In the below examples we are using ETH0 as network interface, however if you are using our...Disable shell access for unknown users
Suspect there are other users in your system that have shell access to your system? Please follow...How to Block Traffic by Country in the CSF Firewall?
One of the most-requested features on cPanel servers is the ability to manage and filter traffic...How to change default SSH port?
Everyone knows 22 is the default SSH port. So it’s always good to change this default port...How to disable all Apache header information?
Follow the below steps to disable Apache header information. Edit your mail Apache configuration...How to disable ping request?
If you are looking for the steps to disable ping. Please find the steps below. Run the...How to hide your PHP version information?
Like Apache, it is not good to expose your PHP information to the public. Please follow the below...How to increase numiptent limit?
You may got the following errors ( Most probably after enabling CSF ) The VPS iptables...How to Install Anti DDOS on Server
You can secure your server just by using this 4 Lines codes: First download install package...How to install Linux Maldet Anti Sheller
This guide will walk you through installing LMD (Linux Malware Detect) on your VPS/Dedicated...How to install mod_security on Apache 2.x
What is mod_security or modsecurity? ModSecurity is an open source intrusion detection and...How to Password Protect a Directory
This tutorial will teach how to password protect a directory. Password protecting a directory...How to prevent DDoS attack with csf?
First make sure DDOS attack is not from open recursive DNS settings. To check and fix that issue...How to Prevent DDOS with CSF
You just need to configure two csf directives, thats it. The two directives are PORTFLOOD and...How to Prevent Symlink Attacks
ad Impact of Symlink - Suppose you own a small hosting company with a Linux Box, & 1337...How to secure /tmp and /var/tmp
Secure /tmp Edit /etc/fstab by typing the command nano -w /etc/fstab Paste the following...How to Secure PHP from php.ini
PHP's default configuration file, php.ini (usually found in /etc/php.ini on most Linux systems)...How to Secure WHM/cPanel
Login to WHM using root username/passwdhttp://serverip:2086 or http://serverip/whm WHM –...How To Use The IP Deny Manager
This tutorial will teach you how to use the IP Deny Manager to block access to your web site from...Installing and configuring Spamassassin on CentOS
If you run your own mail server you'll want it to run spam filtering software to reduce the...Installing Rkhunter (Rootkit Hunter) in RHEL, CentOS and Fedora
Rkhunter (Rootkit Hunter) is an open source Unix/Linux based scanner tool for Linux systems...Is my server hacked? Lets check it with rootkit hunter
RookHit Hunter is a command-line utility that will search your machine for...Prevent DDoS by using mod_evasive
“mod_evasive” is an evasive maneuvers module for Apache to provide evasive action in...Preventing DDOS aplification open resolver attack
DDOS Attack by open DNS resolver: Open dns resolver provides name resolution to any network...Scan your Linux system with Clam AntiVirus/ClamAV.Installation Guide
ClamAV is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware...Secure system using "mod_security".
Follow the below steps to install “mod_security”. ModSecurity supplies an array of...Using Hotlink Protection
Hotlink Protection prevents other web sites from directly linking to certain files (typically...what is eXploit Scanner (cxs)
eXploit Scanner (cxs) is a new tool from Configserver that performs active scanning of files as...WHM/cPanel Server Hardening And Security Basics
1. Introduction A step by step paper how to secure linux server with cPanel/WHM andApache...