Top

What is Two-Factor authentication

Two-factor authentication is an additional security layer for your Website or business helping to rescue from the vulnerabilities of a standard password-only approach.v Nowadays, It is more dangerous to use online services to store too much data in your cloud, and your credit cards are linked to accounts with retail websites. Two-factor authentication (2FA) adds […]

Continue Reading

Howto Configure CSF with cPanel server

What Is Configserver Security And Firewall (CSF) ? CSF is commonly used firewall that provides a good level of protection with easy to manage commands. It is used for Login/Intrusion detection, SSH login notification, Excessive connection blocking, Suspicious file reporting etc. In this tutorial, we will go through the Configuration of CSF in cPanel server […]

Continue Reading

WordPress GDPR Compliance Plug-in exploited (Privilege Escalation Flaw)

On the 6th of November 2018, a popular WordPress plugin known as WP GDPR Compliance plugin, which is created to help website owners with GDPR compliance, was found to contain harmful vulnerabilities for privilege escalation that could allow for arbitrary code execution. Hackers have exploited this vulnerability to attack a number of websites. The vulnerability […]

Continue Reading

Install CSF firewall on cPanel server

Config Server Firewall (CSF) is a firewall that provides a good level of protection with easy of managing commands. From list of security plugins available, this is the widely used security tool that can protect Linux server against attacks like brute force,malware attacks, phishing etc..This is a free plugin and have well developed interface for […]

Continue Reading

Install cPanel and cPGuard to CentOS 7.x

This tutorial we installing cPanel server with cPGuard plugin. First need fresh minimal install of CentOS. Installation Requirements Minimum of 1 GB RAM (but 2 GB recommended). At least 20GB of free disk space (but 40 GB recommended). A valid cPanel license. Standard hostname (FQDN or Fully Qualified Domain Name) Perl Please note: Once you […]

Continue Reading

Uninstall CSF Firewall

Installation and Removing of CSF and LFD is even more simple. Along with installation CSF provides uninstallation script in configuration folder.You can uninstall CSF firewall by running following script from the terminal. In cPanel servers: Code: cd /etc/csf sh uninstall.sh In DirectAdmin servers: Code: cd /etc/csf sh uninstall.directadmin.sh In No-Panel Linux servers: Code: cd /etc/csf […]

Continue Reading

Malware Scanner Tools for Linux

We all know that Linux is the most powerful operating system around us, but there is a misconception that Linux does not need any antivirus programs on it. For maximum protection this is essential. More than 60% of web-servers are running on Linux servers and most of them are protected with some solutions. From my […]

Continue Reading

Rootkits

As malware go, rootkits are one of the more nasty ones. They are difficult to detect and are capable of causing more serious damage to any system they are installed in. What is a rootkit? Essentially, a rootkit is a software application designed to provide privileged access (hence the “root” in the name) to a […]

Continue Reading

wp-crawl.php

WordPress Duplicator version below <1.2.42 have Remote Code Execution (RCE) vulnerability, which allow modify wp-config.php file and inject malicious PHP code in there. Vulnerable code in this case isn’t present within the Duplicator plugin directory itself. The flaw becomes exposed when using Duplicator to migrate or restore a backed-up copy of a WordPress site. Reminder […]

Continue Reading

The 7 Popular Blacklists To Keep Away Spam Emails

IPs or domains that cause threat to your inboxes will be listed by the blacklists. If you are on a blacklist you should not keep quite you must act quickly. There are several email blacklists which tries to impress you with a long list, which might not be good tool. So, here is a list […]

Continue Reading