• Home » kb
  • When should you upgrade from Shared Hosting to VPS?

    Posted at March 30, 2017 at 10:41 pm by Jithin

    Do you have a shared hosting plan with us? When should you upgrade from shared hosting to a vps? Before we start, you should know the difference between a shared hosting plan and a vps plan.   Shared Hosting Plans These are our most affordable and budget friendly web hosting plans. Shared web hosting means multiple users share one physical server and it's resources. It is recommended for customers that don't receive a large amount of incoming traffic. Almost every tool and module requi   [...]

    Read More

    The WordPress shows this error "Sorry, this file type is not permitted for security reasons" when you try to upload files to your website through admin dashboard. The users are only allowed to upload certain file types to WordPress websites for security reasons. This is to prevent users from uploading executable files to their websites. WordPress allows users to upload only the following file types. If you try to upload any other file types then you get the error message "Sorry, this file type i   [...]

    Read More

    Installation, Configuration and Features of Wordfence Security

    Posted at January 5, 2017 at 4:27 pm by Jithin

    In this tutorial, we can learn about the installation, configuration, and features of WordPress Wordfence security. With a CMS, one can easily customize and design their websites without a deep level of technical knowledge. Many website owners trust WordPress because of its ease of use and secure behavior. However, there are chances that a WordPress blog can be taken down. The Wordfence Security is a WordPress plugin which can be downloaded from the official WordPress website, wordpress.org.    [...]

    Read More

    All about malware and shared hosting

    Posted at November 30, 2016 at 12:43 pm by John Quaglieri

    Malware infections have grown over the past few years. There are steps that can be taken to clean a site, and protect it from malware. * Causes of malware Generally speaking with in a shared hosting environment the most common cause of malware is out of date software with in the hosting account. For example, the most common is a theme or plugin with in a third party php script like wordpress which has security issues. The best way to ensure this doesn't happen is use plugins that are from th   [...]

    Read More

    How to Open a Port in CSF Firewall? ( cPanel )

    Posted at October 14, 2016 at 3:58 pm by Jithin

    What is a port A port is a process-specific or an application-specific software construct serving as a communication endpoint. It is used by the transport layer protocols of the Internet Protocols suite such as UDP and TCP. The term port is also used in the hardware devices. They are the physical setup of the systems to get connected with another hardware media. Here, we are going to see about the logical construct that identifies a specific process or network service. An IP address and a pro   [...]

    Read More

    Why Do WordPress Sites get Hacked and How to Prevent It?

    Posted at October 14, 2016 at 3:58 pm by Jithin

    In this documentation we can learn why do WordPress sites get hacked. For the normal individual, it can be difficult to comprehend why a programmer would even need to attempt to break into your little blog where you offer high quality cleanser. Am I right? There are three principle reasons. 1) They need to utilize it to convey spam email. 2) They need to access your information, mailing list, charge card data, and so on. 3) They need to access your website and cause it to download ma   [...]

    Read More

    About MCrypt

    Posted at September 22, 2016 at 5:30 pm by Jithin

    MCrypt is a Perl extension for MCrypt Crypto library. MCrypt is a file encryption method. It uses secure techniques to exchange data. MCrypt is used for some web apps such as Magento, the shopping cart software, php framework like Laravel. MCrypt is a replacement for the popular Unix crypt command. Crypt is a file encryption tool. MCrypt uses several algorithms such as: AES, DES, TripleDES, Blowfish (default), 3-WAY, SAFER-SK64, SAFER-SK128, TWOFISH, TEA, RC2, GOST, LOKI, SERPENT, MARS, CAST, an   [...]

    Read More

    Advantages and Limitations of CloudFlare

    Posted at September 8, 2016 at 6:25 pm by Jithin

    CloudFlare (cloudflare.com) is a commercial content delivery network with integrated distributed denial of service (DDoS) defense. As it acts as a reverse proxy and domain name server to your website, it can provide a useful IPv6 transition mechanism if your hosting provider doesn't provide native IPv6. Similarly, as with other opposite intermediaries. For example, Squid and Varnish, there are design issues with any server that spots itself in-line between the client and Apache. CloudFlare shoul   [...]

    Read More

    The most common wordpress compromises of 2015

    Posted at August 30, 2016 at 12:12 pm by Manoj Kumar

    2015 is coming to a close, and InterServer's Managed Wordpress Hosting has been protecting wordpress sites from all sorts of malware. Wordpress got hacked? InterServer can also clean your site during a migration during a site transfer. The most common 5 have been: 1) JSQuery Malware Most commonly added into the header.php file. This is hidden malware added to code under the header line usually. Get this and you'll likely see a malware warning page in your browser. Common code blocks loo   [...]

