This article is going to be thoroughly detailed in covering the different methods of checking domain access logs; why you should check them and how to protect yourself from further incidents. Remember; the goal is mitigation – reducing the impact your server experiences from such incidents – there is no method of 100% prevention. Why […]
Blocking and preventing brute force attacks is one of the main things you want to do on your web server to add a layer of security. How brute force attacks work Hackers can try to get into your system using a few different methods. Manual login attempts, they will try to type in a few […]
In modern versions of cPanel/WHM, it is easier than ever to get free signed SSL Certificates for your domains! Since version 58, cPanel has had a feature called AutoSSL to automatically install for you Domain-Validated (DV) SSL certificates for your domains, to use in Apache, Dovecot, and Exim (i.e., the websites and email). The cPanel’s AutoSSL supports both […]
What SSL Actually Does for You? SSL is the acronym for Secure Sockets Layer and is the Internet standard security technology used to establish an encrypted (or safe) link between a web server (website) and your browser (i.e. Internet Explorer, Chrome, Firefox, etc…). This secured link ensures that the data/information that is passed from your […]
Keeping our websites secure is one of the most important and challenging topics of all time. This article will cover the ‘mod_security’ module and whether or not you should consider using it on your server(s)/website(s). What is mod_security? ModSecurity is a toolkit for real-time web application monitoring, logging, and access control. I like to think […]
There will be times that you have an IP address that is static and you want toe nsure that you no longer experience firewall blocks against your IP. They may be times that you have a developer that needs to be let in due to their incorrect password attempts. Does this sound like you? If […]
If you’ve been getting a lot of alerts for a specific IP that’s listed in a CSF e-mail but CSF hasn’t blocked the IP and you want to block the IP, these are the steps that will help resolve the noisy e-mails as well as keeping your server safe from attacks such as SQL injections […]
Below, we will outline two different methods of configuring port knocking with CSF/LFD (via CLI and via GUI). This can be quite helpful for maintaining SSH functionality while also addressing PCI Scans failures due to SSH. Via CLI Log in as root via SSH. Remember that KH servers use port 2200 by default for SSH connections. […]
If you are receiving the following messages from your cPanel server, an ongoing rsyslog bug has updated the configuration in such a way that it disabled local logging: First, you should go ahead and check the current log and the rotated logs to see if maybe the log rotated at the same time the check […]
It is worrisome when you receive a notification from the firewall regarding a suspicious process, especially for those processes that you do not readily recognize. That is why KnownHost has compiled a list of some common alerts that are mostly false positives and provided the instructions for stopping the notifications. This list is specific to […]