Articles

 Close an Open DNS

The terms Open and Closed are now used to describe DNS servers in the following context: Open...

 Create an SPF record for domain

The Sender Policy Framework (SPF) is a method of fighting spam. As more time passes, this...

 Identify a DoS/DDoS attack

If your server appears pretty slow, there could be many things wrong such as poorly written...

 Install ClamAV antivirus

Install ClamAV antivirus softwareInstall EPEL repo:For CentOS 6 32-bit execute command:rpm -Uvh...

 Install ConfigServer firewall application

ConfigServer firewall is a popular Linux firewall security suite. It is easy to install, flexible...

 Installing Rkhunter (Rootkit Hunter)

First download the latest stable version of Rkhunter tool:wget...

 Make cPanel/WHM VPS more secure

Use secure passwords Insecure passwords are the most common security vulnerability for most...

 Quickly allowing/denying IP’s using iptables

How do you block an IP using iptables?iptables -A INPUT -s xx.xx.xx.xx -j DROPHow do you block an...

 Secure mail server checklist

Setup of email server in Linux is simple, but your job does not end there. Customer had...

 Secure VPS Tips

Here is a simple, straightforward guide to improve VPS security. Change the SSH port One of the...

 Troubleshoot slow internet connection

This article describes some of the most common causes for slow Internet connection. Follow these...

 Use PING to find network problems

PING allows you to quickly verify the connectivity of your internet connection to the VPS server....

 Working with a compromised VPS

An exploited or hacked VPS is one that is no longer fully under your control. Someone else is now...