Servidores

htaccess blocking recipes

Block by IP address You might have one particular IP address, or multiple IP addresses that are causing a problem on your website. In this event, you can simply outright block these problematic IP addresses from accessing your site.     Block a single IP address If you just need to block a single IP …

htaccess blocking recipes Read More »

6G Firewall

The 6G Firewall is a powerful, well-optimized blacklist that checks all URI requests against a set of carefully constructed .htaccess directives. This happens quietly behind the scenes at the server level, which is optimal for performance and resource conservation. Most WordPress plugins require both PHP and MySQL, which can be overkill and even wasteful depending on the scenario and your …

6G Firewall Read More »

Chuletas: Common Linux Shell Commands

Common Linux Shell Commands ls : list files/directories in a directory, comparable to dir in windows/dos. ls -al : shows all files (including ones that start with a period), directories, and details attributes for each file. cd : change directory ·· cd /usr/local/apache : go to /usr/local/apache/ directory cd ~ : go to your home directory cd – : go …

Chuletas: Common Linux Shell Commands Read More »

Fed up of bad bots?

Bad bots, ie robots and spiders that index your site in an aggressive mannger with little benefit to yourself, can easily cause problems with bandwidth. To ban the bots, you have a few options. ROBOTS.TXT Good bots should obey robots.txt, but bad bots usually don’t so whilst it’s good practice to use this file, it …

Fed up of bad bots? Read More »

poodle

How To Protect your Server Against the POODLE SSLv3 Vulnerability

On October 14th, 2014, a vulnerability in version 3 of the SSL encryption protocol was disclosed. This vulnerability, dubbed POODLE (Padding Oracle On Downgraded Legacy Encryption), allows an attacker to read information encrypted with this version of the protocol in plain text using a man-in-the-middle attack. Although SSLv3 is an older version of the protocol …

How To Protect your Server Against the POODLE SSLv3 Vulnerability Read More »

Linux folder structure

Linux uses a nested folder structure to store different files. The top-level directory is considered the root directory, and is designated by /. Folders beneath the root level are separated by slashes. For example, all of your website content is located in/home/00000/domains/example.com/. TIP: On the (gs) Grid-Service, you can’t do anything above your server directory. For …

Linux folder structure Read More »

Find email account password in Plesk

Find email account password in Plesk By Raj on March 7, 2012 If you want to find the password for  email account’s  in plesk then there are 3 ways to get the email account’s password ::   1>   To find password for a single email  account   root@server[#] /usr/local/psa/bin/mail –info info@domain.com 2> To find all email account …

Find email account password in Plesk Read More »

Be Paranoid!

As a Certified Ethical Hacker, I searched for a script which would help me to detect unauthorized file changes. I found a script (probably in the User Contributed Notes at php.net) which I modified to have working very nicely on my “test server” (Windows) as well as on my “production” server (Linux). The logic is …

Be Paranoid! Read More »