#what is modsecurity in cpanel
Explore tagged Tumblr posts
hostitsmartcanada · 1 year ago
Text
Learn about ModSecurity and its essentials, implementation, and why it's crucial for web security with our comprehensive guide.
0 notes
cloudministertechnologies2 · 2 months ago
Text
Unlock Powerful Hosting with cPanel Server Management by CloudMinister Technologies
In a digital environment where speed, security, and uptime determine the success of websites and online platforms, effective server management is critical. cPanel Server Management provides a robust foundation for web hosting, but it's the experience and expertise of a professional team that elevates server performance to enterprise-grade reliability.
This is where CloudMinister Technologies steps in—a company known for its dedicated focus on Linux server management, particularly for environments using cPanel and WHM (Web Host Manager). Let’s explore how CloudMinister helps organizations gain maximum value from their cPanel servers.
What is cPanel Server Management?
cPanel is a web hosting control panel that provides a graphical user interface (GUI) and automation tools designed to simplify the process of hosting a website. It allows users to manage files, databases, email accounts, domains, backups, and more—all from a central dashboard.
cPanel Server Management, however, goes far beyond what the software provides out of the box. It involves the continuous monitoring, configuration, optimization, securing, and troubleshooting of servers running cPanel. This ensures the hosting environment remains stable, secure, and high-performing at all times.
About CloudMinister Technologies
CloudMinister Technologies is an India-based IT services company specializing in server management, hosting solutions, and cloud infrastructure. With deep expertise in Linux environments, their team provides managed cPanel services to businesses of all sizes, ranging from solo web developers to enterprise-level organizations.
CloudMinister is recognized for combining technical excellence with responsive customer support, making it a preferred partner for businesses seeking reliable server management.
Key Features of CloudMinister’s cPanel Server Management Services
1. Advanced Security Implementation
Security is a top concern for any server exposed to the internet.CloudMinister applies multiple layers of protection to prevent unauthorized access, malware infections, and denial-of-service attacks.
Their security setup typically includes:
Configuring firewalls like CSF (ConfigServer Security & Firewall)
Installing and tuning ModSecurity (a web application firewall)
Enabling brute-force attack detection via tools like cPHulk
Scanning the server regularly for malware or rootkits
Disabling unused ports and services
Keeping software and kernel versions up to date with patches
This approach significantly reduces vulnerability and helps maintain compliance with security best practices.
2. Server Optimization and Speed Tuning
Out-of-the-box server configurations often aren't optimized for specific workloads or traffic levels. CloudMinister evaluates your server environment and implements performance enhancements tailored to your needs.
This may include:
Tuning Apache, NGINX, or LiteSpeed web servers for faster content delivery
Adjusting MySQL settings for better database response times
Implementing caching mechanisms like Memcached, Redis, or OPcache
Managing PHP versions and optimizing handlers like PHP-FPM
Monitoring resource consumption and load balancing, where necessary
These efforts ensure faster website load times, improved user experience, and better search engine performance.
3. Continuous Monitoring and Alerts
Downtime and service interruptions can affect user trust and business revenue. CloudMinister deploys monitoring tools that check the health of your server and its key services 24/7.
Their monitoring system tracks:
Server uptime and load averages
Web and database service availability
Disk usage and memory consumption
Suspicious activity or spikes in traffic
If any issue is detected, alerts are automatically generated, and their support team takes immediate action, often resolving problems before clients are even aware of them.
4. Automated and Manual Backups
Reliable data backup strategies are essential for disaster recovery and business continuity. CloudMinister sets up both automated and manual backups to safeguard your critical data.
Backup services include:
Daily, weekly, or monthly automated backups to local or remote locations
Snapshot-based backups for entire file systems or virtual machines
Backup integrity checks to confirm recoverability
Disaster recovery support for fast data restoration in case of failure
Clients can request custom backup schedules based on their operational needs.
5. 24/7 Technical Support
CloudMinister offers round-the-clock technical support, including holidays and weekends. Whether the issue is routine or critical, their support team responds promptly to resolve it.
