In this article, we will denote the security best practices for 2020 and beyond. Because security is such a challenging subject for many, it often goes unheeded, and as such, many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.Continue reading “Top 15 Server Security Practices for 2020”
What is DNS?
The Domain Name Service (or DNS) is the key to the presence of your server on the internet. You are probably aware your domain has an “IP” address, which stands for Internet Protocol; that number is your domain’s literal web address on the internet. A typical IP address is a series of four numbers called octets that are identified like so: 10.10.10.10. You can think of your IP address as being similar to a postal address. The IP address is the exact location where your domain lives. I usually explain it like this;Continue reading “DNS: An Overview”
In this next series of articles, we will be doing a side by side comparison of the main features of both InterWorx/SiteWorx vs. cPanel/WHM. We offer this information to assist our clients in choosing the right product to fit their needs. Let’s dive right in…
Home ScreensContinue reading “Interworx vs. cPanel: Part 1”
Reading Time: 2 minutesBy default, SSH on Ubuntu comes configured in a way that disables the root users log in. This was originally enabled as a security precaution which means that you cannot directly log in as the root user over SSH. However, you can usually get around the need for root ssh login by using the sudo command. In some cases, though it’s just more convenient to get directly logged in as root.
Reading Time: 5 minutes
Why should I change my admin URL?
Most Content Management Systems (CMS’s) have a unique identifying login URL. For example, WordPress uses
for your admin login page. Because of this, hackers assume that is your login and can try to use this info, as well as the default username of admin. If you do not modify either of these, your potential risk for being hacked goes up exponentially. It is important that you select an administrative username that is unique to you or your business and create a secure password.
Continue reading “Securing Your CMS Admin Login”
Reading Time: 6 minutesThis tutorial describes the process of setting up SSH Keys for use when logging in to a remote server via SSH.
II. How to Setup SSH Keys for Use with File Synchronization
Reading Time: 5 minutesThe most important thing you can do to protect your server against data loss is to take regular backups. Properly configured backups are a critical aspect to the maintenance of any website and can mean the difference between a quick recovery and rebuilding a site from scratch. If a critical file were to be deleted accidentally, a database became irreparably corrupted, or your site was infected with malware, would you be able to restore your data and get your site back up within a few minutes?
If you can’t answer “yes” to these questions, then it’s time to review your backup strategy.
Reading Time: 2 minutesIn order for one of our clients to start using the ‘one time secret’ tool within manage, you will need to login to the Manage portal to get started. Typically, passwords are not meant to be shared. Unfortunately, sometimes you will need to share a password or other sensitive data with the support admin you are working with. Regrettably, trying to pass along individuals character over the phone can be frustrating, annoying, and overly time consuming, and more so when a password is long and if the phone has a bad connection.
Reading Time: 2 minutes
Apache Main Configuration Files
On a CentOS server, the package manager used to install the Apache web server (such as rpm, yum, or dnf) will typically default to placing the main Apache configuration file in of one of the following locations on the server:
Reading Time: 6 minutes
The servers that run our applications, our businesses, all depend on the stability and underlying features offered by the operating system (or OS) installed. As administrators, we have to plan ahead and think to the future of how our users will use the machines we oversee while simultaneously ensuring that those machines remain stable and online. There are numerous operating systems to choose from; however one of the most popular, most stable, and highly supported OSes is CentOS. A combination of excellent features, rock-solid performance stability, and the backing of enterprise-focused institutions such as Red Hat and Fedora have led to CentOS becoming a mainstay OS that administrators can count on.