Top

Install cPanel and cPGuard to CentOS 7.x

This tutorial we installing cPanel server with cPGuard plugin. First need fresh minimal install of CentOS. Installation Requirements Minimum of 1 GB RAM (but 2 GB recommended). At least 20GB of free disk space (but 40 GB recommended). A valid cPanel license. Standard hostname (FQDN or Fully Qualified Domain Name) Perl Please note: Once you […]

Continue Reading

Uninstall CSF Firewall

Installation and Removing of CSF and LFD is even more simple. Along with installation CSF provides uninstallation script in configuration folder.You can uninstall CSF firewall by running following script from the terminal. In cPanel servers: Code: cd /etc/csf sh uninstall.sh In DirectAdmin servers: Code: cd /etc/csf sh uninstall.directadmin.sh In No-Panel Linux servers: Code: cd /etc/csf […]

Continue Reading

Malware Scanner Tools for Linux

We all know that Linux is the most powerful operating system around us, but there is a misconception that Linux does not need any antivirus programs on it. For maximum protection this is essential. More than 60% of web-servers are running on Linux servers and most of them are protected with some solutions. From my […]

Continue Reading

Rootkits

As malware go, rootkits are one of the more nasty ones. They are difficult to detect and are capable of causing more serious damage to any system they are installed in. What is a rootkit? Essentially, a rootkit is a software application designed to provide privileged access (hence the “root” in the name) to a […]

Continue Reading

wp-crawl.php

WordPress Duplicator version below <1.2.42 have Remote Code Execution (RCE) vulnerability, which allow modify wp-config.php file and inject malicious PHP code in there. Vulnerable code in this case isn’t present within the Duplicator plugin directory itself. The flaw becomes exposed when using Duplicator to migrate or restore a backed-up copy of a WordPress site. Reminder […]

Continue Reading

The 7 Popular Blacklists To Keep Away Spam Emails

IPs or domains that cause threat to your inboxes will be listed by the blacklists. If you are on a blacklist you should not keep quite you must act quickly. There are several email blacklists which tries to impress you with a long list, which might not be good tool. So, here is a list […]

Continue Reading

Email Blacklist and how do they work?

Are you fed up with spams on your Email? Don’t worry! You can fight them using RBLs and DNSBL. RBL stands for Real-time Black-hole List and DNSBL stands for Domain Name Server Blacklist. It helps to decrease the issues of email spamming. It is effectively used all around the world to share the IP addresses […]

Continue Reading

How to Install Nginx with ModSecurity v3.0

Mod Security is an open-source web-based firewall application (or WAF) supported by different web servers: Apache, Nginx and IIS. Mod Security’s Open Source availability has resulted in it becoming one of the world’s most popular Web application firewalls and this application layer firewall is developed by Trustwave’s SpiderLabs and released under Apache License 2.0. Mod […]

Continue Reading

Modx Revolution <=2.6.4 (Remote Code Execution)

Description Last week published two critical vulnerabilities affecting MODX Revolution <=2.6.4 which include remote script execution and file/directory removal. Hackers thereby able to compromise the website or spoil or delete files or directories. In the MODX Revolution Version <= 2.6.4, filtering users have an incorrect access control capability in the parameters, which becomes the phpthumb class that causes the […]

Continue Reading

Importance of configuring firewall

A firewall is a security tool used in networks for preventing attacks from hackers, viruses, worms, malware etc. If we didn’t configure it correctly, it will not give the correct use. So configuring firewall is important. It can be either hardware or software based. It is like a physical gate in our house, it blocks […]

Continue Reading