Two Factor Authentication is a super effective and easy to setup security measure. This cPanel feature provides an additional layer of security by requiring a code authentication upon a successful login attempt. So, after logging into WHM with the correct username and password, you would be prompted to input a code generated by an authentication application like Google Authenticator. In this blog post, we will help you activate Two-Factor Authentication and explain the benefits of using it.
The initial process begins in your Web Host Manager (WHM). Read More
Without a GUI, servers must be configured and operated through SSH, which requires extensive knowledge of command line syntax. Control panels provide a centralized and intuitive way to manage your servers.
InterServer’s customized control panel is designed for maximum usability and cost savings. While competitors often charge additional fees for control panel access, Bread Basket allows users to easily deploy hundreds of cloud applications at no extra cost. Read More
You may have become familiar with our InterShield blog posts. It has become a special security series of ours which serves of high importance to us and Web Hosting our customers. Due to its ongoing success and popularity, we have decided to describe the step by step process of which InterShield follows.
A request to access a website comes in, someone has entered http://domain.com into a browser.
Using litespeed web-server and the RBL rule, Interserver InterShield queries our own internal RBL blacklist. This blacklist contains known bad ips; ips that have been blocked for bad activity, hacking, uploading malware and a number of other activities. Read More
InterServer’s InterShield system is able to stop many attacks and updates daily based on new data including new possible malware, known exploits and other Common Vulnerabilities. However, sometimes even with all these a new type of malware comes up.
In a recent case a site was redirecting to a pharmacy website but only when coming from a google search engine result. The site initially passed all scans of known vulnerabilities, the url did not exist in the code or database and it was reproducible. In this cases advanced debugging is needed. Read More
The month of February brought yet another scare to the hosting world. A WordPress vulnerability was exposed which allowed hackers to initiate what is known as a denial of service (DoS) attack on ones website. Ultimately, under a DoS attack, your website becomes unreachable by anyone including you. The technical understanding of performing the DoS attack is rather simple.The flaw begins under the well-known “/wp-admin” directory. Every WordPress site is assigned this path as an administrative source. It was discovered that while loading this path there exists a script which fetches a number of JS/CSS files. Read More
You may have heard of terms like Meltdown and Spectre in recent tech news. Both exhibit a hardware vulnerability exposed by a small team in Austria. Through software, both are able to access private data on a server, but how is this possible? The vulnerability begins at the most inner core of a computer, the Central Processing Unit (CPU). By observing micro processes and transactions, these programs were able to access other parts of the computer that may not be relevant to the actual programs running. Read More
In recent news, you may have noticed the subject popularity on Bitcoin. The following questions may come up,
We will help you get a clear picture of the internet currency without getting into the nitty gritty details that may confuse most people.
Firstly, Bitcoin is an internet currency or better known as, a cryptocurrency. It offers a way to make transactions without the common use of the U.S Read More
Magento 2 is a complex and highly configurable eCommerce platform. It supports endless level of customization. It lets you create a website with almost any functionality you can think of.
The price you pay for such a flexible eCommerce solution is performance. Magento 2 (M2) might be quite slow. I am sure you have seen people on the web searching for ways to speed it up.
I am going to share with you my 5 easy steps to fix a slow M2 site. You don’t need to have programming skills to implement them. Read More
Posted at November 17, 2017 at 8:17 pm by Stacey Talieres
BlogVault is a backup & security service that allows for daily and real-time automatic backups. It also provides malware scanning and one-click malware removal. BlogVault continues to deliver for customers with their extended features which offer Dedicated staging, Auto Restore, Test Restore and Migration; four very critical features that perform efficiently and heroically. To seal the deal, BlogVault designed Migrate Guru, a host-agnostic WordPress migration plugin! Here’s how it works.
InterServer recognizes BlogVaults’ extremely valuable usage in the WebHosting industry. Read More