W

Web Developers Can Be Successful Web Hosting Resellers

By becoming a reseller, not only can web developers create websites for their clients, but they can provide their clients with Web hosting, as another studio service. All you need to become a reseller, is

W

What is Link Popularity?

The theory goes something like this: The search engine Powers That Be have decided that if other sites are linking to your site, it must be a winner; therefore, it deserves a boost in rankings

K

Keyword Density: How Much Is Too Much

Copywriting for search engines is one of the more important aspects of the SEO industry. Ensuring your content is relevant and keyword rich is an effective method to “impress” the search engines. By impress, I

H

How to Set Up Server Side Includes in Apache

Setting up server side includes — or SSIs — in Apache is quite easy, we’ll show you how. Most people set up SSIs to allow them to include text files within their Web pages, like

H

How To Install RKHunter

RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.

R

Remove T0rnkit v8

Tornkit is a rootkit which lets an intruder have unrestricted access to your dedicated server. This guide will help you remove it.

H

How To make chkrootkit e-mail you daily

Make chkrootkit e-mail you logs daily.

H

How To Install CHKROOTKIT

chkrootkit: shell script that checks system binaries for rootkit modification.

I

Install BFD (Brute Force Detection)

BFD is a modular shell script for parsing applicable logs and checking for authentication failures.

D

Disable Telnet Access

Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server.

F

Force the use of SSH protocol 2

SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol 2 should be enabled as soon as possible.

I

Install LogWatch

Logwatch is a customizable log analysis system. Logwatch parses through your system’s logs for a given period of time and creates a report analyzing areas that you specify, in as much detail as you require.

W

What is the difference between shared & dedicated hosting?

Dedicated web hosting is different from shared web hosting in that your website is the only one on the server, and thus no resources are “shared”.

W

What is a managed dedicated server

A managed dedicated server is either one you rent or one you co-locate where someone else is in charge of the well being of the server.

Browse Categories