Troubleshooting SSH Permission Denied Error in cPanel

By | 2018-12-06T16:44:24+00:00 December 6th, 2018|

  Secure Shell(SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. SSH is using TCP/IP 22 port by default. You can change SSH port at any time as you wish.  Commonly we use SSH for remote administration via server command line as root or any other user. In some [...]

Steps to Install Dropbear SSH Server

By | 2017-03-04T00:26:57+00:00 March 4th, 2017|

Dropbear is a small SSH server using in Linux distributions. It is an open source software. Dropbear SSH completely runs with SSH version 2 protocol, it never supports SSH version 1. Dropbear is an advanced version of open SSH, it only uses low memory and processor resources.   Install Dropbear 1) We need to enable [...]

How to Install FTP on Ubuntu

By | 2018-08-17T01:49:18+00:00 February 27th, 2017|

In this tutorial we can learn how to install FTP on Ubuntu What is FTP FTP is a client server protocol that allows two communication channels between client and server. Using a FTP client we will be able to upload, download, and delete the files on the server. Initially, the client needs to authenticate the FTP [...]

How to change your default timezone using .htaccess in cPanel?

By | 2018-03-12T13:30:18+00:00 January 28th, 2017|

In this tutorial we can check how to change your default timezone using .htaccess in cPanel   1) Log in to your cPanel. 2) Click ‘File Manager’ icon from the ‘FILES’ category.   3) Select ‘Settings’ at the right corner of the ‘File Manager’.   4) Select Document root of your domain and select ‘Show Hidden [...]

How to setup SSH tunneling with foxy proxy and Putty?

By | 2018-07-26T07:15:56+00:00 October 14th, 2016|

Tunneling At the point when your program (or other customers) asks for a page (or anything off the Internet), it sends a request from your PC through a progression of routers, switches, firewalls, and servers claimed and observed by other individuals, organizations, and ISPs until it achieves its goal. Then takes after the same (or [...]

How to Generate an SSH Key on Windows using PuTTY?

By | 2018-08-15T12:20:05+00:00 October 14th, 2016|

You can generate an SSH key on Windows using the PuTTY SSH client. To generate a key with PuTTY, you should: 1) Download and start the puttygen.exe generator. 2) Under the "Parameters" menu select SSH2 DSA and press Generate.   3) Click the Generate button.   4) Randomly move your mouse in the area below [...]

Common Network Protocols and Their Ports

By | 2018-06-01T13:41:31+00:00 August 4th, 2016|

There are many protocols while establishing a connection in the internet. According to the type of connection need to be established, the protocols used varies. The protocols define the characteristics of the connection. Let’s see what a protocol is.   Network Protocol Simply, a protocol is a set of rules. A network protocol is a [...]

How to install and scan using Maldet

By | 2018-08-10T10:48:27+00:00 August 4th, 2016|

In this documentation, we can learn how to install maldet in Linux servers and its configuration. Linux Malware Detect (LMD) is a malware scanner for server under the GNU GPLv2 license. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for [...]

How to Secure and Harden SSH?

By | 2015-12-01T13:32:16+00:00 December 1st, 2015|

Secure Shell is a command line interface to access remote Linux server. SSH is based on network protocol and can use to execute various command line operations and data transfer. SSH protocol can also be used to perform scp(Secure Copy) and sftp(Secure File Transfer). We can use both Windows and Unix based system to create [...]