Home / Security (page 4)

Security

Self-Signed SSL Certificates

SSL allows you to serve encrypted web pages to website visitors over the HTTPS protocol. Certificates must be signed in order to not set off browser flags that will question your site’s authenticity. But OpenSSL also provides the option to create a self-signed certificate, and many web hosting control panels …

Read More »

What You Should Know About SSL Certificates

SSL certificates allow website owners to provide something like a badge of authenticity to their users. In theory a website with a valid certificate should be trustworthy and secure. By default, web browsers will recognize a number of certificate authorities, companies that sell annual certificates and verify them. Depending on …

Read More »

Chinese hackers implicated in CMS hack attack

According to reports, Chinese hackers have infiltrated a number of WordPress and Joomla sites hosted by Go Daddy. The sites are still under attack today as the cyber criminals exploit vulnerabilities in outdated scripts. The hackers are uploading malware to the sites, which visitors to the sites have been prompted …

Read More »

How to create an SSH key

An SSH key is a secure encrypted code that allows you to connect to a server without having to type the password in plain text. To setup a key, follow these instructions: 1. First you need to connect to an SSH host on each machine (this will create the .ssh …

Read More »

Protecting Your Whois Information

If you run a company and have your domain registered under the name of that company, having your Whois information public might actually do your business some good. If something ever goes wrong with your website, Internet-savvy customers will still know how to contact you. But if you are an …

Read More »

Is a router firewall enough to protect my server?

Many web hosting providers and dedicated server data centers will provide router-level firewalls for their customers, mainly as a precaution to protect their infrastructure. A bot, virus, or other form of malware that gets into a single network can spread from server-to-server very quickly. On some home networks, a router …

Read More »

Testing your Firewall

Just because you spent the better part of a day hammering down the security bolts on your ironclad server, it does not mean your server is secure. Being human, you could have overlooked something small but potentially devastating. The only real way to test the effectiveness of any security measure …

Read More »

How to change the Postfix port number

By default, Postfix, Sendmail, and other SMTP mail servers rely on port 25 to send email. Normally, this is fine and works for most situations. Some Internet Service Providers, however, disagree. They see port 25 as a prime port for spammer exploitation, and many have started to block it. If …

Read More »

How do I enable SSL/TLS in Dovecot mail server?

Dovecot is a popular POP3/IMAP server for Unix-like operating systems. It is available through most distributions, including RHEL, CentOS, and Fedora. To enable secure mail transactions, you will need to edit your /etc/dovecot.conf file as root. Uncomment the following lines: # Disable SSL/TLS support? ssl_disable = no # PEM encoded …

Read More »

How to handle known spammers

When you are faced with relentless spamming, it is a good idea to use tools that go beyond simple filtering. One way to stop SPAM is to develop some type of proxy that stops known spammers before the messages reach the mail server. Another is to rely on DNS black …

Read More »
Powered by Namesco
© Copyright InternetBlog.Org.Uk 2022, All Rights Reserved