Articles

 Changing SSH Port (CentOS)

It is always dangerous to run SSH on port 22. So better not to be late one should always change...

 Disallowing php.ini override in suPHP

Its very simple to enable this function in server using suPHP. Just by enabling phprc_paths in...

 Install RkHunter for Rootkit/Trojan Scanning

How to Install: First: Run the command to get the RKHunter Rootkit files on server $ wget...

 Installing (D)DoS Deflate To Mitigate DDoS Attack

(D)DoS Deflate is a lightweight bash shell script designed to assist in the process of blocking a...

 Installing BDF For Bruteforce Prevention

BFD is a modular shell script for parsing application logs and checking for authentication...

 Installing Comodo WAF for Enhanced Security

Web applications are the back-end components that power any online business. They are used to...

 Installing ConfigServer Security & Firewall (CSF)

Well Installing ConfigServer Security & Firewall is very easy. Just Follow the Setps Below...

 Installing HAProxy For Load Blancing And Protecting Apache From DDos

Installing HAProxy:-You can check for the latest version here:- http://haproxy.1wt.eu/#downAt...

 Installing Mod_Antiloris To Mitigate SlowLoris DOS Attack

1) Download the installer from sourceforge and install cd /usr/local/src wget...

 Installing Nginx In WHM/Cpanel

NginX is the fastest web server in the world. Nginx is known for its high performance and low...

 Mitigating Layer7 HTTP Flood with Nginx+Fail2ban

This tutorial is regarding mitigation of layer 7 http flood using nginx and fail2ban. In this...