Published on : April 12, 2019 by Nidhin George
Do we need security through obscurity? My answer would be ‘yes‘, we need security through obscurity as well. Well changing the ssh port from the default 22 to a non-default one is desired and is recommended by me. But do not simply rely on this method though for SSH security. On a publicly accessible server […]
Published on : July 25, 2016 by Shafeer P
In a Shared Hosting cPanel server, the WHM root access is required for authorized technicians and API calls (like WHMCS) only. In majority cases, the shell access or root level access is restricted only to the web hosting support or server management professionals. Being a popular web hosting control panel, cPanel is exposed to various […]
Published on : June 8, 2016 by Anitta Jose
What is HSTS? HSTS is a web security policy by which the website inform the browsers that it should never load the site using HTTP but only using HTTPS protocol. This security feature helps the secure HTTPS web servers to be protected against downgrade attacks (also known as SSL stripping attacks). SSL Stripping Now you […]
Published on : September 29, 2012 by George K.
Server security audit is a continuous process and it is important that the servers are secure from vulnerabilities and hacker. As we know, the security of a server is quite essential as long as it is active. In most cases, a mistake happens during the initial server set up will lead to a disaster at […]
Published on : April 22, 2009 by George K.
Linux server management is all about finding out solutions to various issues arising on Linux servers, I am giving an example that, some clients have come across the issue that they are getting 500 internal error on all their PHP pages. Usually, this happens in a suPHP environment. There could be few reasons why this […]