All posts by Web Monkey

L

Linux Web Hosting FAQ

Our Frequently Asked Questions on Linux gives you insight on what you can expect when choosing a Unix or Linux platform to host your site. Also included is a comparison of Unix vs. Windows Web

D

Detect and Clean a hacked cPanel server with this T0rnkit Tutorial

This tutorial is for system admins and will run you through how to Detect and Clean a hacked cPanel server with T0rnkit

F

FTP Tutorial : Overview

FTP is a commonly known and used acronym for the words ‘File Transfer Protocol’. FTP has become an imperative part of the World Wide Web (for both surfers downloading files and webmasters building websites) due

P

PEAR Primer

PEAR stands for ‘PHP Extension and Application Repository’ and has been slowly building itself over the last few years. There are classes for logging, compression, XML, and on and on. The most popular one is

H

How to change your server signature

Disguising your server signature is always a good idea as you wont reveal the operating system to potential script kiddies and hackers.

G

Google Results Vs Yahoo Results

According to a Nielsen//Netratings study, Google holds the top spot for search engine destinations. However, if you take a closer look at N//N’s findings, you see that Yahoo and MSN share the second and third

P

PHP/MySQL Tutorial

By Graeme Merral : Open source has brought a lot more than Linux to the computing world. It has also given us PHP and MySQL. According to Graeme, PHP and MySQL are the world’s best

N

New Web Domain Names Get Preliminary Nod

Internet’s Key Oversight Board Gives Preliminary Approval to ‘.post’ and ‘.travel’

S

Shell Commands

Simple Shell commands for Informational purposes

S

Simple Shell Commands

Simple Shell commands for filesystem

T

The New MSN Search May Be a Google Killer!

The Second Look at MSN’s Search technology is available for public beta testing. I’ve given it a spin myself and must say that I’m impressed. Although they have no ads on the SERP’s of the

H

HTML Elements

HTML Tags HTML tags are used to mark-up HTML elements HTML tags are surrounded by the two characters < and > The surrounding characters are called angle brackets HTML tags normally come in pairs like

H

HERE ARE SIX SIMPLE THINGS YOU CAN DO TO HELP KEEP SPAM AT BAY

Check out those basic rules to avoid spam robots to use your email for spaming !

W

What is Link Popularity?

The theory goes something like this: The search engine Powers That Be have decided that if other sites are linking to your site, it must be a winner; therefore, it deserves a boost in rankings

K

Keyword Density: How Much Is Too Much

Copywriting for search engines is one of the more important aspects of the SEO industry. Ensuring your content is relevant and keyword rich is an effective method to “impress” the search engines. By impress, I

H

How To Install RKHunter

RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.

H

How To Install CHKROOTKIT

chkrootkit: shell script that checks system binaries for rootkit modification.

I

Install BFD (Brute Force Detection)

BFD is a modular shell script for parsing applicable logs and checking for authentication failures.

D

Disable Telnet Access

Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server.

F

Force the use of SSH protocol 2

SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol 2 should be enabled as soon as possible.