25th Anniversary Savings | 25% Off Dedicated Servers*Shop Now
25th Anniversary Savings | 25% Off VPS Hosting* †††Shop Now
Limited Inventory: High-Performance AMD-Powered Servers Now Available.* Shop Now >

Tag: Kernel

Check out our Kernel section, here you'll find tutorials in updating, securing and any known vulnerabilities to many popular distributions.

Reading Time: 6 minutes

Our last article on Ubuntu security suggestions touched on the importance of passwords, user roles, console security, and firewalls. We continue with our last article and while the recommendations below are not unique to Ubuntu specifically (nearly all discussed are considered best practice for any Linux VPS server or dedicated server) but they should be an important consideration in securing your server.

Continue reading →
Reading Time: 2 minutes

One of the most important things you can do to ensure the security and stability of your Linux dedicated server is to keep the kernel updated. Some Kernel updates patch security vulnerabilities and other issues. Kernel patches are released as issues are discovered.

Continue reading →
Reading Time: 2 minutes

Tux the Penguin with Hotpatching (KernelCare)The concept of ‘Kernel hotpatching’, sometimes called live patching, was introduced to the Linux community around 2008. Soon after groups began developing differing implementations of the concept. KernelCare, one of the more popular implementations, was originally released in March 2014 by Cloud Linux, Inc.

Continue reading →
Reading Time: < 1 minute

A vulnerability found in the glibc library, specifically a flaw affecting the gethostbyname() and gethostbyname2() function calls, that allows a remote attacker to potentially execute arbitrary code. CentOS 5, CentOS 6, and CentOS 7 are potentially affected, thus we want to highlight the following information.

Continue reading →
Reading Time: < 1 minute

A vulnerability found in the Linux kernel, specifically a flaw in fault handling associated with the Stack Segment (SS), allows an unprivileged user to potentially gain privileges. CentOS 4, CentOS 5, CentOS 6, and CentOS 7 are potentially affected, thus we want to highlight the following information.

Continue reading →
Reading Time: 2 minutes
It is highly recommended that you take an image of your existing server before following these instructions. Doing so will ensure that if something unexpected occurs, you will be able to restore your server from the backup image.

For instructions on creating a backup image from the Manage interface please visit:

Continue reading →
Reading Time: 2 minutes
It is highly recommended that you take an image of your existing server prior to following these instructions. Doing so will ensure that if something unexpected occurs, you will be able to restore your server from the backup image.

For instructions on creating a backup image from the Manage interface please visit:

Continue reading →

Upgrade from Ubuntu 10.04 To 12.04

Posted on by J. Mays | Updated:
Reading Time: 4 minutes

It is highly recommended that you take an image of your existing server prior to following these instructions. Doing so will ensure that if something unexpected occurs, you will be able to restore your server from the backup image.

Continue reading →
Reading Time: < 1 minute

Updating the kernel on Red Hat Linux or CentOS Linux is a very simple process. Most commonly you will use the following command in the case of a security vulnerability, or perhaps just to verify that you’re running the most up-to-date kernel:

Continue reading →
Reading Time: < 1 minute

A vulnerability found in the Linux kernel, specifically a flaw with the pseudo tty (pty) device, allows an unprivileged user to cause a denial of service (system crash) or potentially gain administrator privileges. A small number of CentOS and Ubuntu versions are vulnerable, thus we want to highlight the following information:

Continue reading →
Newer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434