What is Hotlink Protection?

0

Many time we face excessive bandwidth usage  issue because of illegal access or someone embeds content from your site in another site, to stop such issue, we […]

Enable SSH protocol 2

0

The SSH Protocol one configured systems are facing the automated “root kits” attacks. The reason to use the SSH Protocol 2 on the dedicated web […]

Disable Telnet service

0

To secure the server its always preferable to disable the telnet service. To disable the Telnet login in to the server as a root user […]

DDOS attack solution part 4

2

In the “DDOS attack solution part 3” we have installed the csf firewall to stop the DDOS but still receiving the heavy DDOS attack in that case, simply […]

1 5 6 7 8 9 22