CloudFlare: cPanel plugin Installation Guide

Posted at February 27, 2017 at 6:42 pm by Jithin

In this tutorial we can check how to install CloudFlare cPanel Plugin. CloudFlare is a commercial content delivery network which has integrated distributed denial of service(DDoS) defense mechanism. CloudFlare increases performance and security. A website that utilizes CloudFlare loads twice as fast than others. In this documentation, we are going to address how to install this plugin in cPanel and configure it.   CloudFlare Installation Instructions Before we proceed to install Cl   [...]

Read More

DDOS Prevention Settings in CSF firewall

Posted at December 13, 2016 at 11:30 am by Jithin

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are common threats that every publicly accessible web server faces. PORTFLOOD and SYNFLOOD are the two directives in CSF firewall to prevent DDOS. SYNFLOOD is disabled by default, but if you are expecting an attack you should enable it and set the rules. Follow the instructions below in order to utilize SYNFLOOD properly.   1)  Login to your WHM interface. 2) Select Plugins (Home >> Plugins). &nb   [...]

Read More

Installing and Configuring Linux DDOS Deflate

Posted at September 22, 2016 at 6:43 pm by Jithin

DDOS (Distributed Denial of Service) is a type of DOS (Denial of Service) attack in which an online service is made unavailable to its intended users. This is a frequently encountered attack due to availability of various tools online that are made to target a wide variety of important resources.  These tools are easy to use and are freely available on the internet in a simple google search. These tools make UDP, TCP or HTTP requests to the victim server.   Types of DDOS attacks:     [...]

Read More

How to Troubleshoot a DDoS Attack?

Posted at September 8, 2016 at 6:28 pm by Jithin

What is a DDoS attack? DDoS stands for Distributed Denial of Service. It is a variant of the infamous DoS attack. A DoS attack is a type of attack that the attackers stops the service so that the legitimate users also cannot access the service.The attack will be from a single computer system. This is achieved by sending excessive connection requests to a web server. Every server will have a limit on number of requests that can be handled at a time. When the number of requests exceeds this li   [...]

Read More