A remote destination will allow you to store your backups for your server at a remote location so that if you ever experience an incident, you’ll have something to fall back on. This documentation is to help you configure your servers backup configuration for remote destinations. While this guide is intended to be paired with […]
Top Tips to Prevent Malicious Compromises Use Unique, Complex Passwords With more than 5,000 data breaches in 2019 alone, the importance of using unique, complex passwords cannot be overstated. The Surveillance Self-Defense guide at eff.org has many recommendations regarding passwords including writing them down on paper! Top Tips Use a password generator to create highly complex, secure passwords. Use a password […]
It is important to make sure each and every password used for any type of account is strong. Before we get into how to generate these passwords, let’s go over some of the characteristics of strong passwords. Characteristics of Secure Passwords Password security is one of the key parts of security of any application, whether […]
Before you can install your SSL certificate after purchase you need to generate a Certificate Signing Request (CSR) and send it to your SSL vendor. If you purchased your SSL from KnownHost the CSR can be entered at my KnownHost panel. If you purchased your SSL certificate somewhere else you’ll enter it on the website where […]
Below, we will outline two different methods of configuring port knocking with CSF/LFD (via CLI and via GUI). This can be quite helpful for maintaining SSH functionality while also addressing PCI Scans failures due to SSH. Via CLI Log in as root via SSH. Remember that KH servers use port 2200 by default for SSH connections. […]
It is worrisome when you receive a notification from the firewall regarding a suspicious process, especially for those processes that you do not readily recognize. That is why KnownHost has compiled a list of some common alerts that are mostly false positives and provided the instructions for stopping the notifications. This list is specific to […]
ConfigServer Security & Firewall (csf) with Login Failure Daemon (lfd) is “A Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and Security application for Linux servers.”official page)) This comes pre-installed on our cPanel servers and has many useful features to assist you with detecting events which might be indicative of security issues in your server. If it […]
In this article; we’ll be going over the differences between POP3 and IMAP, as well as their use-case scenarios. One of the first things you should know is that both of these are what is called “Email Protocols”. IMAP (Internet Message Access Protocol) POP3 (Post Office Protocol) These services are used for communication between a […]
If your server has fallen victim to IP blacklisting, you’ll certainly want to know how to request your blacklisting be removed. This article will cover blacklist removal and provide links to specific RBL de-listings. Checking Blacklists First thing to do is check and see if you are actually listed on any blacklists. There are many […]
Memcached Memcached is a memory object caching system for speeding up dynamic web applications… It’s open source and has been designed to work with a large number of open connections. Database calls, API calls, or page rendering are a few examples of the arbitrary data results that are stored in memory to alleviate database load. One can […]