Articles

Configure APF Firewall on your VPS What is APF?Advanced Policy Firewall (APF) is an iptables(netfilter) based firewall system... How to Install Logwatch on CentOS 7 Logwatch is a Perl-based log management tool for analyzing, summarizing, and reporting on a... How to Optimize and Secure a Virtual Private Server (VPS) and Virtual Dedicated Server (VDS) This article covers a wide range of methods for securing and optimizing your VPS/VDS. We do not... How to Protect WHMCS? Move the attachments, downloads & templates_c folders The three folders "attachments",... How to handle the Google Attack Page? When you see the dreaded Google attack site warning, you should immediately email : admin [@]... How to install BFD (Brute Force Detection) What is BFD (Brute Force Detection)?BFD is a modular shell script for parsing applicable logs... How to submit a DMCA complaint? Reporting copyright infringement? You must follow these steps before submitting any... HowTo: Use Nginx As Reverse Proxy Server Nginx is an open source Web server and a reverse proxy server. You can use nginx for a load... Install Git cd /usr/src/wget http://git-core.googlecode.com/files/git-1.7.9.4.tar.gztar xvf... Install eAccelerator in directadmin wget http://garr.dl.sourceforge.net/project/eaccelerator/eaccelerator/eAccelerator%200.9.6.1... Installing Rootkit Hunter (RKHunter) wget https://excellmedia.dl.sourceforge.net/project/rkhunter/rkhunter/1.4.6/rkhunter-1.4.6.tar.gz... Maldetect installation Maldetect installation cd... My Joomla has been hacked! A Joomla is usually compromised when it or its components / modules are outdated. Another very... My account was hacked! If you are the victim of a hacker, immediately email [email protected] and our experts will... SQL injection, insertion! SQL injection is an attack where malicious code is passed to an SQL Server for execution. The... What happens to someone abusing system resources? The offending site will be suspended and the owner will be given an opportunity to fix the...
« Back