Category: Security

Keeping safe

WordPress Security Alert – TimThumb Image Resizing Script

In recent days a significant WordPress security threat has emerged. The root of it is the ability for unsavory types to compromise a very common image resizing script called TimThumb which is used in many WordPress themes and plugins.…
blank

Apache logs

Issues with suhosin or mod_security , then best check your Apache error logs tail -f /usr/local/apache/logs/error_log…
blank

How to check and stop if DDoS attack is going on.

Distributed denial-of-service attacks In a distributed attack, the attacking computers are often personal computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs.…
blank

cPanel Name Server Setup

It seems no matter which flavor of linux / unix you are running and which control panel software that setting up custom name servers is always a problem.…
blank

APF firewall. Daily automated email showing firewall status

Charles Sweeney writes : This is how to get your server to send you a daily email showing the status of your APF firewall. In other words, letting you know if it’s running or not!…
blank

Syctl.conf Hardening

The purpose of syctl hardening is to help prevent spoofing and dos attacks. This short guide will show what I have found to be a good configuration for the sysctl.conf…
blank

Install APF Firewall on a cPanel sever

To install APF firewall login to your server as root and follow this tutorial…
blank

Security Guide for cPanel servers

You must keep your box secure at all times, getting compromized could lead to dataloss, which means you loose clients which isnt a very good way to run your buisness.…
blank

HELP! My server is under a DDOS attack!

Ok first just take a breath, you are getting nothing done by worrying. This guide is meant to try and help mitigate the effects of an attack that is in progresss.…
blank

Server Security Considerations

>Server security is as important as network security because servers often hold a great deal of an organization’s vital information. If a server is compromised, all of its contents may become available for the cracker to steal or manipulate at will.…