Tag: Security
Enhance the security of your server by reading through our easy to follow tutorials. From installing firewalls to auto-renewing SSLs, our expansive library is sure to be your bookmark favorite.
Reminder: Fedora 20 Now End-of-Life (EOL)
Three versions of the Fedora OS are always kept active, at any given time, by The Fedora Project. These would be: 1. the current release, 2. the release before the current release, and 3. a new release that is in development. Last month saw the launch of Fedora 22 and Fedora 23 is in development, thus the time of Fedora 20 is over.
Pre-Flight Check
- These instructions are intended specifically for enabling and starting firewalld on Fedora 22.
- I’ll be working from a Liquid Web Self Managed Fedora 22 server, and I’ll be logged in as root.
Pre-Flight Check
- These instructions are intended specifically for stopping and disabling firewalld on Fedora 22.
- I’ll be working from a Liquid Web Self Managed Fedora 22 server, and I’ll be logged in as root.
Pre-Flight Check
- These instructions are intended for finding (viewing) the default zone in Firewalld on CentOS 7 via the command line.
- I’ll be working from a Liquid Web Core Managed CentOS 7 server, and I’ll be logged in as root.
Pre-Flight Check
- These instructions are intended for finding (viewing) active zones in Firewalld on CentOS 7 via the command line.
- I’ll be working from a Liquid Web Core Managed CentOS 7 server, and I’ll be logged in as root.
How to Securely Transfer Files via rsync and SSH on Linux
Pre-Flight Check
- These instructions are intended specifically for transferring files between servers via rsync and SSH on Linux.
- I’ll be working from a Liquid Web Core Managed CentOS 7 server, and I’ll be logged in as root.
How to Enable Two-factor Authentication (2FA)
Pre-Flight Check
- These instructions are intended specifically for enabling two-factor authentication for Manage users.
What is Two-factor Authentication (2FA)?
Two-factor authentication (also known as 2FA) means that instead of just a password (one factor), you will need two factors (password, plus a rotating authentication token) to login to your Manage account. Only the correct combination of the first and second factors will allow you to log in. Two-factor authentication is more secure than one-factor authentication.
Information on CVE-2015-3456 QEMU Vulnerability (VENOM)
VENOM, or Virtualized Environment Neglected Operations Manipulation, was made public on May 13, 2015. The vulnerability is in QEMU, a generic and open source machine emulator and virtualizer that is utilized by Xen, KVM, and other modern hypervisors / virtualization platforms.
How to Remove Cross-site Scripting Risk
The popular WordPress plugin WP Super Cache has been found to have a cross-site scripting (XSS) vulnerability in versions prior to 1.4.4. On sites with outdated versions, it is possible for an attacker to take complete control of the WordPress site. Please note: this vulnerability only affects users which have installed WP Super Cache. However, if you are unsure if you use the plugin or not you should still take precautions to protect your site.
How to Update a WordPress Plugin
Step 1: Login to WordPress as Administrator
Hopefully, you’re already well-versed in logging into your WordPress site as an administrator!
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.