Enable Two-Factor Authentication on Your Account
Because we want to make WordPress.com accounts as secure as we can, we’ve made it easier…
Because we want to make WordPress.com accounts as secure as we can, we’ve made it easier…
Why should you lockdown your WP Admin Login? Because if you don’t take action to prevent this…
If you’ve been on the internet in the past week or so, you’ve probably heard about the spate of “brute force” attacks that have been made on WordPress sites, specifically targeting accounts with the username “admin.” It has always been a…

The speed at which your site loads is becomig increasingly important. Not only does a speedy site provide a good user experience, but it’s becoming increasingly important from an SEO perspective – site speed is a factor that Google considers…

How many times have you handed over a project to a client, only to receive a…

These days WordPress lets you choose an admin username when you create a new installation, but…

In recent days a significant WordPress security threat has emerged. The root of it is the ability for unsavory types to compromise a very common image resizing script called TimThumb which is used in many WordPress themes and plugins. Through…

Issues with suhosin or mod_security , then best check your Apache error logs tail -f /usr/local/apache/logs/error_log

Distributed denial-of-service attacks In a distributed attack, the attacking computers are often personal computers with broadband…

It seems no matter which flavor of linux / unix you are running and which control…

Charles Sweeney writes : This is how to get your server to send you a daily…

The purpose of syctl hardening is to help prevent spoofing and dos attacks. This short guide…

To install APF firewall login to your server as root and follow this tutorial

You must keep your box secure at all times, getting compromized could lead to dataloss, which…

Ok first just take a breath, you are getting nothing done by worrying. This guide is…

Securing a Linux server is critical to protect your system from vulnerabilities, breaches, and malicious attacks….

This tutorial is for system admins and will run you through how to Detect and Clean…

Disguising your server signature is always a good idea as you wont reveal the operating system…

Check out those basic rules to avoid spam robots to use your email for spaming !

RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9%…

chkrootkit: shell script that checks system binaries for rootkit modification.

BFD is a modular shell script for parsing applicable logs and checking for authentication failures.

Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and…

SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step…