KeePass for Windows User Guide

In this article we will outline how to install and use the KeePass password management software on your Windows computer. This software is useful for managing usernames, passwords, and other sensitive information used for your various digital resources within an encrypted database file. This article will cover:  Why use KeePass?  How to Install KeePass Managing Read More >

How to Install ClamAV on Ubuntu

ClamAV is a popular open source anti-virus (AV) scanner available for Windows, macOS, and Unix-based systems. ClamAV can quarantine and delete infected files, emails, websites, and more. ClamAV is also available as a cPanel server plugin. Below we’ll cover how to install ClamAV, update the signature database, and run common command-line interface (CLI) commands. How Read More >

How to Create Checksums with GtkHash

GtkHash is a small desktop application that creates multiple types of checksums on Linux and Windows at once. GtkHash can also hash multiple files at once or text strings. This makes hashing faster for users on Windows, macOS, and Linux who do not use the command line interface often. Remember to follow best practices for Read More >

How to Enable DNS-over-HTTPS and Encrypted SNI in Firefox

Starting in Firefox 73, users can easily use DNS-over-HTTPS (DoH) and Encrypted Server Name Indication (SNI) for better privacy without extra software. These newer DNS security features help protect user privacy during web activity. What is DNS-over-HTTPS (DoH)? DoH encrypts DNS traffic with HTTPS (port 443) and HTTP/2 and requires authentication of the requested server. Read More >

DDoS Protection Using Corero

Working on the internet can often be a seemingly trouble-free environment to the point that we often take it for granted. We should always keep in mind that there are people who are bent on disrupting these services. One of the attacks that can disrupt a service called DDoS attack. This article describes our uses Read More >

How to Set WP Cerber Security Notifcations

In this article: WP Cerber Notifications Strong Email Authentication Your website truly is more secure with VPS Hosting. cPHulk brute force protection, ConfigServer and Firewall (CSF), and Scheduled cPanel backups safeguard your data and peace of mind in various ways. Yet those tools have one important thing in common with the WP Cerber Security plugin Read More >

WP Cerber Security Hardening Options

With WP Cerber Security having so many features, it can replace other single-purpose WordPress security plugins you may have installed. It can set up a maintenance page for when your website is under construction. It has an access control list (ACL) and custom email notifications. WP Cerber Security includes many other features as smaller “hardening” Read More >

WP Cerber Security Antispam and Bot Detection Settings

In this article: Antispam Settings reCAPTCHA As we stated when covering WP Cerber Security hardening options, the plugin can replace other WordPress security plugins. In that article, we discussed replacing the maintenance page as an example. This time we replace the WordPress Heartbeat API and reCAPTCHA plugins. WP Cerber Security has an antispam engine to Read More >

WP Cerber Security Tools

In this article: Export & Import Settings Diagnostic Info Logs Plugin Update Changelog License for Paid users These tools display info for troubleshooting and options for plugin setup. The WP Cerber Security WordPress plugin is a versatile security suite including an IP access list, automated email notifications, and other restriction settings to name a few. Read More >

How to Manage ConfigServer Security & Firewall (CSF) Profiles

In this article: Backup Restore Compare Configurations It behooves managed VPS with cPanel (or unmanaged VPS) and Dedicated server administrators to understand backup options available within WebHost Manager (WHM): cPanel, website, database, WHM-scheduled backups, and Softaculous backups. There’s also Snapshots in your Account Management Panel (AMP). If you’re auditing logs for how well your security Read More >

Reasons Your Checksum Doesn’t Match the Original

In this article: Troubleshooting Solutions We have an article covering best practices for using checksums. But you can do all that and the user downloading your file can still have an issue. This can scare users into thinking you just infected their computer. This is why we recommend troubleshooting steps for when checksums don’t match. Read More >

Best Practices for Using Checksums

In this article: Checksums Best Practices Checksums Defense in depth involves layers of security, and file management is a core part of it. If you offer or recommend downloadable content, it’s important to understand the importance of verifying checksums on your Linux server, PC, or Mac. Whether you use a content managment system (CMS), framework, Read More >

How to View Listening Ports with ConfigServer Security & Firewall (CSF)

In this article: View Listening Ports Related Tasks Whether you’re working toward PCI compliance or general server hardening, closing unneeded open ports is an important step for improved performance and security. WebHost Manager (WHM) has many security features available to help you achieve these goals. ConfigServer Security & Firewall (CSF) software has multiple capabilities which Read More >

How to Manage Saved Passwords Using macOS Catalina

This guide will explain:  In this article, you can learn how to manage saved passwords using macOS Catalina. This includes viewing, searching for, modifying, and deleting passwords stored in your iCloud Keychain. Security is vital to the success of your business website. At InMotion Hosting, we are continuously enhancing our Shared Hosting services to deliver Read More >

How to Manage Saved Passwords Using iOS

This guide will explain: In this article, you can learn how to manage saved passwords using iOS. This includes viewing, searching for, modifying, and deleting saved passwords stored in your iCloud Keychain. Security is vital to the success of your business website. At InMotion Hosting, we are continuously enhancing our Shared Hosting services to deliver Read More >