The quickest way to find brute force attackers on a server using Netstat
Step 1. Identify the bastard: netstat -an | grep ‘:443’ | grep ESTABLISHED | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq
Step 1. Identify the bastard: netstat -an | grep ‘:443’ | grep ESTABLISHED | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq
cPanel bodyhas_mismatch Emails from StandardBank.co.za to a cPanel hosted server fails with bodyhash_mismatch – DKIM issues Email from standardbank.co.za might fail with bodyhash_mismatch. Since it’s
Here are the steps to password protect an NGINX website: 1. Logon to the server You need SSH to solve this problem. 2. Create a
Background Whilst observing a WHM/cPanel’s log file using tail -f /var/log/messages you might observe 1000s of events, sometimes every few seconds, similar to the following:
Problem Description Upon starting FirewallD you might encounter the error listed hereunder. This particular behavior was observed on a new installation of Virtualmin/Webmin. Sep 19
If you’re hosting a Linux box with Google Cloud Engine, SSH will be disabled by default. There are pretty good reasons for this, especially brute
About CORS Cross-origin resource sharing is a way to share libraries and fonts across multiple servers. However, in order to avoid security issues, many servers
About Fail2ban blocking 404s for Apache websites These days hackers scan your website for any known vulnerability. For example, they might run scripts that track
About Fail2ban IP blocking Fail2ban is fantastic Linux security software that blocks multiple authentication failures on a Linux host. The beauty of this software is
There are numerous services on the internet that allows one to generate a secure and strong password. Most Password Managers have the option to generate