22 06, 2018

How To Harden Linux Servers ?

By |June 22nd, 2018|Apache, Hardening, linux, Security, Vulnerabilities, webserver|0 Comments

WEB SERVERS AND THEIR TYPES A Web server is a program that uses HTTP protocol to serve files in the form of web pages in response to their HTTP client request. The most commonly used web servers are Apache and IIS( Microsoft Internet Information Service). In the modern world, we can’t visualize a world [...]

7 05, 2018

How To Configure And Setup Firewalld On Centos7 ?

By |May 7th, 2018|Centos7, Firewall, Hosting, IP address, Security, Server Management Tools, Uncategorized|0 Comments

FirewallD(dynamically oversaw firewall) is a firewall administrations tool accessible as a matter of course on CentOS 7 servers. It is a wrapper around iptables and it accompanies graphical arrangement device firewall-config and order line device firewall-cmd. Firewalld will give you a progressively oversaw firewall with help for both firewall and system zones. Firewalld will [...]

2 03, 2018

How To Configure And Secure OpenSSH?

By |March 2nd, 2018|Articles, Security, Server Management|0 Comments

OpenSSH is an application or a suite for network/security related utility based on Secure Shell Protocol(SSH), which helps to secure communications through the network. Secured communication is achieved through multiple authentication methods. OpenSSH encrypts all traffic (including passwords) to eliminate connection hijacking and all other network related/level attacks. Network level/traffic authentication is done using [...]

22 02, 2018

How To Prevent Cyber Hacking Of Private Email Server And Company Server

By |February 22nd, 2018|Articles, Hack Recovery, Security, Technical Tips|0 Comments

Cyber-attacks have been increased over the years targeting especially the individuals, and businesses. In the recent years, more than two-thirds of small and large business organizations have become the victim of cyber-attacks. EMAIL HACKING Email is a widely used communication system that can be categorized as open and closed. Open web-based services offer email accounts [...]

13 07, 2016

Vulnerable Symlink attack and its prevention.

By |July 13th, 2016|Security|0 Comments

Symlink attack is one of the newest and eaiesty way of exploitation as the attacker gets full root access to the entire server from a compromised website . The hackers are more likely to attack more websites if the server is in a shared environment. Thus, How do they get root privileges? ++++ Create symlink [...]

Load More Posts