full screen background image

Category: Server / Website

APACHE PROTECTION WITH MODSECURITY

There are so many ways to protect Web-server. On this post, I’m going to guide how to use ModSecurity WAF to protect Apache...

How to use FAIL2BAN to protect SSH

Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. Written in the Python...

Secure WordPress with X-Frame-Options & HTTPOnly Cookie

Protect WordPress website from XSS, Clickjacking Attacks Securing your website is essential for your online business presence. Over the...

How to Protect WordPress from Brute Force Attacks (Securing Web)

Attacking website using Brute Force is an old technique and still, exists on the Internet. Brute Force attacks can take your website down...

How to Install & Configure ModSecurity on Nginx

Nginx web server is used on more than 30% of website worldwide and growing. Considering the increase in online web threats, one the...

How to Implement ModSecurity OWASP Core Rule Set in Nginx

If you were securing Nginx with Mod Security then you would like to have OWASP core rule set (CRS) activated to protect from following...

How to Scan Website Security Vulnerabilities Automatically (Don’t Get Hacked)

Performing regular security scan to your website is essential. It can be time-consuming to do manually, and that’s why you need to...

How to find Web Server Vulnerabilities with Nikto Scanner

Scan your web server for vulnerabilities, misconfiguration in FREE with Nikto scanner 97% of application tested by Trustwave had one or...

5 Open Source Web Application Firewall for Better Security

Protect your web assets with Open Source WAF Thousands of website get hacked every day due to misconfiguration or vulnerable code. Web...

How to Secure IIS Web Server with WebKnight WAF?

Learn the features of WebKnight web application firewall for IIS and installation procedure. Microsoft IIS (Internet Information Service)...

8 Online Services to Remove Malware and Clean Hacked Website

How to remove blacklist, malware, malicious code and clean infected website? There are many reasons for the website to get hacked or...

6 Unusual Optimization Tips to Speed-up and Secure Your Website

Performance & Security is two essential metrics for online business success. If your website is not loaded in less than 3 seconds, then...

7 SaaS Web Vulnerability Scanner for Continuous Security

Detect security vulnerabilities before anyone do by cloud-based web scanner. Cyber attacks are increasing and projected to cost $2 trillion...

11 WordPress Scanner to Find Security Vulnerabilities & Misconfiguration

Is your WordPress site secure enough? Find the flaws in your WordPress website and fix them before someone misuses it. The latest research...

How to Analyze Your WebSite like Hacker to Find Vulnerabilities?

A step-by-step guide to finding security flaws within web application using Detectify security vulnerability scanner. 97% of applications...

Top 7 DDoS Attack Protection Service for Better Security

Don’t let DDoS attack interrupt your business operation for reputational and financial loss. Use cloud-based denial of service protection...

List of Essential WordPress Security Plugins and Tips

The whole realm of online marketing and blogging would not have become familiar else Content Management Systems like WordPress. WordPress...

How to Secure Joomla Website from Brute Force Attacks?

Joomla is second largest Open Source CMS platform powering millions of websites from small to enterprise level. There are many techniques...

6 Magento Security Scanner to Find Vulnerabilities & Malware

Magento rank number three with more than 7% market share in e-Commerce platform. If you own an online shop then most probably you would...

14 Essential Tips to Protect Magento from Online Threats

Running an eCommerce website is challenging, and one should consider doing all it takes to secure from cyber attacks. Latest forecasts say...

How to Enable Secure HTTP Header in Apache Tomcat 8?

Injecting HTTP Response with the secure header can mitigate most of the web security vulnerabilities. If you are managing production...

lnav – Watch and Analyze Apache Logs from a Linux Terminal

Less than two weeks ago, the Wannacry ransomware attack compromised thousands of computers, causing considerable losses to big companies...

GoAccess (A Real-Time Apache and Nginx) Web Server Log Analyzer

GoAccess is an interactive and real time web server log analyzer program that quickly analyze and view web server logs. It comes as an open...

How to Install Let’s Encrypt SSL Certificate to Secure Apache on RHEL/CentOS 7/6

Extending the last Let’s Encrypt tutorial regarding SSL/TLS free certificates, in this article we are going to demonstrate how to obtain...

How to Password Protect Web Directories in Apache Using .htaccess File

When you manage online projects, you often need to limit access to that project in order to protect it against the outside world. There are...

Protect Apache Against Brute Force or DDoS Attacks Using Mod_Security and Mod_evasive Modules

For those of you in the hosting business, or if you’re hosting your own servers and exposing them to the Internet, securing your systems...

Apache Web Server Hardening & Security Guide

1. Introduction The Web Server is a crucial part of web-based applications. Apache Web Server is often placed at the edge of the network...

13 Apache Web Server Security and Hardening Tips

We all are very familiar with Apache web server, it is a very popular web server to host your web files or your website on the web. Here...

Control Network Traffic with iptables

iptables is an application that allows users to configure specific rules that will be enforced by the kernel’s netfilter framework. It...

How to Configure a Firewall with UFW

UFW, or uncomplicated firewall, is a frontend for managing firewall rules in Arch Linux, Debian or Ubuntu. UFW is used through the command...