Support includes:
Assistance with DNS, email, FTP, and database issues
Troubleshooting site errors, load problems, and misconfigurations
Help with third-party application installation or integration
Guidance on cPanel and WHM usage for non-technical users
Their support system is designed for fast response and resolution, helping minimize downtime and stress for business owners.
6. Software Installation and Upgrades
In many cases, users need to add new tools or features to their servers. CloudMinister handles software installations, compatibility checks, and upgrades as part of its managed service offerings.
Common installations include:
Content management systems like WordPress, Joomla, and Drupal
E-commerce platforms such as Magento or PrestaShop
Server-side enhancements like ImageMagick, FFmpeg, or GIT
Secure protocol support, including Let’s Encrypt SSL and SSH hardening
Upgrading PHP, MySQL, cPanel, or the operating system when necessary
Each installation is tested to ensure compatibility and optimal performance.
Who Benefits from CloudMinister’s cPanel Server Management?
CloudMinister’s services are suitable for a wide range of users and industries:
Web Hosting Providers benefit from white-label server management and reduced support workload.
Digital Agencies can offer hosting to clients without hiring in-house server administrators.
E-commerce companies enjoy improved performance and secure transactions during peak times.
Startups and Developers get technical expertise without the need for full-time staff.
Large Enterprises can ensure compliance, uptime, and scalable infrastructure with proactive support.
Why Choose CloudMinister Technologies?
The advantages of working with CloudMinister Technologies include:
Certified Expertise: Their team consists of Linux and cPanel-certified professionals with years of experience.
Cost Efficiency: Competitive pricing makes enterprise-grade support accessible to small businesses.
Scalability: Their solutions grow with your business, from shared servers to dedicated infrastructure.
Client-Centric Approach: Support plans are tailored to your actual needs—nothing more, nothing less.
Transparent Reporting: Regular performance and security reports give you insight and peace of mind.
Conclusion
Managing a cPanel server is more than just setting up hosting—it’s about ensuring consistent performance, hardened security, regular updates, and quick support when issues arise. With CloudMinister Technologies, your server is not just managed—it’s optimized, protected, and monitored by experts.
If you're looking for a trusted partner to handle your cPanel Server Management, CloudMinister offers a proven solution that allows you to focus on your business while they handle the backend.
Get in touch with CloudMinister Technologies today and experience professional, worry-free server management.
For More Visit:- www.cloudminister.com
0 notes
hontanytimes · 10 months ago
Text
What is the Difference Between Plesk and cPanel?
Tumblr media
When it comes to web hosting control panels, Plesk and cPanel are the two giants in the industry. Both offer comprehensive tools for managing web servers, websites, databases, emails, and more. However, they have their differences, and choosing the right one for your needs can significantly impact your hosting experience. In this article, we will explore the difference between Plesk and cPanel, focusing on their features, user interface, security, compatibility, and pricing, while highlighting the positive aspects of Plesk hosting.
1. User Interface and Ease of Use
One of the most noticeable differences between Plesk and cPanel is their user interface. Both platforms have designed their interfaces to be user-friendly, but they do so in different ways.
Plesk:Plesk is known for its clean, modern, and intuitive interface. It organizes its features into categories, making it easy for users to find what they need quickly. The dashboard is less cluttered, and the navigation is straightforward, which is especially beneficial for beginners. Plesk’s interface is also responsive, meaning it works well on various devices, including tablets and smartphones.
cPanel:cPanel’s interface, while powerful, can feel a bit outdated compared to Plesk. It organizes tools into icons, and while this can be effective for users who are familiar with the layout, it can be overwhelming for beginners. The interface is also less customizable than Plesk, which might be a drawback for those who want to tailor their control panel experience.
Verdict:When comparing the difference between Plesk and cPanel in terms of user interface, Plesk takes the lead. Its modern design, simplicity, and responsiveness make it more user-friendly, especially for beginners.
2. Operating System Compatibility
Operating system compatibility is another critical factor when choosing a web hosting control panel. The ability to work with different OS platforms can be a deciding factor for many users.
