Removing the WordPress admin file editor
How many times have you handed over a project to a client, only to receive a…
How many times have you handed over a project to a client, only to receive a…
These days WordPress lets you choose an admin username when you create a new installation, but…
In recent days a significant WordPress security threat has emerged. The root of it is the ability for unsavory types to compromise a very common image resizing script called TimThumb which is used in many WordPress themes and plugins. Through…
Issues with suhosin or mod_security , then best check your Apache error logs tail -f /usr/local/apache/logs/error_log
Distributed denial-of-service attacks In a distributed attack, the attacking computers are often personal computers with broadband…
It seems no matter which flavor of linux / unix you are running and which control…
Charles Sweeney writes : This is how to get your server to send you a daily…
The purpose of syctl hardening is to help prevent spoofing and dos attacks. This short guide…
To install APF firewall login to your server as root and follow this tutorial
You must keep your box secure at all times, getting compromized could lead to dataloss, which…
Ok first just take a breath, you are getting nothing done by worrying. This guide is…
Securing a Linux server is critical to protect your system from vulnerabilities, breaches, and malicious attacks….
This tutorial is for system admins and will run you through how to Detect and Clean…
Disguising your server signature is always a good idea as you wont reveal the operating system…
Check out those basic rules to avoid spam robots to use your email for spaming !
RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9%…
chkrootkit: shell script that checks system binaries for rootkit modification.
BFD is a modular shell script for parsing applicable logs and checking for authentication failures.
Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and…
SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step…
Logwatch is a customizable log analysis system. Logwatch parses through your system’s logs for a given…
Disabling root login via shh is a great way to tigthen security on your dedicated server.
Today we’re pushing out the first Kali Linux release of the year with Kali Linux 2021.1….