Security

Narrow down your search? Simply start typing...


1

How To Generate SSL Certificates Using Let’s Encrypt in InterWorx

Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG). Let's Encrypt integrates with InterWorx via a plugin, which allows users to generate free, secure, SSL certificates. Requirements: In order to generate a Let's Encrypt SSL certificate, the…
Read More
1

How to install an SSL Certificate in cPanel

Installing an SSL Certificate in cPanel requires that the domain be assigned a dedicated IP to begin with, so check your cPanel or with your hosting company as to your IP status. Secondly in order to use the "SSL Manager" Feature in cPanel a Dedicated IP is required, So check with your hosting company to…
Read More
1
CSF Firewall

What is CSF (ConfigServer Security and Firewall)?

ConfigServer Firewall, also known as CSF, is a firewall configuration script created to provide better security for your server while giving you an advanced, easy to use interface for managing firewall settings. CSF configures your server’s firewall to lock down public access to services and only allow certain connections, such as logging in to FTP,…
Read More
1
Hotlink Protection

Using hotlink protection to protect your site

Hotlink Protection prevents other web sites from directly linking to certain files (typically images) that are on your web site. This tutorial will assume that you are logged into your cPanel. If you are having trouble doing that, please see the tutorial named "How to Login to cPanel". The purpose of Hotlink Protection is so…
Read More
1
Top Reasons why WordPress websites get hacked (and how you can stop it)

Top Reasons why WordPress websites get hacked (and how you can stop it)

Hacking is the process of finding flaws in a system, and exploiting them to bypass security controls. ‘Ethical’ hackers use this process to learn about a system and find its weaknesses. However, malicious or ‘black hat’ hacking is also common. It is often used to break into websites. There are a lot of reasons why…
Read More
1
Password Protect Directories

How to Password Protect a Directory

Password protecting a directory will allow you to require a username and password to access a folder or folders from the web. This tutorial will assume that you are logged into your cPanel. On your main cPanel page, scroll down to the section called Security. Click on the icon named Password Protect Directories. This will…
Read More
1
IP Deny Manager in cPanel

How To Use The IP Deny Manager

This tutorial will teach you how to use the IP Deny Manager to block access to your web site from a specific IP address or IP address range. This tutorial will assume that you are logged into your cPanel. If you are having trouble doing that, please see the tutorial named "How to Login to…
Read More
0

Free Online Tools for Looking up Potentially Malicious Websites

Check potentially dangerous websites. One of the most frequent causes of large injections of spam into email systems is a compromise of web sites that contain malicious code. Several organizations offer free online tools for looking up a potentially malicious website. Some of these tools provide historical information; others examine the URL in real time…
Read More