RSS Feed
Knowledgebase : Security
While not a security measure, changing the port that sshd listens on can provide a few benefits. For one, it requires more effort for someone to locate the port that sshd listens on. Secondly, it prevents the server from being overwhelmed by brute force a...
ACCOUNT LEVEL SECURITY:- * Always use strong passwords for your account cpanel, databases and FTP accounts as well. * Use authentic Client to connect with your server in order to upload your files and give limited directories access to each FTP u...
HTTP redirects seem to be pretty troublesome: specifically, the default cPanel/Comodo provider will fail if it finds a redirect. To address this, we're implementing logic in 60 to insert mod_redirect exclusions into a virtual host's .htaccess file when ne...
EMAILS SECURITY:- Follow the following steps to secure your emails. 1. SECURE YOUR OPERATING SYSTEM Your operating system (e.g., Windows, OS X, or Ubuntu) plays a central role in managing the security of your computer. Keep it safe by: * Installin...
There are a number of steps which you can take to keep your site secure. These vary from software to software but the most important are listed below; 1. All files should be setup with permissions (chmod) set to 644 2. All folders should be setup with per...
The account backup package system (pkgacct) is designed to transfer an account between machines inside your ecosystem. This system's primary goal is to prefer replication integrity in order to simplify the process of migrating your accounts between your s...
There are various ways in which access can be restricted to sshd. By restricting which users and hosts/networks that can log in, the impact of stolen credentials may be minimized. You can restrict which hosts/networks can access sshd via proper firewalli...
SUMMARY: * deny all, permit by exception (iptables or tcpwrappers, AllowUsers) * never log into sshd as root (PermitRootLogin no) * use strongly passworded ssh keys instead of password auth (PasswordAuthentication no) * remove temporary accounts...
WEBSITE LEVEL SECURITY:- Follow the following steps to secure your website. 1. SECURE YOUR OPERATING SYSTEM Your operating system (e.g., Windows, OS X, or Ubuntu) plays a central role in managing the security of your computer. Keep it safe by: * I...