Enabling PHPmmdrop on shared hosting

By | 2018-05-03T19:19:25+00:00 March 28th, 2018|

PHPmmdrop reduces php permissions to further secure and lock down websites. This has been optimized and tested most for wordpress but can be activated on other software including moodle, joomla, drupal and magento.   PHPmmdrop can be enabled on a VPS with some of the same features as shared hosting. First, it is recommended to [...]

How to Restrict IP Addresses from Accessing WordPress Dashboard?

By | 2018-08-29T19:42:01+00:00 June 9th, 2017|

WordPress is the most popular CMS and the number of installations keeps growing. The popularity of WordPress makes it an easy target for hackers.. To avoid such issues, you can protect your WordPress dashboard by restricting certain IP addressesss. You can add the following code to your .htaccess file inside the wp-admin directory. order deny,allow [...]

Fix WordPress Error – Sorry, This File Type Is Not Permitted For Security Reasons

By | 2017-02-01T17:37:55+00:00 February 1st, 2017|

The WordPress shows this error "Sorry, this file type is not permitted for security reasons" when you try to upload files to your website through admin dashboard. The users are only allowed to upload certain file types to WordPress websites for security reasons. This is to prevent users from uploading executable files to their websites. [...]

Installation, Configuration and Features of Wordfence Security

By | 2018-08-28T18:59:15+00:00 January 5th, 2017|

In this tutorial, we can learn about the installation, configuration, and features of WordPress Wordfence security. With a CMS, one can easily customize and design their websites without a deep level of technical knowledge. Many website owners trust WordPress because of its ease of use and secure behavior. However, there are chances that a WordPress [...]

All about malware and shared hosting

By | 2016-11-30T12:43:31+00:00 November 30th, 2016|

Malware infections have grown over the past few years. There are steps that can be taken to clean a site, and protect it from malware. * Causes of malware Generally speaking with in a shared hosting environment the most common cause of malware is out of date software with in the hosting account. For example, [...]

How to Prevent an SQL Injection Attacks and Remote Code Execution

By | 2018-08-28T18:12:57+00:00 October 14th, 2016|

Network security is one of the major thing we need to focus on. While working on a network, we need to ensure the security of the network to keep the valuable data secure and prevent the intrusion attacks to our private circles. In this article, we are going to discuss two common network attacks and [...]

How to Open a Port in CSF Firewall? ( cPanel )

By | 2016-10-14T15:58:39+00:00 October 14th, 2016|

What is a port A port is a process-specific or an application-specific software construct serving as a communication endpoint. It is used by the transport layer protocols of the Internet Protocols suite such as UDP and TCP. The term port is also used in the hardware devices. They are the physical setup of the systems [...]

Why Do WordPress Sites get Hacked and How to Prevent It?

By | 2016-10-14T15:58:25+00:00 October 14th, 2016|

In this documentation we can learn why do WordPress sites get hacked. For the normal individual, it can be difficult to comprehend why a programmer would even need to attempt to break into your little blog where you offer high quality cleanser. Am I right? There are three principle reasons. 1) They need to utilize [...]

About MCrypt

By | 2018-08-28T17:32:20+00:00 September 22nd, 2016|

MCrypt is a Perl extension for MCrypt Crypto library. MCrypt is a file encryption method. It uses secure techniques to exchange data. MCrypt is used for some web apps such as Magento, the shopping cart software, php framework like Laravel. MCrypt is a replacement for the popular Unix crypt command. Crypt is a file encryption [...]

Advantages and Limitations of CloudFlare

By | 2016-09-08T18:25:33+00:00 September 8th, 2016|

CloudFlare (cloudflare.com) is a commercial content delivery network with integrated distributed denial of service (DDoS) defense. As it acts as a reverse proxy and domain name server to your website, it can provide a useful IPv6 transition mechanism if your hosting provider doesn't provide native IPv6. Similarly, as with other opposite intermediaries. For example, Squid [...]

Load More Posts