Category: Security

Keeping safe

A

APF firewall. Daily automated email showing firewall status

Charles Sweeney writes : This is how to get your server to send you a daily email showing the status of your APF firewall. In other words, letting you know if it’s running or not!

S

Syctl.conf Hardening

The purpose of syctl hardening is to help prevent spoofing and dos attacks. This short guide will show what I have found to be a good configuration for the sysctl.conf configuration file. The most important

I

Install APF Firewall on a cPanel sever

To install APF firewall login to your server as root and follow this tutorial

S

Security Guide for cPanel servers

You must keep your box secure at all times, getting compromized could lead to dataloss, which means you loose clients which isnt a very good way to run your buisness. You dont have to be

D

Dealing With Distributed Denial of Service Attacks

Distributed denial of service attacks are frustrating — they’re frustrating for the company under attack, and frustrating for the web host. They can also be costly in terms of business and goodwill lost. Fortunately, there

H

HELP! My server is under a DDOS attack!

Ok first just take a breath, you are getting nothing done by worrying. This guide is meant to try and help mitigate the effects of an attack that is in progresss. I have compiled a

P

PHP optimization How-To: Installing Eaccelerator

Eaccelerator is a PHP accelerator/encoder/caching utility that is based off of the old mmcache (which is no longer being maintained). What Eaccelerator does is: it caches your PHP scripts so that the database is no

S

Server Security Considerations

>Server security is as important as network security because servers often hold a great deal of an organization’s vital information. If a server is compromised, all of its contents may become available for the cracker

D

Detect and Clean a hacked cPanel server with this T0rnkit Tutorial

This tutorial is for system admins and will run you through how to Detect and Clean a hacked cPanel server with T0rnkit

H

How to change your server signature

Disguising your server signature is always a good idea as you wont reveal the operating system to potential script kiddies and hackers.

H

HERE ARE SIX SIMPLE THINGS YOU CAN DO TO HELP KEEP SPAM AT BAY

Check out those basic rules to avoid spam robots to use your email for spaming !

H

How To Install RKHunter

RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.

H

How To Install CHKROOTKIT

chkrootkit: shell script that checks system binaries for rootkit modification.

I

Install BFD (Brute Force Detection)

BFD is a modular shell script for parsing applicable logs and checking for authentication failures.

D

Disable Telnet Access

Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server.

F

Force the use of SSH protocol 2

SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol 2 should be enabled as soon as possible.

I

Install LogWatch

Logwatch is a customizable log analysis system. Logwatch parses through your system’s logs for a given period of time and creates a report analyzing areas that you specify, in as much detail as you require.

D

Disabling Direct Root Login (SSH)

Disabling root login via shh is a great way to tigthen security on your dedicated server.

.

.htaccess Tutorial

In this tutorial you will find out about the .htaccess file and the power it has to improve your website. Although .htaccess is only a file, it can change settings on the servers and allow

C

CHMOD Commands

Chmod command sets UNIX file permissions. You can set the permissions with the help of your FTP client.