The LATEST TOMCAT VERSION --> 8.0.17 (19 JAN 2015).
For more details, you may refer to following...
ATTENTION: All customers and administrators using CMS platform.
Dear valued customers,
Our Secu...
ATTENTION: All WHM and cPanel hosting/servers
users/owners/administrators.
Dear valued customers; ...
ATTENTION: All websites using CMS (Contents Management System).
Our Security team would like to ad...
ATTENTION: All Joomla website owners/administrators
Our Security team received a number of alerts ...
NOTE: This is an old announcement which we have posted on 2nd Nov
2010. We re-post it again as a ref...
ATTENTION: TO ALL DEDICATED & VPS SERVER OWNERS/ADMINISTRATORS
Dear valued customers,
We have re...
Dear Customers,
We believe there are a few web defacement issues which had happened
recently and a...
To change the root password for your VPS or Dedicated server via WHM:
1. Log into WHM.
2. Go to SE...
Brute-Force Attacks occur when an attacker attempts to calculate every
possible combination that cou...
ABOUT FAIL2BAN
Fail2Ban is a widely used tool for protecting the bruteforce attack
analyzing the s...
If you see a windows popped up with title "Deceptive Website Warning"
this means your website has so...
Registrar follows a set standard of AUP in reference to the domain
names they offer. If your domain ...
SSL certificates can also be differentiated based on the number of
domains or subdomains they protec...
There are many different types of SSL certificate options available,
all with their unique use cases...
There can be several reasons why SSL/HTTPS is not working on your
site.
DOMAIN IS NEWLY HOSTED
SSL ...
An SSL certificate error occurs when a web browser can't verify the
SSL certificate installed on a s...
Common Name Mismatch occurs when the common name or SAN listed on an
SSL certificate doesn't exactly...
When visitors access to your website request a page using a secure
https:// connection, a broken pad...
Steps to install SSL certificate are available in URL provided below:
https://support.comodo.com/ind...
Your server is only as secure as your weakest password. As a rule of
thumb, the more lengthy and com...
HOW TO SETUP YOUR REMOTE ACCESS KEY IN WHM.
This demo assumes you've already logged in to WebHost ...
On a Linux server, if you are in need of changing the permissions of a
bulk amount of files or direc...
This will probably help you to find out the IP which tried the
malpractices in a server to get compr...
CHECKING IF AN IP IS BLOCKED IN IPTABLES
Check if IP is blocked:
> iptables -L -n --line | grep [...
Here we provide sample of most popular iptables configuration.
We will block all connections excep...