Plesk:Plesk is highly versatile and works on both Linux and Windows servers. This cross-platform compatibility makes it an excellent choice for users who may need to switch between different operating systems or those who prefer Windows-based hosting. The ability to manage both Linux and Windows servers from the same interface is a significant advantage of best plesk hosting.
cPanel:cPanel is limited to Linux servers, specifically CentOS, CloudLinux, and Red Hat Enterprise Linux. This limitation can be a dealbreaker for those who need Windows hosting, as cPanel does not support Windows servers.
Verdict:When considering the difference between Plesk and cPanel in terms of OS compatibility, Plesk emerges as the clear winner. Its ability to work seamlessly with both Linux and Windows servers gives it a significant edge over cPanel.
3. Security Features
Security is a top priority for anyone managing websites and servers. Both Plesk and cPanel offer robust security features, but there are some differences worth noting.
Plesk:Plesk is known for its strong security features. It comes with integrated security tools like Fail2Ban for intrusion detection and prevention, and ModSecurity for web application firewall protection. Plesk also supports Let’s Encrypt, allowing users to install SSL certificates easily. Additionally, Plesk offers advanced security options like two-factor authentication (2FA) and anti-spam filters. The platform's security is further enhanced by regular updates and patches, ensuring that vulnerabilities are addressed promptly.
cPanel:cPanel also offers a range of security features, including a virus scanner, SSH access management, IP blocking, and password-protected directories. cPanel integrates with several third-party security tools, which can be a plus for users who prefer specific security solutions. However, some of these features might require additional configuration, making them slightly less user-friendly compared to Plesk.
Verdict:In the battle of security features, Plesk has a slight edge due to its out-of-the-box security tools and ease of use. Plesk’s comprehensive security measures make it a preferred choice for those who prioritize a secure hosting environment.
4. Application Support and Management
The ability to manage and deploy applications efficiently is a crucial aspect of any control panel. Both Plesk and cPanel offer application support, but they differ in how they handle it.
Plesk:Plesk excels in application management with its integration of the Plesk Application Catalog. It supports a wide range of applications, including WordPress, Joomla, and Drupal, allowing users to install and manage these applications with a single click. Plesk’s WordPress Toolkit is particularly impressive, offering features like cloning, staging, and automatic updates, which are invaluable for WordPress users. Additionally, Plesk’s Docker support allows users to run Docker containers directly from the control panel, making it a versatile choice for developers.
cPanel:cPanel also supports a variety of applications through its Softaculous Apps Installer. Users can install popular CMS platforms, e-commerce tools, and more with just a few clicks. However, cPanel’s application management features are not as advanced as Plesk’s. For example, while cPanel supports WordPress, it lacks the comprehensive management tools found in Plesk’s WordPress Toolkit.
Verdict:Plesk takes the lead in application support and management. Its robust tools, especially for WordPress, make it an ideal choice for users who rely heavily on CMS platforms and need efficient management options.
5. Customer Support and Documentation
Reliable customer support and comprehensive documentation are essential for users of all experience levels.
Plesk:Plesk offers a wide range of support options, including an extensive knowledge base, community forums, and ticket-based support. The platform’s documentation is detailed and covers a wide array of topics, making it easy for users to find answers to their questions. Plesk also provides premium support options for users who require personalized assistance.
cPanel:cPanel also offers a comprehensive knowledge base and community forums. Additionally, cPanel provides ticket-based support, though some users have noted that response times can vary. Like Plesk, cPanel offers premium support for those who need more dedicated assistance.
Verdict:Both Plesk and cPanel offer strong customer support and documentation. However, Plesk’s extensive documentation and the variety of support options give it a slight advantage in this area.
6. Pricing and Licensing
Pricing can be a significant factor when choosing between Plesk and cPanel, especially for businesses or individuals managing multiple websites.
