Category: Security

Keeping safe

Install APF Firewall on a cPanel sever

To install APF firewall login to your server as root and follow this tutorial More Stuff Brace Yourselves, NGINX is Coming Arguably, one of the most requested and popular feature requests submitted for cPanel & WHM has been the addition of the...

/ March 24, 2006

Security Guide for cPanel servers

You must keep your box secure at all times, getting compromized could lead to dataloss, which means you loose clients which isnt a very good way to run your buisness. You dont have to be an expert, there are just...

/ March 24, 2006

HELP! My server is under a DDOS attack!

Ok first just take a breath, you are getting nothing done by worrying. This guide is meant to try and help mitigate the effects of an attack that is in progresss. I have compiled a lot of the things that...

/ February 3, 2006

PHP optimization How-To: Installing Eaccelerator

Eaccelerator is a PHP accelerator/encoder/caching utility that is based off of the old mmcache (which is no longer being maintained). What Eaccelerator does is: it caches your PHP scripts so that the database is no longer being queried everytime someone...

/ January 1, 2006

Server Security Considerations

>Server security is as important as network security because servers often hold a great deal of an organization’s vital information. If a server is compromised, all of its contents may become available for the cracker to steal or manipulate at...

/ March 19, 2005

Detect and Clean a hacked cPanel server with this T0rnkit Tutorial

This tutorial is for system admins and will run you through how to Detect and Clean a hacked cPanel server with T0rnkit More Stuff Building a Secure Data Center that You Can Carry in a Backpack wit... Mobile data centers...

/ December 21, 2004

How to change your server signature

Disguising your server signature is always a good idea as you wont reveal the operating system to potential script kiddies and hackers. More Stuff Brace Yourselves, NGINX is Coming Arguably, one of the most requested and popular feature requests submitted for cPanel...

/ December 9, 2004

HERE ARE SIX SIMPLE THINGS YOU CAN DO TO HELP KEEP SPAM AT BAY

Check out those basic rules to avoid spam robots to use your email for spaming ! More Stuff Boston Dynamics debuts the production version of SpotMini Last year at our TC Sessions: Robotics conference, Boston Dynamics announced that SpotMini will...

/ September 6, 2004

How To Install RKHunter

RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results. More Stuff Brace Yourselves, NGINX is Coming...

/ August 18, 2004

How To Install CHKROOTKIT

chkrootkit: shell script that checks system binaries for rootkit modification. More Stuff Boston Dynamics debuts the production version of SpotMini Last year at our TC Sessions: Robotics conference, Boston Dynamics announced that SpotMini will be its first commercially available product....

/ August 18, 2004

Install BFD (Brute Force Detection)

BFD is a modular shell script for parsing applicable logs and checking for authentication failures. More Stuff Boston Dynamics debuts the production version of SpotMini Last year at our TC Sessions: Robotics conference, Boston Dynamics announced that SpotMini will be...

/ August 17, 2004

Disable Telnet Access

Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server. More Stuff Boston Dynamics debuts the production version...

/ August 17, 2004

Force the use of SSH protocol 2

SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol 2 should be enabled as soon as possible. More Stuff Boston Dynamics debuts the production version of SpotMini Last year...

/ August 17, 2004

Install LogWatch

Logwatch is a customizable log analysis system. Logwatch parses through your system’s logs for a given period of time and creates a report analyzing areas that you specify, in as much detail as you require. Logwatch is easy to use...

/ July 23, 2004