Top

Archive | September, 2018

Malware Scanner Tools for Linux

We all know that Linux is the most powerful operating system around us, but there is a misconception that Linux does not need any antivirus programs on it. For maximum protection this is essential. More than 60% of web-servers are running on Linux servers and most of them are protected with some solutions. From my […]

Continue Reading

Rootkits

As malware go, rootkits are one of the more nasty ones. They are difficult to detect and are capable of causing more serious damage to any system they are installed in. What is a rootkit? Essentially, a rootkit is a software application designed to provide privileged access (hence the “root” in the name) to a […]

Continue Reading

wp-crawl.php

WordPress Duplicator version below <1.2.42 have Remote Code Execution (RCE) vulnerability, which allow modify wp-config.php file and inject malicious PHP code in there. Vulnerable code in this case isn’t present within the Duplicator plugin directory itself. The flaw becomes exposed when using Duplicator to migrate or restore a backed-up copy of a WordPress site. Reminder […]

Continue Reading

The 7 Popular Blacklists To Keep Away Spam Emails

IPs or domains that cause threat to your inboxes will be listed by the blacklists. If you are on a blacklist you should not keep quite you must act quickly. There are several email blacklists which tries to impress you with a long list, which might not be good tool. So, here is a list […]

Continue Reading