    Read More

    Understanding Mod_userdir

    Posted at August 4, 2016 at 5:09 pm by Jithin

    Mod_userdir permits getting to a client's landing page utilizing the provisional URL with the/~user/punctuation, similar to http://ipaddress/~user where "IP address" might be supplanted with the server's hostname or any space name that is made plans to the server you wish to check the substance on.   Having mod_userdir empowered stances extensive security dangers and weaknesses: 1) Usernames are uncovered - It is conceivable to get to various sites facilitated on the server by mea   [...]

    Read More

    APF Common Commands with Examples

    Posted at January 1, 2016 at 2:49 pm by Jithin

    In this documentation, we can check APF common commands with examples.   1) Stop APF. apf -f root@localhost [/usr/src/apf-9.7-2]# apf -f eth0: error fetching interface information: Device not found apf(9587): {glob} flushing & zeroing chain policies apf(9587): {glob} firewall offline root@localhost [/usr/src/apf-9.7-2]#   2) Start APF. apf -s root@localhost [/usr/src/apf-9.7-2]# apf -s apf(9773): {glob} activating firewall apf(9821): {glob} could   [...]

    Read More

    APF Installation and Configuration

    Posted at January 1, 2016 at 2:48 pm by Jithin

    In this documentation, we can check how to install APF  on your server and its configuration. Advanced Policy Firewall (APF) is use to secure servers and workstations connected to the network.   INSTALLATION 1) Go to the directory “/usr/src/”. root@localhost [~]# cd /usr/src/ root@localhost [/usr/src]#   2) Download the APF. wget http://www.rfxn.com/downloads/apf-current.tar.gz   3) Extract the APF tar file. tar xvzf apf-current.tar.gz   4) Go to A   [...]

    Read More

    Manage CSF from Command line

    Posted at December 15, 2015 at 7:02 pm by Jithin

    In this documentation, we can check CSF common commands and how to use these commands.   1) List all available options of csf. csf -h root@localhost [~]# csf -h csf: v8.08 (cPanel) csf(1)                                                                                                   csf(1) NAME csf - ConfigServer & Security Firewall SYNOPSIS csf [OPTIONS] DE   [...]

    Read More

    10 Steps to Enhance Drupal Security

    Posted at December 15, 2015 at 7:02 pm by Jithin

    Drupal is one of the most popular Content Management System (CMS). Like other content management systems, Drupal also offers timely security updates. Core Drupal seems to have very less chance of risk. Most of the times, if there is any serious vulnerability, it is due to the use of contributed modules. However in most cases we can't avoid the use of contributed modules or themes. So we need to learn how to add more security to our Drupal. In this tutorial we will show you some steps you can fol   [...]

    Read More

    Free Hacked WordPress Cleanup

    Posted at December 15, 2015 at 4:25 pm by Michael Lavrik

    Switch to InterServer Managed Web Hosting and we will fix your website for FREE during the migration. WordPress is still the best WordPress maybe the greatest blogging tool ever created, when its working correctly. Even the most successful webmasters are unable to fully understand the complexity behind fixing all issues that may come along with running WordPress. Free Hacked WordPress Cleanup is here! Running a WordPress website is easy when it is hosted at InterServer. We focus on any    [...]

    Read More

    The most common wordpress compromises of 2015

    Posted at December 9, 2015 at 2:26 pm by John Quaglieri

    3) Basic PHP Shell The basic is a new file created. It is not part of of a wordpress install and does not replace or edit valid wordpress code. Tips: Use clamav virus scanner and look for files that are not part of the wordpress install.

    How to Secure and Harden SSH?

    Posted at December 1, 2015 at 1:32 pm by Jithin

    Secure Shell is a command line interface to access remote Linux server. SSH is based on network protocol and can use to execute various command line operations and data transfer. SSH protocol can also be used to perform scp(Secure Copy) and sftp(Secure File Transfer). We can use both Windows and Unix based system to create SSH connection to remote system In this tutorial we will show you some steps to improve the security of SSH connection.   1: Disable Default Port. By defau   [...]

    Read More

    The Importance of Backing Up Your Website

    Posted at November 12, 2015 at 11:11 pm by InterServer Staff

    Small business websites often represent countless hours and thousands of dollars, if not tens of thousands of dollars, of design and development work. Once websites are launched, routine tasks often fall on SMB managers and owners. While you may enjoy updating the home page with a fresh ad campaign or publishing the occasion blog post, when was the last time you backed up your website? This is a frequently neglected area. Sure, you know how important it is to back up files on your computer, s   [...]

    Read More

    Nmap showing closed ports as opened

    Posted at October 23, 2015 at 8:28 am by InterServer Staff

    Nmap may show closed ports on your server as opened if you are scanning from a natted system or behind a firewall. For example:   1720/tcp open H.323/Q.931? 3128/tcp open squid-http? 8080/tcp open http-proxy?   The following open ports showed opened on a system but were not listening on the server itself. It turns out it was a proxy from the ISP and the ports showed open on any server.

    Read More