Category: Security

Keeping safe

Website Speed Optimization: How to Do It in 2019

About a decade back, Google announced that that site speed would affect web search ranking. Although the post did not clarify the impact of speed on the rankings, webmasters reading the announcement understood that website speed optimization should be at the top of their development plans.

How to Configure and Use PAM in Linux

Linux-PAM (short for Pluggable Authentication Modules which evolved from the Unix-PAM architecture) is a powerful suite of shared libraries used to dynamically authenticate a user to applications (or services) in a Linux system. It...

Data Breaches: The Complete WIRED Guide

Another week, another massive new corporate security breach that exposes your personal data. Names, email addresses, passwords, Social Security numbers, dates of birth, credit card numbers, banking data, passport numbers, phone numbers, home addresses, driver’s

This Company Wants to Use the Blockchain to Stop Phishing

MetaCert has classified 10 billion URLs as either safe, a suspected source of phishes, or unknown.

How to Access a Remote Server Using a Jump Host

A jump host (also known as a jump server) is an intermediary host or an SSH gateway to a remote network, through which a connection can be made to another host in a dissimilar...

How to Install, Configure and Use Firewalld in CentOS and Ubuntu

Firewalld (firewall daemon) is an alternative to the iptables service, for dynamically managing a system’s firewall with support for network (or firewall) zones and provides a D-Bus interface for managing configurations. It’s easy to...

Cracking linux full disc encryption, luks with hashcat.

Luks (linux unified key system), and dm-crypt are the standard that linux, and many others use for doing whole disk encryption. When implemented correctly, it can be nearly impossible to brute force. However when using

5 of the Best VPN Services for WordPress Users (Or Anyone Else, Too!)

In this post, we compare the 5 best VPN services for WordPress users (or really anyone else). That is, while we’ll focus on how VPNs can help WordPress users, most of the things that make a VPN good for WordPress users make it good for regular folks, too.

What is 2-Factor Authentication and Why You Should Care

In the digital world that we live in, our virtual identity has become as important as the real one. We are becoming more and more aware of our virtual presence, social activity and how we

WordPress Activity Log – 7 Things You Should Be Tracking

When your WordPress website is small, it’s easy to keep tabs on everything that happens within it. However, as it grows in size and complexity it …

The post WordPress Activity Log – 7 Things You Should Be Tracking appeared first on Kinsta Managed WordPress Hosting.

54% of Cryptocurrency Exchanges Have Security Holes

Exchange security report by ICORating.com Over the years, digital thieves have stolen millions of dollars’ worth of cryptocurrency from various exchanges. The crypto market attracts a huge number of investors and everyone hopes to get

How to Use Fail2ban to Secure Your Linux Server

Improving your server security should be one of your top priorities, when it comes to managing a linux server. By reviewing your server logs, you may often find different attempts for brute force login,...

Tomb – A File Encryption and Personal Backup Tool for Linux

Tomb is a free open source, small, powerful and simple tool for encrypting files on GNU/Linux. At the time of this writing, it comprises of a shell script (zsh) using generic filesystem GNU tools...

Magecart 2.0: Architecture of a What-If

This case study was developed by Jscrambler’s Research team. During the past few weeks, we’ve been seeing an alarming number of attacks targeting several eCommerce and ticketing companies, stealing their clients’ credit card data. Behind these

Redirecting all variants of your domain to https Version

Assuming that I have a domain example.com I would like to redirect all the variations of this domain to the https version. There can be six variationsexample.com, www.example.com, http://example.com, http://www.example.com, https://example.com, https://www.example.com. I want to

Are Dating Apps Killing Romance?

Swipe, swipe, swipe, swipe… This sums up dating apps today. Endless swiping leading to a few matches, then less matches you decide to have a meaningful conversation with and eventually one or two people you

Managing Multi-User Access In Your Hosting Account

If you operate a business or manage large projects you know how important a multi-user environment can be. In this post I’d like to give some …

The post Managing Multi-User Access In Your Hosting Account appeared first on Kinsta Managed WordPress Hosting.

WPScan – A Black Box WordPress Vulnerability Scanner

WordPress is all over the web; it’s the most popular and most used content management system (CMS) out there. Is your website or blog is powered by WordPress? Did you know that malicious hackers are

Install and Configure ConfigServer Security & Firewall (CSF) in Linux

If you look at IT-related job postings anywhere, you will notice a steady demand for security pros. This does not only mean that cybersecurity is an interesting field of study, but also a very...