KnownHost’s dedicated server line supports an abundance of proper Operating Systems but we also know you may need something different or even niche for that one special project. We’re pleased to offer netboot.xyz, an easy way to try and install a wide variety of Operating Systems on your dedicated server. Below are instructions on how […]
When your website is online, it’s potentially vulnerable. To combat this, online services are utilized to mask or ‘hide’ the website’s origin IP address. This is handled by using services such as CloudFlare, Incapsula or Sucuri that offer a Website Application Firewall. These services are dependent by a large majority of individuals in today’s internet […]
Since the most important parts of the network configuration are provided via DHCP along with your primary IPv4 address, managing your network stack is quite easy. The instructions here detail how to setup IPv6 and additional IP addresses on CentOS, Ubuntu, and Debian. CentOS 7 CentOS 7 has two ways to manage networks. Init scripts […]
A security bulletin was shared regarding a 0-day vulnerability for the Apache java logging library ‘log4j’ version 2+. What was shared was a discovery that this library could be severely exploited through Remote Code Execution (RCE) by handling a specific string within the library. This vulnerability has been considered critical, obtaining a 10/10 on the […]
The default SSH port on all Operating Systems is port 22. For security measures, KnownHost’s servers are configured to use port 2200. Changing your SSH port The server’s SSH configuration file is located here: /etc/ssh/sshd_config SSH into your server as the root user. ssh root@<ip address> -p 2200 Open the configuration file with your favorite text […]
EITest Infections and Blacklists EITest is older malware dating back to at least 2011 that uses compromised websites to accomplish several different nefarious tasks, such as directing users to Exploit Kits landing pages which are responsible for distributing various types of malware. One of the latest was the payload being downloaded to victim’s computers to […]
Blocking and preventing brute force attacks is one of the main things you want to do on your web server to add a layer of security. How brute force attacks work Hackers can try to get into your system using a few different methods. Manual login attempts, they will try to type in a few […]
Transport Layer Security (TLS) continues to improve and close old security vulnerabilities with each new version, with TLS 1.2 being the current standard (and TLS 1.3 being the next version that will be adopted.) Windows 7 (or more specifically, applications that use WinHTTP for SSL on Windows 7) cannot make use of TLS 1.1 or more importantly, […]
While running any website such as WordPress that takes advantage of server applications such as ‘ImageMagick’ you may occasionally have an environment where you’ll receive an error upon uploading images. As such, when you attempt to upload an image you’ll be met with the following error message: These particular errors are a result of environment […]
Memcached Memcached is a memory object caching system for speeding up dynamic web applications… It’s open source and has been designed to work with a large number of open connections. Database calls, API calls, or page rendering are a few examples of the arbitrary data results that are stored in memory to alleviate database load. One can […]