OpenSSL is a free and open-source software cryptography library that provides cryptographic functionality to applications to ensure secure internet communication. It is widely used on many server applications, and it is available for most Unix-like operating systems (including Solaris, Linux, Mac OS X, the four open-source BSD operating systems), OpenVMS and Microsoft Windows.
When reviewing your servers security, it is critical for businesses to ensure that while building new sections of your website, that we do not leave it unsecured or visible to users while it is being built. With this in mind, there are several ways for you to “lock” a folder or domain while it is being developed. This will safeguard a folder or an entire site using the security feature built into IIS and Plesk called password protection. In today’s article we will see how easy it is to restrict access to a site or a folder.
In this article, we will denote the security best practices for 2020 and beyond. Because security is such a challenging subject for many, it often goes unheeded, and as such, many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.
Reading Time: 2minutesIn order for one of our clients to start using the ‘one time secret’ tool within manage, you will need to login to the Manage portal to get started. Typically, passwords are not meant to be shared. Unfortunately, sometimes you will need to share a password or other sensitive data with the support admin you are working with. Regrettably, trying to pass along individuals character over the phone can be frustrating, annoying, and overly time consuming, and more so when a password is long and if the phone has a bad connection.
Here are the top ten password security standards and specification for 2019. Use these tips to increase your overall security and remember, your server is only as secure as your weakest password or point of authentication.
Follow these top 10 best practices for 2019 to better protect all of your information.
Reading Time: 4minutesThank you for taking the time to review this important information. You will find this guide broken down into six major sections that coincide with Ubuntu’s security policy guide. The major topics we talk on throughout these articles are as follows:
Reading Time: < 1minuteWhether its a hacked site or a lost password, you may find that you are locked out of your WordPress Admin control panel. If you’ve forgotten your password or don’t have access to the email address that the “Lost your password?” link sends to, you still have one more option to access it. Through the database! WordPress’ database stores all WordPress username, encrypted passwords, and the user’s email address and thus can be edited through a database client like phpMyAdmin. In this tutorial, we’ll be showing you how to edit the email address and change your user’s password.
Reading Time: 4minutesManaging who has access to your server, and what type of access that person is an important part of server administration. This article will address multiple areas relating to user accounts on the Windows operating system. It assumes your Windows Server is on a “Workstation” and not a part of an Active Directory domain. The process for resetting an Active Directory user account is different and out of scope for this article.Continue reading “Windows User Account Management”→