Security

Understanding the netstat command

Tags: Security

Published on : August 12, 2019 by

Understanding the netstat command

Netstat is a command-line network utility useful for network troubleshooting and performance measurement. netstat (network statistics) is available in most versions of Windows, Linux, UNIX, and other operating systems. The command provides various network related information such as current TCP/IP connections, routing tables, interface statistics, etc. It is the basic tool which helps us to […]

Continue Reading...


Configuring Firewall with UFW

Tags: Security

Published on : August 8, 2019 by

Configuring Firewall with UFW

Managing firewall using the only tables can be a daunting task and it takes time to be proficient. Many frontends for iptables have been created over the years targeting different audiences. UFW is a frontend for iptables and is particularly well-suited for host-based firewalls. UFW or Uncomplicated Firewall is developed to provide an easy-to-use interface […]

Continue Reading...


Hardware Firewalls vs Software Firewalls

Tags: Security

Published on : July 3, 2019 by

Hardware Firewalls vs Software Firewalls

Hardware Firewall Hardware firewall provides the first line of defence against common forms of attack coming from the outside world. They protect every machine on a local network and can generally be effective with little or no configuration. A technique called packet filtering is used in a typical broadband router as a hardware firewall, which examines the header of a packet to determine […]

Continue Reading...


Should you run SSH on alternate ports ?

Tags: Securityssh

Published on : April 12, 2019 by

Should you run SSH on alternate ports ?

Do we need security through obscurity? My answer would be ‘yes‘, we need security through obscurity as well. Well changing the ssh port from the default 22 to a non-default one is desired and is recommended by me. But do not simply rely on this method though for SSH security. On a publicly accessible server […]

Continue Reading...


Script to Block WHM Root Access from Unknown IPs

Tags: cPanelSecuritywebhostingWHM

Published on : July 25, 2016 by

Script to Block WHM Root Access from Unknown IPs

In a Shared Hosting cPanel server, the WHM root access is required for authorized technicians and API calls (like WHMCS) only. In majority cases, the shell access or root level access is restricted only to the web hosting support or server management professionals. Being a popular web hosting control panel, cPanel is exposed to various […]

Continue Reading...


Let's Connect

Get new updates

Categories

$0.000 items