How to reset VestaCP admin password?

Posted at March 30, 2017 at 10:42 pm by Jithin

In this tutorial, we can discuss how to reset VestaCP admin password. Here we are sharing three useful methods to reset your VestaCP admin password.   Method1 1) Login to your VestaCP account with username admin and current admin password. You can access VestaCP using the url >> 2) Click on the ‘admin’ tab on the top right corner of the page.   3) A new window will be open and here you can enter the new password you want to set.   [...]

Read More

Steps to Install Dropbear SSH Server

Posted at March 4, 2017 at 12:26 am by Jithin

Dropbear is a small SSH server using in Linux distributions. It is an open source software. Dropbear SSH completely runs with SSH version 2 protocol, it never supports SSH version 1. Dropbear is an advanced version of open SSH, it only uses low memory and processor resources.   Install Dropbear 1) We need to enable Dropbear repo on the server to install Dropbear. $ wget $ rpm -Uvh http://ftp-stud.hs-essl   [...]

Read More

How to Install FTP on Ubuntu

Posted at February 27, 2017 at 6:43 pm by Jithin

In this tutorial we can learn how to install FTP on Ubuntu What is FTP FTP is a client server protocol that allows two communication channels between client and server. Using a FTP client we will be able to upload, download, and delete the files on the server. Initially, the client needs to authenticate the FTP server. The FTP session will work on both passive and active modes. Active is the default mode for FTP. In active mode connection, when the client starts to make the initial connec   [...]

Read More

How to Configure Secure Updates and Installations in WordPress

Posted at January 28, 2017 at 11:39 am by Jithin

WordPress is the most popular Content Management System used today. It is very simple, powerful and easy to manage. WordPress provides a wide range of plugins and most of them are free to use. You must install LAMP stack and WordPress before proceeding. You need to login as root or as a privileged user to perform these steps. Please note that you need to replace "wp-user" with your WordPress user and www-data with your Apache web user.   Set Up Secure Updates with SSH Create a user cal   [...]

Read More

How to change your default timezone using .htaccess in cPanel?

Posted at January 28, 2017 at 11:34 am by Jithin

In this tutorial we can check how to change your default timezone using .htaccess in cPanel   1) Log in to your cPanel. 2) Click ‘File Manager’ icon from the ‘FILES’ category.   3) Select ‘Settings’ at the right corner of the ‘File Manager’.   4) Select Document root of your domain and select ‘Show Hidden Files’ from the bottom of the screen.   5) Find ‘.htaccess’ and right click on it. It shows a menu. Click ‘   [...]

Read More

How to setup SSH tunneling with foxy proxy and Putty?

Posted at October 14, 2016 at 3:57 pm by Jithin

Tunneling At the point when your program (or other customer) asks for a page (or anything off the Internet) it sends a request from your PC through a progression of routers, switches, firewalls, and servers claimed and observed by other individuals, organizations, and ISPs until it achieves its goal. Then takes after the same (or comparable) way back to your machine with the cat pictures you requested. Tunneling sidesteps a portion of the guidelines that these organizations or ISPs might u   [...]

Read More

How to Generate an SSH Key on Windows using PuTTY?

Posted at October 14, 2016 at 3:56 pm by Jithin

You can generate an SSH key on Windows using the PuTTY SSH client. To generate a key with PuTTY, you should: 1) Download and start the puttygen.exe generator. 2) Under the "Parameters" menu select SSH2 DSA and press Generate.   3) Click the Generate button.   4) Randomly move your mouse in the area below the progress bar. When the progress bar is full, PuTTYgen generates your key pair.   5) Type a passphrase in the Key passphrase field. Type    [...]

Read More

Basic shell commands in Linux ( For Linux Beginners )

Posted at August 22, 2016 at 11:08 am by Jithin

A shell is a user interface that provides access to an operating system. It is a program that takes your commands you type from the keyboard and gives them the operating system to perform the required task. After the task is completed it displays the output.  A shell is an environment in which we can run our commands. A program called 'bash' acts as the shell program in most Linux systems. The prompt, $, which is called command prompt, is issued by the shell. While the prompt is displayed, y   [...]

Read More

Disable direct root login and create dedicated SSH user

Posted at August 22, 2016 at 10:33 am by Jithin

It is very important to secure your Linux server to protect your data, intellectual property, and time from the hands of crackers (hackers). Everybody says that Linux server is secure by default and to some extent this is true. Linux has in-built security model by default. We need to tune it up and customize as per our need which may help to make the system more secure. Linux is harder to manage, but it offers more flexibility and configuration options. Securing a server from the hands of hacker   [...]

Read More

Common Network Protocols and Their Ports

Posted at August 4, 2016 at 5:00 pm by Jithin

There are many protocols while establishing a connection in the internet. According to the type of connection need to be established, the protocols used varies. The protocols define the characteristics of the connection. Let’s see what a protocol is.   Network Protocol Simply, a protocol is a set of rules. A network protocol is a set of rules followed by the network. Network protocols are formal standards and policies made up of rules, procedures and formats that defines communicatio   [...]

Read More

How to install and scan using Maldet

Posted at August 4, 2016 at 4:44 pm by Jithin

In this documentation, we can learn how to install maldet in Linux servers and its configuration. Linux Malware Detect (LMD) is a malware scanner for server under the GNU GPLv2 license. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for detection. Using maldet in Linux server malware tool, it can simply find-out the infected files from the Linux file system and we can remove the file to a differ   [...]

Read More

How to Secure and Harden SSH?

Posted at December 1, 2015 at 1:32 pm by Jithin

Secure Shell is a command line interface to access remote Linux server. SSH is based on network protocol and can use to execute various command line operations and data transfer. SSH protocol can also be used to perform scp(Secure Copy) and sftp(Secure File Transfer). We can use both Windows and Unix based system to create SSH connection to remote system In this tutorial we will show you some steps to improve the security of SSH connection.   1: Disable Default Port. By defau   [...]

Read More