Disguising your server signature is always a good idea as you wont reveal the operating system to potential script kiddies and hackers.
Check out those basic rules to avoid spam robots to use your email for spaming !
RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.
chkrootkit: shell script that checks system binaries for rootkit modification.
BFD is a modular shell script for parsing applicable logs and checking for authentication failures.
Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server.
SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol 2 should be enabled as soon as possible.
Logwatch is a customizable log analysis system. Logwatch parses through your system’s logs for a given period of time and creates a report analyzing areas that you specify, in as much detail as you require. Logwatch is easy to use...
Disabling root login via shh is a great way to tigthen security on your dedicated server.
In this tutorial you will find out about the .htaccess file and the power it has to improve your website. Although .htaccess is only a file, it can change settings on the servers and allow you to do many different...