Category: Security

Keeping safe

H

HELP! My server is under a DDOS attack!

Ok first just take a breath, you are getting nothing done by worrying. This guide is meant to try and help mitigate the effects of an attack that is in progresss. I have compiled a

P

PHP optimization How-To: Installing Eaccelerator

Eaccelerator is a PHP accelerator/encoder/caching utility that is based off of the old mmcache (which is no longer being maintained). What Eaccelerator does is: it caches your PHP scripts so that the database is no

S

Server Security Considerations

>Server security is as important as network security because servers often hold a great deal of an organization’s vital information. If a server is compromised, all of its contents may become available for the cracker

Detect and Clean a hacked cPanel server with this T0rnkit Tutorial

This tutorial is for system admins and will run you through how to Detect and Clean a hacked cPanel server with T0rnkit

H

How to change your server signature

Disguising your server signature is always a good idea as you wont reveal the operating system to potential script kiddies and hackers.

H

HERE ARE SIX SIMPLE THINGS YOU CAN DO TO HELP KEEP SPAM AT BAY

Check out those basic rules to avoid spam robots to use your email for spaming !

H

How To Install RKHunter

RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.

H

How To Install CHKROOTKIT

chkrootkit: shell script that checks system binaries for rootkit modification.

I

Install BFD (Brute Force Detection)

BFD is a modular shell script for parsing applicable logs and checking for authentication failures.

D

Disable Telnet Access

Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server.

F

Force the use of SSH protocol 2

SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol 2 should be enabled as soon as possible.

I

Install LogWatch

Logwatch is a customizable log analysis system. Logwatch parses through your system’s logs for a given period of time and creates a report analyzing areas that you specify, in as much detail as you require.

D

Disabling Direct Root Login (SSH)

Disabling root login via shh is a great way to tigthen security on your dedicated server.

.

.htaccess Tutorial

In this tutorial you will find out about the .htaccess file and the power it has to improve your website. Although .htaccess is only a file, it can change settings on the servers and allow