In this article we will outline how to install and use the KeePass password management software on your Windows computer. This software is useful for managing usernames, passwords, and other sensitive information used for your various digital resources within an encrypted database file. This article will cover: Why use KeePass? How to Install KeePass Managing Read More >
Security
How to Install ClamAV on Ubuntu
ClamAV is a popular open source anti-virus (AV) scanner available for Windows, macOS, and Unix-based systems. ClamAV can quarantine and delete infected files, emails, websites, and more. ClamAV is also available as a cPanel server plugin. Below we’ll cover how to install ClamAV, update the signature database, and run common command-line interface (CLI) commands. How Read More >
How to Install ConfigServer Security & Firewall (CSF) on Ubuntu
ConfigServer Security & Firewall (CSF) is a stateful packet inspection (SPI) firewall and front-end manager for iptables. CSF is a more advanced alternative to APF and has integrations for Vesta Control Panel, Webmin, and more. Below we cover how to install CSF on Ubuntu and complete basic tasks such as manage ports, configure Login Failure Read More >
How to Create Checksums with GtkHash
GtkHash is a small desktop application that creates multiple types of checksums on Linux and Windows at once. GtkHash can also hash multiple files at once or text strings. This makes hashing faster for users on Windows, macOS, and Linux who do not use the command line interface often. Remember to follow best practices for Read More >
How to Enable DNS-over-HTTPS and Encrypted SNI in Firefox
Starting in Firefox 73, users can easily use DNS-over-HTTPS (DoH) and Encrypted Server Name Indication (SNI) for better privacy without extra software. These newer DNS security features help protect user privacy during web activity. What is DNS-over-HTTPS (DoH)? DoH encrypts DNS traffic with HTTPS (port 443) and HTTP/2 and requires authentication of the requested server. Read More >
DDoS Protection Using Corero
Working on the internet can often be a seemingly trouble-free environment to the point that we often take it for granted. We should always keep in mind that there are people who are bent on disrupting these services. One of the attacks that can disrupt a service called DDoS attack. This article describes our uses Read More >
Accessing the McAfee Control Console as an Admin
The McAfee Control Console is where you can login and administor your account. The first time you login to the McAfee Control Console, you must create a password. After the password has been set you can login directly. In this guide we will show you how to create your password, then login to the McAfee Read More >
How to Set WP Cerber Security Notifcations
In this article: WP Cerber Notifications Strong Email Authentication Your website truly is more secure with VPS Hosting. cPHulk brute force protection, ConfigServer and Firewall (CSF), and Scheduled cPanel backups safeguard your data and peace of mind in various ways. Yet those tools have one important thing in common with the WP Cerber Security plugin Read More >
WP Cerber Security Hardening Options
With WP Cerber Security having so many features, it can replace other single-purpose WordPress security plugins you may have installed. It can set up a maintenance page for when your website is under construction. It has an access control list (ACL) and custom email notifications. WP Cerber Security includes many other features as smaller “hardening” Read More >
WP Cerber Security Antispam and Bot Detection Settings
In this article: Antispam Settings reCAPTCHA As we stated when covering WP Cerber Security hardening options, the plugin can replace other WordPress security plugins. In that article, we discussed replacing the maintenance page as an example. This time we replace the WordPress Heartbeat API and reCAPTCHA plugins. WP Cerber Security has an antispam engine to Read More >
WP Cerber Security Tools
In this article: Export & Import Settings Diagnostic Info Logs Plugin Update Changelog License for Paid users These tools display info for troubleshooting and options for plugin setup. The WP Cerber Security WordPress plugin is a versatile security suite including an IP access list, automated email notifications, and other restriction settings to name a few. Read More >
Search for PunyCode Look-alikes With Hold Integrity IDN Checker
Learn how to find internationalized domain names (IDNs) that spoof your domain with punycode encoding and could hinder your ability to attract to new visitors. What is Punycode? Search for Domain Spoofing What is Punycode? Web browsers use punycode to render domains with non-Latin alphabets such as Greek and Cyrillic. Internationalized domain names (IDNs) allow Read More >
How to Deal With the “on this day I hacked your OS” Phishing Scam Email
In this article, we cover a phishing email starting with the following sentence: on this day I hacked your OS and got full access to your account [email protected] Such phishing emails aim to create feelings of desperation and fear. We want to combat this by ensuring you better understand how to deal with such issues. Read More >
How to Manage ConfigServer Security & Firewall (CSF) Profiles
In this article: Backup Restore Compare Configurations It behooves managed VPS with cPanel (or unmanaged VPS) and Dedicated server administrators to understand backup options available within WebHost Manager (WHM): cPanel, website, database, WHM-scheduled backups, and Softaculous backups. There’s also Snapshots in your Account Management Panel (AMP). If you’re auditing logs for how well your security Read More >
Reasons Your Checksum Doesn’t Match the Original
In this article: Troubleshooting Solutions We have an article covering best practices for using checksums. But you can do all that and the user downloading your file can still have an issue. This can scare users into thinking you just infected their computer. This is why we recommend troubleshooting steps for when checksums don’t match. Read More >
Best Practices for Using Checksums
In this article: Checksums Best Practices Checksums Defense in depth involves layers of security, and file management is a core part of it. If you offer or recommend downloadable content, it’s important to understand the importance of verifying checksums on your Linux server, PC, or Mac. Whether you use a content managment system (CMS), framework, Read More >
How to View Listening Ports with ConfigServer Security & Firewall (CSF)
In this article: View Listening Ports Related Tasks Whether you’re working toward PCI compliance or general server hardening, closing unneeded open ports is an important step for improved performance and security. WebHost Manager (WHM) has many security features available to help you achieve these goals. ConfigServer Security & Firewall (CSF) software has multiple capabilities which Read More >
How to Manage Saved Passwords Using macOS Catalina
This guide will explain: In this article, you can learn how to manage saved passwords using macOS Catalina. This includes viewing, searching for, modifying, and deleting passwords stored in your iCloud Keychain. Security is vital to the success of your business website. At InMotion Hosting, we are continuously enhancing our Shared Hosting services to deliver Read More >
How to Secure Your Website With Sucuri for WordPress Hosting
In this article: This article describes how to use the Sucuri plugin for WordPress to secure your website. It also explains some of the benefits of using Sucuri for WordPress. NOTICE: Sucuri for WordPress is just one way to secure your website’s data. Check out the many features WordPress Hosting by InMotion Hosting including supplementing Read More >
How to Manage Saved Passwords Using iOS
This guide will explain: In this article, you can learn how to manage saved passwords using iOS. This includes viewing, searching for, modifying, and deleting saved passwords stored in your iCloud Keychain. Security is vital to the success of your business website. At InMotion Hosting, we are continuously enhancing our Shared Hosting services to deliver Read More >