Category: Security

Keeping safe

How to Lock User Accounts After Failed Login Attempts

This guide will show how to lock a system user’s account after a specifiable number of failed login attempts in CentOS, RHEL and Fedora distributions. Here, the focus is to enforce simple server security...

How to Enable or Disable SELinux Boolean Values

Security-Enhanced Linux (SELinux) is a security mechanism for mandatory access control (MAC) implemented in the Linux kernel. It is a flexible operation designed to boost overall system security: it enables access controls imposed using...

H

How To Protect Hard and Symbolic Links in CentOS/RHEL 7

In Linux, hard and soft links are referenced to files, which are very important, if not protected very well, any vulnerabilities in them can be exploited by malicious system users or attackers. A common...

TMOUT – Auto Logout Linux Shell When There Isn’t Any Activity

How often do you leave a Linux system idle after login; a situation which can be referred to as an ‘idle session’, where you are not attending to the system by running commands or...

How to Protect Images On Your Site (+ What To Do After Theft)

Unfortunately, as the internet grows, image theft becomes more and more common. As a content creator ourselves, we have to deal a lot with this reoccurring …

The post How to Protect Images On Your Site (+ What To Do After Theft) appeared first on Kinsta Managed WordPress Hosting.

How to Stop a DDoS Attack in Its Tracks (Case Study)

In our last case study, we showed you how we cleaned up a negative SEO attack on Kinsta. Today we are going to show you some …

The post How to Stop a DDoS Attack in Its Tracks (Case Study) appeared first on Kinsta Managed WordPress Hosting.

WordPress 4.7.4 and the ‘noopener noreferrer’ attribute

Some of you may have noticed that after you upgrade to WordPress 4.7.4, when you edit a post using the visual editor tab and add an internal link (a link… More »

Email Authentication – Don’t Let Your Emails End Up in Spam

The dreaded spam folder. One thing all businesses try to avoid when it comes to sending out emails. Winding up in the spam folder can drastically …

The post Email Authentication – Don’t Let Your Emails End Up in Spam appeared first on Kinsta Managed WordPress Hosting.

How to Safely Enable WordPress SVG Support (2 Simple Clicks)

SVG is an XML-based vector image which is commonly used by websites and brands to display logos and icons on their websites. The main reason they are …

The post How to Safely Enable WordPress SVG Support (2 Simple Clicks) appeared first on Kinsta Managed WordPress Hosting.

Free SSL Hosting From Kinsta With Let’s Encrypt Integration

Kinsta has a Let’s Encrypt integration, which means free SSL hosting and certificates for all of your WordPress sites. The certificate renewal process is completely automated, which …

The post Free SSL Hosting From Kinsta With Let’s Encrypt Integration appeared first on Kinsta Managed WordPress Hosting.

Why Premium DNS is No Longer Optional

You’ve probably heard the term “premium DNS” thrown around before and maybe you didn’t give it a second thought. Most people know that using a premium …

The post Why Premium DNS is No Longer Optional appeared first on Kinsta Managed WordPress Hosting.

WordPress Security – 19+ Steps to Lock Down Your Site

When it comes to WordPress security, there are a lot of things you can do to lock down your site to prevent hackers and vulnerabilities from …

The post WordPress Security – 19+ Steps to Lock Down Your Site appeared first on Kinsta Managed WordPress Hosting.

How to Secure Network Services Using TCP Wrappers in Linux

In this article we will explain what TCP wrappers are and how to configure them to restrict access to network services running on a Linux server. Before we start, however, we must clarify that...

An Overview of TLS 1.3 – Faster and More Secure

It has been over eight years since the last encryption protocol update, but the final version of TLS 1.3 has now been published as of August 2018. …

The post An Overview of TLS 1.3 – Faster and More Secure appeared first on Kinsta Managed WordPress Hosting.

4 Useful Tips to Secure PhpMyAdmin Login Interface

Normally, advanced users prefer to use and manage MySQL database management system from its command prompt, on the other side, this method has proved to be a great challenge for relatively new Linux users....

How to Disable root Login Access to PhpMyAdmin

If you are planning on using phpmyadmin on a regular basis to manage your databases over the network (or worse, over the Internet!), you don’t want to use the root account. This is valid...

How to Add an Extra Layer of Security on PhpMyAdmin Login Interface

MySQL is the world’s most used open source database management system on the Linux ecosystem and at the same time Linux newbies find it difficult to manage from the MySQL prompt. PhpMyAdmin was created,...

CVE-2016-6309 – Patching NGINX for OpenSSL Security Issues

Security is of the utmost importance to us here at Kinsta. That is one reason why we recently launched two-factor authentication to secure your Kinsta accounts. …

The post CVE-2016-6309 – Patching NGINX for OpenSSL Security Issues appeared first on Kinsta Managed WordPress Hosting.

The Importance of WordPress Two-Factor Authentication

We take security very seriously here at Kinsta and that’s why we offer two-factor authentication for all of our WordPress hosting clients. Nothing could be worse than someone …

The post The Importance of WordPress Two-Factor Authentication appeared first on Kinsta Managed WordPress Hosting.

In-Depth HTTP to HTTPS Migration Guide for WordPress

As of July 24th, 2018, Google Chrome is now be marking all non-HTTPS sites as “Not Secure.” Regardless of whether they collect data or not. This is why …

The post In-Depth HTTP to HTTPS Migration Guide for WordPress appeared first on Kinsta Managed WordPress Hosting.