocol secure, means that the information contained on a website, or information entered into a website, is secure. Most banks, credit card companies and online retail stores will use HTTPS in order to keep your account or payment information secure.

QZVX will default to this HTTPS setting automatically, so there is no need for you to have to change it on your own. You may notice the lock symbol by the URL address line.


Most hacking of information happens in the transfer process, from the moment you hit ENTER on your keyboard, to the second the information is received on the company’s server. Https encryption will keep your information safe so that it does not fall into the hands of a hacker.

We use https security protocol at QZVX for many reasons. Readers submit their email address when filling out a comment form. We do not share that email information with anyone.


We like to know which of our posts and pages are most popular or trending. Knowing this, we can continue to provide the information readers search the web for. Understanding our site and app users, provides the information we need to evaluate the performance of our promotions and content.


QZVX does not store or share reader IP information for purposes of marketing. Most information, provided by the analytics program, is superfluous to our needs and not shared with any third party.


The only purpose we would have for this information is to track SPAMBOTS. In such cases, we block certain IP addresses from reaching our site. For example, hackers who wish to SPAM our site with multiple links to sites containing malware, xxxography, and PHISHING attacks.


Scammers attempt to access our COMMENTS pages in order to to trick you into giving them your personal information. Their comments would include links to websites used for PHISHING purposes. They may try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could gain access to your email, bank, or other accounts. Scammers launch thousands of phishing attacks like these every day.

Security at QZVX blocks these incoming COMMENTS so that they don’t clutter our site with trash.


Email and IP addresses help identify SPAMMERS. Using this information, QZVX blocks SPAMBOTS.


A SPAMBOT is a computer program that helps to spread SPAM across the Internet. SPAMBOTS often scrape contact information, create fake user accounts, or operate stolen social media accounts.


Email addresses identify readers who are first-time users of our COMMENTS pages. All first-time COMMENTS are held for moderation. The administrator is notified that there is a new COMMENT. The COMMENT is read, the email address is verified for authenticity against a database of known SPAMMERS. If the email address checks out, and the COMMENT does not contain profanity, defamatory statements or links to PHISHING sites, the COMMENT is approved. The reader is then WHITELISTED. Any COMMENT submitted by the user after that is posted without moderation. Please follow our COMMENT GUIDELINES.

If you have been previously approved to submit COMMENTS, always use the same email address. A new email address will cause your COMMENT to be held for moderation.

We attempt to check comments held for moderation ASAP, but in busy times, this process could take longer.

Some COMMENTS just seem to disappear. Why? (((CLICK HERE for possible answer)))

At QZVX, we have a standing policy against trolling and wokeness. If you are offended by anything you read at QZVX, understand that we will not attempt to assuage your bruised sensibilities. Elon Musk said, wokeness is basically a humorless society that is simply rife with condemnation and hate. At its heart, wokeness is divisive, exclusionary, and hateful. It gives mean people a shield to be mean and cruel, armored in false virtue. QZVX is not your soapbox. Your priggishness toward this policy will not be tolerated. If you take offense to a remark or an opinion that differs from yours, understand that we will not tolerate your social justice messaging, lecture, or virtue signaling. Once your response crosses the line into name-calling or becomes a political argument, that response is subject to immediate deletion. Your opinion will not influence us to change our opinion. An apology for anything you deem offensive is not forthcoming. Any person found to be using a fake email address will have their comments deleted. Personal attacks are subject to deletion. These offenses can cause readers to be banned from making future comments. For those that can adhere to this policy, your comments are welcome.


Whitelisting is the practice of explicitly allowing some identified readers access to a particular privilege or service. It is the opposite of blacklisting. Once your COMMENT is approved, you are WHITELISTED.


In computing, a blacklist or a blocklist or a denylist is a basic access control mechanism that allows through all elements except those explicitly mentioned. You don’t want to be on the blacklist!



Brute Force Attack is a hacking method which utilizes trial and error techniques to break into a website, a network or a computer system.

Hackers use automated software to send a large number of requests to the target system. With each request, the software attempts to guess the information needed to gain access, like passwords or pin codes.

These tools can also disguise themselves by using different IP addresses and locations, which makes it harder for the targeted system to identify and block these suspicious activities.

A successful brute force attack can give hackers access to your website’s admin area. They can install backdoor, malware, steal user information, and delete everything on your site.

Even unsuccessful brute force attacks can wreak havoc by sending too many requests which slows down the hosting servers and even crash them.

Some basic measures that can be implemented to inhibit brute force attacks include: using a CAPTCHA program to prevent automated attacks, instating rules requiring the use of strong passwords, introducing a delay between log-in attempts, or using VPNs to establish an encrypted tunnel.

The Best Defense Against Brute Force Attacks Is a Cloud-based Defense!

Leveraging the power of our cloud-based servers helps QZVX detect malicious patterns in HTTP traffic upstream, blocking out brute force attacks before they reach our servers. Implementing network and application-layer controls and rate policies, our web hosting platform employs a multi-layered approach to web security, ensuring that QZVX stays protected, no matter where or when attackers choose to strike.


QZVX welcomes the information supplied by readers. Airchecks, personal stories, and historical data are the foundation of this website. QZVX does not offer compensation for any material given by readers. Furthermore, if you submit ideas, articles, audio, and so forth, we reserve the right to pursue derivative works. We are also under no obligation to use material submitted by readers.

FAIR USE NOTICE: This site contains copyrighted material, the use of which has not always been specifically authorized by the copyright owner. We make this material available as part of our commentary, criticism, news reporting, and research. We believe this constitutes a fair use of any such copyrighted material as provided for in section 107 of the US copyright law. In accordance with title 17 U.S.C Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.
For more information, go to:

“Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include—
(1)the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;
(2)the nature of the copyrighted work;
(3)the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and
(4)the effect of the use upon the potential market for or value of the copyrighted work.
The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors.”

If you wish to use copyrighted material from this site for purposes of your own that go beyond fair use, you must obtain permission from the copyright owner.