When your website is online, it’s potentially vulnerable. To combat this, online services are utilized to mask or ‘hide’ the website’s origin IP address. This is handled by using services such as CloudFlare, Incapsula or Sucuri that offer a Website Application Firewall. These services are dependent by a large majority of individuals in today’s internet […]
A security bulletin was shared regarding a 0-day vulnerability for the Apache java logging library ‘log4j’ version 2+. What was shared was a discovery that this library could be severely exploited through Remote Code Execution (RCE) by handling a specific string within the library. This vulnerability has been considered critical, obtaining a 10/10 on the […]
There are many different server environments out there that experience disruptions due to malicious attacks of varying natures. Above all, each of these applications can be susceptible to incidents such as ‘Layer 7’ or ‘Application Layer DDoS’ attacks. This is performed by attempting to saturate network or server resources with traffic floods. A WAF (website […]
The Basics Let’s talk about PHP Handlers, we’ll be going over Apache’s many different available PHP Handlers. We’ll explain what each one is, what its best at doing, and any pros and cons regarding that handler. Our wish is that this guide provides you with helpful information which is informative for you so that you […]
This article is going to be thoroughly detailed in covering the different methods of checking domain access logs; why you should check them and how to protect yourself from further incidents. Remember; the goal is mitigation – reducing the impact your server experiences from such incidents – there is no method of 100% prevention. Why […]
Keeping our websites secure is one of the most important and challenging topics of all time. This article will cover the ‘mod_security’ module and whether or not you should consider using it on your server(s)/website(s). What is mod_security? ModSecurity is a toolkit for real-time web application monitoring, logging, and access control. I like to think […]
While running any website such as WordPress that takes advantage of server applications such as ‘ImageMagick’ you may occasionally have an environment where you’ll receive an error upon uploading images. As such, when you attempt to upload an image you’ll be met with the following error message: These particular errors are a result of environment […]
Requirements: This requires the mod_rewrite module in apache. This is enabled by default on all KnownHost systems. .htaccess files can be used in a website’s document root directory (ex. /home/user/public_html/) for redirecting web site visitors from one document within your web site to another. .htaccess rules are recursive meaning that rules written in /home/user/public_html/.htaccess will apply […]
When your server, whether dedicated or VPS, is throwing Error Code 500, there’s a misconfiguration issue that’s stopping the normal 200 Success messages you’d love to be seeing instead. Some 500 errors can be caused by the webserver itself due to invalid lines in say .htaccess. Other times, 500 errors can be caused by broken […]