A Symlink Aka symbolic link is a virtual link pointing to a file in a directory. In shared Linux environment hard disk space in divided in several parts for different account. When proper security measures are not taken it...
If you have a dedicated server and use it to sell shared hosting then this article is for you. Today I am going to explain how you can force your users to use same php.ini under suPHP by disallowing...
Today everyone want their website to be implemented in dynamic programming language such as PHP, ASP, Etc that requires the use of MySQL databse to store user information ,passwords, senitive data. More the database entries, the bigger is your...
Now a days due to immense of hacking attempts, webmasters have to take extra security measures to protect their server from anonymous attacks. A hacker can get your password by brute forcing your account, by infecting your pc and...
HAProxy is a free, very fast and reliable solution offering high availability, load balancing, and proxying for TCP and HTTP-based applications. It is particularly suited for web sites crawling under very high loads while needing persistence or Layer7 processing....
There are millions of websites and everyday some or the other website gets online to mark a niche for them. There are all sorts of websites ranging from personal to business related and each of them has one motive...
BFD is a modular shell script for parsing application logs and checking for authentication failures. It does this using a rules system where application specific options are stored including regular expressions for each unique auth format. The regular expressions...
What is Mod_Security? ModSecurity is an embeddable web application firewall. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring and real-time analysis with no changes to existing infrastructure. It is an open source...
This article will help people securing their Linux web server. Its very essential to follow the steps below to protect your server from attacks and vulnerabilities. Follow the steps below to perform security task (OS Centos):- 1) Install a firewall to...
To start with I would first explain what is a DDoS attack. Denial of service (DoS) attacks are attacks that are deliberate attacks on your network properties to deny service to legitimate users. When these attacks seemingly come from distributed...