Security

How To Change the SNMP Port on CentOS

SNMP 101: The Basics I. How To Install and Configure SNMP on CentOS II. How To Change the SNMP...

Th8 12 · 1 min read >

Malware – How to Detect and Remove

Maldet, a free popular malware scanning software for Linux servers, can be used to scan an entire server for...

Th8 12 · 2 min read >

What is DNSSEC?

Domain Name System Security Extensions or DNSSEC signs DNS Record Sets (RRsets) at each DNS zone level. This allows...

Th8 12 · 1 min read >

Best Practices for Firewall Rules

Basic Firewall Rules In a firewall rule, the action component decides if it will permit or block traffic. It...

Th8 12 · 3 min read >

What is a DDoS?

What is a DDoS, Really? With all the talk about cyber attacks, cyber terrorists general security across the internet,...

Th8 12 · 2 min read >

Addressing WordPress 4.9.4 Update and Vulnerabilities

If you run WordPress sites you likely know it is critical to make sure that your software is up...

Th8 12 · 1 min read >

Error: Login without a password is forbidden by configuration (see AllowNoPassword) [SOLVED]

This error relates to logging into phpMyAdmin, an open source tool used for the administration of MySQL. Once in...

Th8 12 · 49 sec read >

Change a Password for MySQL on Linux via Command Line

MySQL via Command Line 101: Basic Database Interaction Change a Password for MySQL on Linux via Command Line Create...

Th8 12 · 56 sec read >

How does an SSL work?

Every single day 100s of terabytes of data is being transferred across the internet. In fact, based on Intel’s...

Th8 12 · 3 min read >

Installing and using UFW on Ubuntu 16.04 LTS

On an Ubuntu server the default firewall management command is iptables. While iptables provides powerful functionality it’s syntax is...

Th8 12 · 1 min read >

How To: Upload Files To A Server

One of the most common tasks that a website owner will do is upload one or more files to...

Th8 12 · 1 min read >

Will my site be marked unsafe in Chrome 56+?

Lately there’s been a lot of speculation about Googles up-coming changes to how sites without an SSL are going...

Th8 12 · 2 min read >

What Is KernelCare?

The concept of ‘Kernel hotpatching’, sometimes called live patching, was introduced to the Linux community around 2008. Soon after...

Th8 12 · 1 min read >

How to Configure Your Liquid Web VPN

Liquid Web offers a free Virtual Private Network (VPN) user with every account. A VPN uses encryption to secure...

Th8 12 · 1 min read >

What Is PCI Compliance?

What Is PCI Compliance? For any business that handles Credit Card data, in anyway, there is a set of...

Th8 12 · 1 min read >

Find (View) Default Zone for Firewalld on CentOS 7

Pre-Flight Check These instructions are intended for finding (viewing) the default zone in Firewalld on CentOS 7 via the...

Th8 12 · 26 sec read >

Find (View) Active Zones in Firewalld on CentOS 7

Pre-Flight Check These instructions are intended for finding (viewing) active zones in Firewalld on CentOS 7 via the command...

Th8 12 · 24 sec read >

How to Securely Transfer Files via rsync and SSH on Linux

Pre-Flight Check These instructions are intended specifically for transferring files between servers via rsync and SSH on Linux. I’ll...

Th8 12 · 1 min read >

Information on CVE-2015-3456 QEMU Vulnerability (VENOM)

Overview VENOM, or Virtualized Environment Neglected Operations Manipulation, was made public on May 13, 2015. The vulnerability is in...

Th8 12 · 45 sec read >

CSF: Config Server Firewall Installation

An alternative firewall to APF is the Config Server Firewall, or CSF. CSF is generally considered a more advanced...

Th8 12 · 5 min read >

Categories