Knowledgebase : MANUALS / GUIDES > Security
The LATEST TOMCAT VERSION -->  8.0.17  (19 JAN 2015). For more details, you may refer to following...
ATTENTION: All customers and administrators using CMS platform. Dear valued customers, Our Secu...
ATTENTION: All WHM and cPanel hosting/servers users/owners/administrators. Dear valued customers; ...
ATTENTION: All websites using CMS (Contents Management System). Our Security team would like to ad...
ATTENTION: All Joomla website owners/administrators Our Security team received a number of alerts ...
NOTE: This is an old announcement which we have posted on 2nd Nov 2010. We re-post it again as a ref...
ATTENTION: TO ALL DEDICATED & VPS SERVER OWNERS/ADMINISTRATORS Dear valued customers, We have re...
Dear Customers, We believe there are a few web defacement issues which had happened recently and a...
To change the root password for your VPS or Dedicated server via WHM: 1. Log into WHM. 2. Go to SE...
Brute-Force Attacks occur when an attacker attempts to calculate every possible combination that cou...
ABOUT FAIL2BAN Fail2Ban is a widely used tool for protecting the bruteforce attack analyzing the s...
If you see a windows popped up with title "Deceptive Website Warning" this means your website has so...
Registrar follows a set standard of AUP in reference to the domain names they offer. If your domain ...
SSL certificates can also be differentiated based on the number of domains or subdomains they protec...
There are many different types of SSL certificate options available, all with their unique use cases...
There can be several reasons why SSL/HTTPS is not working on your site. DOMAIN IS NEWLY HOSTED SSL ...
An SSL certificate error occurs when a web browser can't verify the SSL certificate installed on a s...
Common Name Mismatch occurs when the common name or SAN listed on an SSL certificate doesn't exactly...
When visitors access to your website request a page using a secure https:// connection, a broken pad...
Steps to install SSL certificate are available in URL provided below: https://support.comodo.com/ind...
Your server is only as secure as your weakest password. As a rule of thumb, the more lengthy and com...
HOW TO SETUP YOUR REMOTE ACCESS KEY IN WHM. This demo assumes you've already logged in to WebHost ...
On a Linux server, if you are in need of changing the permissions of a bulk amount of files or direc...
This will probably help you to find out the IP which tried the malpractices in a server to get compr...
CHECKING IF AN IP IS BLOCKED IN IPTABLES Check if IP is blocked: > iptables -L -n --line | grep [...
Here we provide sample of most popular iptables configuration. We will block all connections excep...
Copyright © 1998 - 2021 Shinjiru International Inc. All Rights Reserved.