Category: Security

Keeping safe

5 Tools to Scan a Linux Server for Malware and Rootkits

There are constant level of high attacks and port scans on Linux servers all the time, while a properly configured firewall and regular security system updates adds a extra layer to keep the system safe,

How to Set up Sucuri Firewall (WAF) on Your WordPress Site

Bot traffic is higher than it’s ever been. According to Distil Networks, in 2017, bad bots accounted for 21.8% of all website traffic, a 9.5% increase over the previous year. Not only that, but 74%

6 Key Steps to Ensure GDPR Compliance – The Steps You Need to Take Right Away

Not everyone can be a GDPR compliance specialist, but that doesn’t mean you should ignore data protection and privacy; especially if you run a business. Even though much talk has been made of the May

Cryptmount – A Utility to Create Encrypted Filesystems in Linux

Cryptmount is a powerful utility which allows any user to access encrypted filesystems on-demand under GNU/Linux systems without requiring root privileges. It requires Linux 2.6 or higher. It handles both encrypted partitions as well as

How to Change FTP Port in Linux

FTP or File Transfer Protocol is one of the oldest network protocol used today as standard file transfers over computer networks. FTP protocol uses the standard port 21/TCP as command port. Although, there are a

How to Block Ping ICMP Requests to Linux Systems

Some system administrators often block ICMP messages to their servers in order to hide the Linux boxes to outside world on rough networks or to prevent some kind of IP flooding and denial of service

How to Check and Patch Meltdown CPU Vulnerability in Linux

Meltdown is a chip-level security vulnerability that breaks the most fundamental isolation between user programs and the operating system. It allows a program to access the operating system kernel’s and other programs’ private memory areas,

10 Best WordPress Security Plugins to Lock out the Bad Guys

Before we dive into some WordPress security plugins, let’s start with an example. Say you buy a new house. This exciting new investment requires a hefty down-payment you’re probably not used to spending. And, of

How to Fix ERR_TOO_MANY_REDIRECTS on Your WordPress Site

We come across a lot of different errors here at Kinsta, and ERR_TOO_MANY_REDIRECTS (also known as a redirect loop) is one we see on a regular basis. Typically this occurs after a recent change on

CPU Vulnerabilities – What Kinsta Customers Need to Know

The first week of January news started to spread about new CPU vulnerabilities that have been discovered. This affects millions of devices, not only cloud computing platforms such as Google Cloud and AWS, but even

How to Check Integrity of File and Directory Using “AIDE” in Linux

In our mega guide to hardening and securing CentOS 7, under the section “protect system internally”, one of the useful security tools we listed for internal system protection against viruses, rootkits, malware, and detection of

What goes into protecting your credit card information on the web?

*  This post was originally posted on November 28, 2014, and has been updated for accuracy.  Purchases happen with the click of a button, a swipe of a finger, or simply, no human interaction at

How to Configure Basic HTTP Authentication in Nginx

Basic HTTP authentication is a security mechanism to restrict access to your website/application or some parts of it by setting up simple username/password authentication. It can be used essentially to protect the whole HTTP server,

3 Ways to Prevent Email Abuse

*  This post was originally posted on July 12, 2016, and has been updated for accuracy.  Over 100 billion emails get sent per day. Everything from out-of-office alerts to billing summaries gets transferred across the

How to Lock User Accounts After Failed Login Attempts

This guide will show how to lock a system user’s account after a specifiable number of failed login attempts in CentOS, RHEL and Fedora distributions. Here, the focus is to enforce simple server security by

How to Enable or Disable SELinux Boolean Values

by Aaron Kili | Published: October 23, 2017 | Last Updated: October 25, 2017 Security-Enhanced Linux (SELinux) is a security mechanism for mandatory access control (MAC) implemented in the Linux kernel. It is a flexible

H

How To Protect Hard and Symbolic Links in CentOS/RHEL 7

In Linux, hard and soft links are referenced to files, which are very important, if not protected very well, any vulnerabilities in them can be exploited by malicious system users or attackers. A common vulnerability

TMOUT – Auto Logout Linux Shell When There Isn’t Any Activity

by Aaron Kili | Published: October 7, 2017 | Last Updated: October 9, 2017 How often do you leave a Linux system idle after login; a situation which can be referred to as an ‘idle

How to Protect Images On Your Site (+ What To Do After Theft)

Unfortunately, as the internet grows, image theft becomes more and more common. As a content creator ourselves, we have to deal a lot with this reoccurring issue here at Kinsta. There is nothing worse than

The Complete WordPress GDPR Guide: What Does the New Data Regulation Mean for Your Website, Business and Data?

TL;DR: The GDPR is a new regulation by the EU. It changes a lot regarding how each and every WordPress site goes about doing their business. Even non EU-based sites and businesses are affected. You