Install CSF firewall on cPanel server

csf firewall

Config Server Firewall (CSF) is a firewall that provides a good level of protection with easy of managing commands. From list of security plugins available, this is the widely used security tool that can protect Linux server against attacks like brute force,malware attacks, phishing etc..This is a free plugin and have well developed interface for … Read more

Install cPanel and cPGuard to CentOS 7.x

cPGuard

This tutorial we installing cPanel server with cPGuard plugin. First need fresh minimal install of CentOS. Installation Requirements Minimum of 1 GB RAM (but 2 GB recommended). At least 20GB of free disk space (but 40 GB recommended). A valid cPanel license. Standard hostname (FQDN or Fully Qualified Domain Name) Perl Please note: Once you … Read more

Uninstall CSF Firewall

csf firewall

Installation and Removing of CSF and LFD is even more simple. Along with installation CSF provides uninstallation script in configuration folder.You can uninstall CSF firewall by running following script from the terminal. In cPanel servers: Code: cd /etc/csf sh uninstall.sh In DirectAdmin servers: Code: cd /etc/csf sh uninstall.directadmin.sh In No-Panel Linux servers: Code: cd /etc/csf … Read more

Malware Scanner Tools for Linux

malware scanner tools

We all know that Linux is the most powerful operating system around us, but there is a misconception that Linux does not need any antivirus programs on it. For maximum protection this is essential. More than 60% of web-servers are running on Linux servers and most of them are protected with some solutions. From my … Read more

Rootkits

rootkits

As malware go, rootkits are one of the more nasty ones. They are difficult to detect and are capable of causing more serious damage to any system they are installed in. What is a rootkit? Essentially, a rootkit is a software application designed to provide privileged access (hence the “root” in the name) to a … Read more

wp-crawl.php

Malware details

WordPress Duplicator version below <1.2.42 have Remote Code Execution (RCE) vulnerability, which allow modify wp-config.php file and inject malicious PHP code in there. Vulnerable code in this case isn’t present within the Duplicator plugin directory itself. The flaw becomes exposed when using Duplicator to migrate or restore a backed-up copy of a WordPress site. Reminder … Read more

How to Install Nginx with ModSecurity v3.0

Nginx with ModSecurity

In this article, we are discussing about ModSecurity v3.0 and will show you how to install ModSecurity v3.0 for the Nginx web server. If you are new to ModSecurity, start by reading our article: What is ModSecurity, and why do we need it? First we can look what’s new in ModSecurity 3.0 Redesigned to work … Read more

Modx Revolution <=2.6.4 (Remote Code Execution)

Security

Description Last week published two critical vulnerabilities affecting MODX Revolution <=2.6.4 which include remote script execution and file/directory removal. Hackers thereby able to compromise the website or spoil or delete files or directories. In the MODX Revolution Version <= 2.6.4, filtering users have an incorrect access control capability in the parameters, which becomes the phpthumb class that causes the … Read more