KeePass Password Safe
KeePass is a program that can help you to protect your passwords. Today i installed this program, no install is needed also it can run from USB drives. Recently one of the USB drive with server...
View ArticleFree SQL Injections Scanner
You have likely been tracking the mass SQL Injections that are currently sweeping through the net. Just last night I was shopping on www.ihomeaudio.com when I noticed they had been injected (they have...
View ArticleHow to Install and Configure maldet (Linux Malware Detect – LMD)
Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network...
View ArticleHow to Disable Telnet
Telnet sends clear text passwords and usernames through logins and should be disabled on all web servers and replaced with SSH. Some hosting providers are not disabling telnet by default but you should...
View ArticleHow to Disable Direct Root Logins
Allowing the root user to login directly is a major security issue, we’ll show you how to disable it so you can still login as root but just not directly, reducing the security issue. This will force a...
View ArticleHow to Change the SSH port on cPanel Servers
To change the SSH port login as root, and edit /etc/ssh/sshd_config Find the line that says Port 22 and change 22 to any number between 1024->65535 (above 30000 is best) and save the file. Once...
View ArticleHow to keep Hackers Away
1. Do not disable safe_mode under php.ini. If customer requested t disable it, turn it off on his account only. As most of the time attack is done using c99 php shell scripts. This c99 shell allows an...
View ArticleHow to Remote Wipe your Android Phone When It Is Stolen
Here are a few ways to remotely wipe your android phone when it is stolen. 1. Where’s My Droid Where’s My Droid is a commonly talked about Android security application. Many times it’s referred to in...
View ArticleFIleZilla FTP Software Is Insecure
I was checking through the MetaSploit framework, i found the exploit to hack FileZilla. FileZilla store passwords in pain text in XML file. This was the same for years. I thought they had fixed it long...
View ArticleHow to enable ClientExec debug log
Following steps will help you to enable logging in ClientExec Find ‘config.php’ file from the folder where you installed ClientExec script. Now, we need to edit below lines: define(‘LOG_LEVEL’, 1);...
View Article5 Ways To Prevent Your Password From Being Hacked
Do not open unfamiliar emails. If you open one you think is from someone you know but realize it’s not, delete immediately. Do not click any links in the message or send the sender personal or banking...
View ArticleSSL Certificate can get you ranked higher on Google SERP
Today google announced that it will be SSL certificate on web site as a signal for Ranking. Google want internet to be more secure, no more session hijacking and government snooping on internet...
View ArticleHow to password protect a directory using cPanel.
Using the cPanel Password Protect Directory option, we can restrict users from accessing certain parts of your web site. When a user try to access the restricted folder, it will prompt for a username...
View ArticleHow to Use AVG Internet Security
# Open up the Antivirus # There should be something like “you are protected” on top of the window, if not, you should probably scan your computer by clicking on the “scan now” button towards the...
View ArticleFree download – Panda Software tops AV-Test’s rankings of antivirus software
New version of Panda Antivirus Free is an evolution of first cloud antivirus, based on Collective Intelligence. It is unique system for detecting and disinfecting viruses and other threats that feeds...
View ArticleFacebook, Yahoo team up to keep hackers from using recycled accounts
With Yahoo recycling its email accounts by giving dormant addresses to other users, could new users of a recycled account hijack the Facebook accounts they are linked to?. Well Facebook was watching...
View ArticleA new malware called WireLurker attacks Apple products
Recently a new malware has been detected which is targeting Apple products. The virus is called “WireLurker.” It was discovered by cyber security software maker Palo Alto Networks. WireLurker zeroes...
View ArticleSecuring your site configurations file
It is always better to move your web site configuration file outside of document root. This is because if server have an error, this can happen during server upgrades, your configuration files may...
View ArticleOpenSSH client Vulnerability CVE-2016-0777
OpenSSH client have a critical vlunerability, this allow compromised servers steal your private key. This is because an expeirmental feature in SSH Client, UseRoaming is enabled by default. You can...
View ArticleInstall LetsEncrypt on Linux Server
LetsEncrypt is a Free SSL provider. https://letsencrypt.org Enable SSL in Nginx Install LetsEncrypt SSL on Proxmox Node Install LetsEncrypt To install LetsEncrypt, run cd /usr/local/sbin wget...
View Article
More Pages to Explore .....