Articles

 25 Most Frequently Used Linux IPTables Rules Examples

In the below examples we are using ETH0 as network interface, however if you are using our...

 Disable shell access for unknown users

Suspect there are other users in your system that have shell access to your system? Please follow...

 How to change default SSH port?

Everyone knows 22 is the default SSH port. So it’s always good to change this default port...

 How to disable all Apache header information?

Follow the below steps to disable Apache header information. Edit your mail Apache configuration...

 How to disable ping request?

If you are looking for the  steps to disable ping. Please find the steps below. Run the...

 How to hide your PHP version information?

Like Apache, it is not good to expose your PHP information to the public. Please follow the below...

 How to increase numiptent limit?

You may got the following errors ( Most probably after enabling CSF ) The VPS iptables...

 How to Install Anti DDOS on Server

You can secure your server just by using this 4 Lines codes: First download install package...

 How to install Linux Maldet Anti Sheller

This guide will walk you through installing LMD (Linux Malware Detect) on your VPS/Dedicated...

 How to install mod_security on Apache 2.x

What is mod_security or modsecurity? ModSecurity is an open source intrusion detection and...

 How to Password Protect a Directory

This tutorial will teach how to password protect a directory. Password protecting a directory...

 How to prevent DDoS attack with csf?

First make sure DDOS attack is not from open recursive DNS settings. To check and fix that issue...

 How to Prevent DDOS with CSF

You just need to configure two csf directives, thats it. The two directives are PORTFLOOD and...

 How to Prevent Symlink Attacks

ad Impact of Symlink - Suppose you own a small hosting company with a Linux Box, & 1337...

 How to secure /tmp and /var/tmp

Secure /tmp Edit /etc/fstab by typing the command nano -w /etc/fstab Paste the following...

 How to Secure PHP from php.ini

PHP's default configuration file, php.ini (usually found in /etc/php.ini on most Linux systems)...

 How to Secure WHM/cPanel

Login to WHM using root username/passwdhttp://serverip:2086 or http://serverip/whm WHM –...

 How To Use The IP Deny Manager

This tutorial will teach you how to use the IP Deny Manager to block access to your web site from...

 Installing and configuring Spamassassin on CentOS

If you run your own mail server you'll want it to run spam filtering software to reduce the...

 Installing Rkhunter (Rootkit Hunter) in RHEL, CentOS and Fedora

Rkhunter (Rootkit Hunter) is an open source Unix/Linux based scanner tool for Linux systems...

 Is my server hacked? Lets check it with rootkit hunter

RookHit Hunter is a command-line utility that will search your machine for...

 Prevent DDoS by using mod_evasive

“mod_evasive” is an evasive maneuvers module for Apache to provide evasive action in...

 Preventing DDOS aplification open resolver attack

DDOS Attack  by open DNS resolver: Open dns resolver provides name resolution to any network...

 Scan your Linux system with Clam AntiVirus/ClamAV.Installation Guide

ClamAV is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware...

 Secure system using "mod_security".

Follow the below steps to install “mod_security”. ModSecurity supplies an array of...

 Using Hotlink Protection

Hotlink Protection prevents other web sites from directly linking to certain files (typically...

 what is eXploit Scanner (cxs)

eXploit Scanner (cxs) is a new tool from Configserver that performs active scanning of files as...

 WHM/cPanel Server Hardening And Security Basics

1. Introduction A step by step paper how to secure linux server with cPanel/WHM andApache...