Before you can install your SSL certificate after purchase you need to generate a Certificate Signing Request (CSR) and send it to your SSL vendor. If you purchased your SSL from KnownHost the CSR can be entered at my KnownHost panel. If you purchased your SSL certificate somewhere else you’ll enter it on the website where […]
Keeping our websites secure is one of the most important and challenging topics of all time. This article will cover the ‘mod_security’ module and whether or not you should consider using it on your server(s)/website(s). What is mod_security? ModSecurity is a toolkit for real-time web application monitoring, logging, and access control. I like to think […]
There will be times that you have an IP address that is static and you want toe nsure that you no longer experience firewall blocks against your IP. They may be times that you have a developer that needs to be let in due to their incorrect password attempts. Does this sound like you? If […]
If you’ve been getting a lot of alerts for a specific IP that’s listed in a CSF e-mail but CSF hasn’t blocked the IP and you want to block the IP, these are the steps that will help resolve the noisy e-mails as well as keeping your server safe from attacks such as SQL injections […]
If you are receiving the following messages from your cPanel server, an ongoing rsyslog bug has updated the configuration in such a way that it disabled local logging: First, you should go ahead and check the current log and the rotated logs to see if maybe the log rotated at the same time the check […]
In a firewall sometimes you only want to allow an IP through on a certain port without fully whitelisting them. To do so in CSF is pretty straight forward and the concept is the same as on many home routers. This tutorial will show you how to do it both via WHM’s CSF GUI and via command […]
In this article; we’ll be going over the differences between POP3 and IMAP, as well as their use-case scenarios. One of the first things you should know is that both of these are what is called “Email Protocols”. IMAP (Internet Message Access Protocol) POP3 (Post Office Protocol) These services are used for communication between a […]
If your server has fallen victim to IP blacklisting, you’ll certainly want to know how to request your blacklisting be removed. This article will cover blacklist removal and provide links to specific RBL de-listings. Checking Blacklists First thing to do is check and see if you are actually listed on any blacklists. There are many […]
Memcached Memcached is a memory object caching system for speeding up dynamic web applications… It’s open source and has been designed to work with a large number of open connections. Database calls, API calls, or page rendering are a few examples of the arbitrary data results that are stored in memory to alleviate database load. One can […]
Overview Each time when PHP script executes on the server it goes through the following stages: tokenizing, parsing, compilation, and interpretation. PHP opcode caching allows skipping the first 3 stages by storing pre-compiled scripts in shared memory and reusing them. This significantly increases the performance of running PHP scripts. 
 It is important to know […]