Category: Security

Keeping safe

Free SSL Hosting From Kinsta With Let’s Encrypt Integration

Kinsta has a Let’s Encrypt integration, which means free SSL hosting and certificates for all of your WordPress sites. The certificate renewal process is completely automated, which …

The post Free SSL Hosting From Kinsta With Let’s Encrypt Integration appeared first on Kinsta Managed WordPress Hosting.

Why Premium DNS is No Longer Optional

You’ve probably heard the term “premium DNS” thrown around before and maybe you didn’t give it a second thought. Most people know that using a premium …

The post Why Premium DNS is No Longer Optional appeared first on Kinsta Managed WordPress Hosting.

WordPress Security – 19+ Steps to Lock Down Your Site

When it comes to WordPress security, there are a lot of things you can do to lock down your site to prevent hackers and vulnerabilities from …

The post WordPress Security – 19+ Steps to Lock Down Your Site appeared first on Kinsta Managed WordPress Hosting.

How to Secure Network Services Using TCP Wrappers in Linux

In this article we will explain what TCP wrappers are and how to configure them to restrict access to network services running on a Linux server. Before we start, however, we must clarify that...

An Overview of TLS 1.3 – Faster and More Secure

It has been over eight years since the last encryption protocol update, but the final version of TLS 1.3 has now been published as of August 2018. …

The post An Overview of TLS 1.3 – Faster and More Secure appeared first on Kinsta Managed WordPress Hosting.

4 Useful Tips to Secure PhpMyAdmin Login Interface

Normally, advanced users prefer to use and manage MySQL database management system from its command prompt, on the other side, this method has proved to be a great challenge for relatively new Linux users....

How to Disable root Login Access to PhpMyAdmin

If you are planning on using phpmyadmin on a regular basis to manage your databases over the network (or worse, over the Internet!), you don’t want to use the root account. This is valid...

How to Add an Extra Layer of Security on PhpMyAdmin Login Interface

MySQL is the world’s most used open source database management system on the Linux ecosystem and at the same time Linux newbies find it difficult to manage from the MySQL prompt. PhpMyAdmin was created,...

CVE-2016-6309 – Patching NGINX for OpenSSL Security Issues

Security is of the utmost importance to us here at Kinsta. That is one reason why we recently launched two-factor authentication to secure your Kinsta accounts. …

The post CVE-2016-6309 – Patching NGINX for OpenSSL Security Issues appeared first on Kinsta Managed WordPress Hosting.

The Importance of WordPress Two-Factor Authentication

We take security very seriously here at Kinsta and that’s why we offer two-factor authentication for all of our WordPress hosting clients. Nothing could be worse than someone …

The post The Importance of WordPress Two-Factor Authentication appeared first on Kinsta Managed WordPress Hosting.

In-Depth HTTP to HTTPS Migration Guide for WordPress

As of July 24th, 2018, Google Chrome is now be marking all non-HTTPS sites as “Not Secure.” Regardless of whether they collect data or not. This is why …

The post In-Depth HTTP to HTTPS Migration Guide for WordPress appeared first on Kinsta Managed WordPress Hosting.

How to Setup HTTPS (SSL Certificates) to Secure PhpMyAdmin Login

To introduce this tip, let’s sniff the HTTP traffic between a client machine and the Debian 8 server where we have made the innocent mistake to login using the database root user’s credentials in...

How to Change and Secure Default PhpMyAdmin Login URL

By default, the login page of phpmyadmin is located at http://<ip address>/phpmyadmin. The first thing that you will want to do is changing that URL. This will not necessarily stop attackers from targeting your...

Speed up your browsing with help from your hosts file

Web pages these days are so full of advertisements, trackers, counters, hidden pixels, it’s a wonder they load at all. And who knows what information you’re revealing about your browsing… More »

Implementing Mandatory Access Control with SELinux or AppArmor in Linux

To overcome the limitations of and to increase the security mechanisms provided by standard ugo/rwx permissions and access control lists, the United States National Security Agency (NSA) devised a flexible Mandatory Access Control (MAC)...

How to Scan for Rootkits, backdoors and Exploits Using ‘Rootkit Hunter’ in Linux

Guys, if you are a regular reader of tecmint.com you will notice that this is our third article on security tools. In our previous two articles we have given you all the guidance in...

The Mega Guide to Hardening and Securing CentOS 7 – Part 2

Continuing the previous tutorial on how to secure CentOS 7, in this article we’ll discuss other security tips that will be presented on the below checklist. Requirements The Mega Guide To Harden and Secure...

The Mega Guide To Harden and Secure CentOS 7 – Part 1

This tutorial only covers general security tips for CentOS 7 which can be used to harden the system. The checklist tips are intended to be used mostly on various types of bare-metal servers or...

Connecting to Let’s Encrypt SSL sites via cURL from MAMP

This is a brief lesson in diagnostics that some may find helpful. The Scenario I develop websites on a Mac running MAMP. On my Mac I have an installation of… More »

Lynis 2.5.5 Released – Security Auditing and Scanning Tool for Linux Systems

Lynis is an open source and much powerful auditing tool for Unix/Linux like operating systems. It scans system for security information, general system information, installed and available software information, configuration mistakes, security issues, user...