Category: Security

Keeping safe

InfoSec Career Paths vs Programming Skills — The Basics

Image from https://www.2-sec.com/2017/08/day-life-2-sec-penetration-tester/ I’ve recently was asked for a numerous time?—?“Is being a great developer vital when choosing information security as a professional career?”, so I decided to write a more in-depth answer to the

How to Fix Your Connection is Not Private Error in Chrome (16 Tips)

Kinsta works with thousands of different WordPress sites on a daily basis, so when it comes to different types of errors, we’ve pretty much seen it …

The post How to Fix Your Connection is Not Private Error in Chrome (16 Tips) appeared first on Kinsta Managed WordPress Hosting.

Entering God Mode — The Kernel Space Mirroring Attack

How Alibaba are researching using the hardware features of ARM MMU to enable God Mode in Android 8 terminals Wang Yong, a.k.a. Thomas King, is a researcher from Alibaba Security’s Pandora Lab. The lab focuses

Universal Logon Framework: Another Blockchain Technology Disruption

The world as we see it today has no doubts become digitized. Nearly almost all transactions are carried out online. From booking an airplane ticket, international money transfers to ordering for foods and even booking

5 Tools to Scan a Linux Server for Malware and Rootkits

There are constant level of high attacks and port scans on Linux servers all the time, while a properly configured firewall and regular security system updates adds a extra layer to keep the system...

How to Set up Sucuri Firewall (WAF) on Your WordPress Site

Bot traffic is higher than it’s ever been. According to Distil Networks, in 2017, bad bots accounted for 21.8% of all website traffic, a 9.5% increase …

The post How to Set up Sucuri Firewall (WAF) on Your WordPress Site appeared first on Kinsta Managed WordPress Hosting.

Cryptmount – A Utility to Create Encrypted Filesystems in Linux

Cryptmount is a powerful utility which allows any user to access encrypted filesystems on-demand under GNU/Linux systems without requiring root privileges. It requires Linux 2.6 or higher. It handles both encrypted partitions as well...

How to Change FTP Port in Linux

FTP or File Transfer Protocol is one of the oldest network protocol used today as standard file transfers over computer networks. FTP protocol uses the standard port 21/TCP as command port. Although, there are...

How to Block Ping ICMP Requests to Linux Systems

Some system administrators often block ICMP messages to their servers in order to hide the Linux boxes to outside world on rough networks or to prevent some kind of IP flooding and denial of...

How to Check and Patch Meltdown CPU Vulnerability in Linux

Meltdown is a chip-level security vulnerability that breaks the most fundamental isolation between user programs and the operating system. It allows a program to access the operating system kernel’s and other programs’ private memory...

10 Best WordPress Security Plugins to Lock out the Bad Guys

Before we dive into some WordPress security plugins, let’s start with an example. Say you buy a new house. This exciting new investment requires a hefty …

The post 10 Best WordPress Security Plugins to Lock out the Bad Guys appeared first on Kinsta Managed WordPress Hosting.

How to Fix ERR_TOO_MANY_REDIRECTS on Your WordPress Site

We come across a lot of different errors here at Kinsta, and ERR_TOO_MANY_REDIRECTS (also known as a redirect loop) is one we see on a regular …

The post How to Fix ERR_TOO_MANY_REDIRECTS on Your WordPress Site appeared first on Kinsta Managed WordPress Hosting.

How to Check Integrity of File and Directory Using “AIDE” in Linux

In our mega guide to hardening and securing CentOS 7, under the section “protect system internally”, one of the useful security tools we listed for internal system protection against viruses, rootkits, malware, and detection...

What goes into protecting your credit card information on the web?

*  This post was originally posted on November 28, 2014, and has been updated for accuracy.  Purchases happen with the click of a button, a swipe of a finger, or simply, no human interaction at all. Whether it’s our monthly subscription to Netflix, the plane tickets that just went on flash sale, or the book that we purchased with Prime shipping, our request for immediacy and automation has placed our credit card information all over …