Plesk:Plesk’s pricing model is flexible and varies depending on the features and the number of domains you need to manage. Plesk offers three main plans: Web Admin, Web Pro, and Web Host. These plans cater to different needs, from managing a single website to hosting multiple domains. Plesk’s pricing is generally considered competitive, especially given the extensive features it offers. Additionally, Plesk often comes bundled with hosting packages, which can be cost-effective.
cPanel:cPanel’s pricing is based on the number of accounts managed on the server. This pricing model can become expensive for users who manage multiple accounts or websites. cPanel offers three main tiers: Solo (for one account), Admin (up to 5 accounts), and Pro (up to 30 accounts). For larger businesses or hosting providers, the Premier plan allows for more accounts, but at a higher cost.
Verdict:When comparing the difference between Plesk and cPanel in terms of pricing, Plesk’s flexible pricing structure and cost-effectiveness for multi-domain management make it a more attractive option for a broader range of users.
7. Backup and Restore Options
Having reliable backup and restore options is critical for website management. Both Plesk and cPanel provide these features, but they differ in execution.
Plesk:Plesk offers robust backup and restore options that are easy to use. Users can schedule automatic backups and store them in various locations, including remote storage. Plesk also allows for incremental backups, which can save time and storage space. Restoring from backups is straightforward, with options to restore entire websites, databases, or individual files.
cPanel:cPanel provides similar backup and restore functionalities, with the ability to perform full or partial backups. However, some users find cPanel’s backup system to be less intuitive compared to Plesk’s. cPanel also supports remote backups, but setting this up might require more configuration.
Verdict:Plesk’s backup and restore options are more user-friendly and versatile, making it a better choice for users who prioritize ease of use and flexibility in managing their backups.
8. Server Resource Management
Efficient server resource management is crucial for maintaining optimal performance, especially for websites with high traffic.
Plesk:Plesk provides detailed resource usage statistics and monitoring tools. Users can track CPU, memory, and disk usage, and manage resources efficiently. Plesk’s integration with tools like Grafana and Prometheus allows for advanced monitoring and alerting, which can be invaluable for larger websites or hosting providers.
cPanel:cPanel also offers resource management tools, but they are not as advanced as those provided by Plesk. While cPanel allows users to monitor resource usage and set limits, the lack of integration with more sophisticated monitoring tools might be a drawback for some users.
Verdict:Plesk’s advanced resource management tools make it a superior choice for users who need detailed monitoring and efficient management of server resources.
9. Customization and Extensibility
The ability to customize and extend the functionality of a control panel can greatly enhance the user experience.
Plesk:Plesk is highly customizable.
0 notes
resellerhosting76 · 2 years ago
Text
Reseller Hosting
Reseller Hosting
What is Reseller hosting?
Reseller hosting is a form of hosting service in which a person, business, or other organization resells a well-known company's web hosting service (cloud, dedicated, shared, or VPS). Using the resources provided by the accredited service provider, they use the profit margin for their own financial gain.
Tumblr media
 What is web hosting?
Web hosting definition. When a hosting firm allots space on a web server for a website to store its files, that website is being hosted. Code, photos, and other website-related assets are made internet accessible through web hosting. Every website you've ever visited is hosted by a server.
Tumblr media
   Types of web hosting
There are typically four different types of web hosting: 
Cloud Hosting
Dedicated Hosting
Shared Hosting
VPS (Virtual private server) Hosting
Hostagle is a best reseller web hosting provider company which provides cheap web hosting plans to the customers.
Hostagle services
The Hostagle Reseller Hosting Plan includes 
Unlimited SSD Storage 
Unlimited Bandwidth 
Unlimited Email Accounts 
Unlimited Databases 
Free SSL 
Free Website Builder 
Free SEO Tools and 
Softaculous Auto Installer.
Best web hosting company
Hostagle is the best web hosting company which provides 
24/7 support
Our team members are available 24/7 to support the customers.
Litespeed Web server
We provide a LiteSpeed web server for faster website loading imes.
Secure in every way
We keep your website secure in every way.
Reseller Hosting Pricing
Hostagle provides the most cost-effective and dependable web hosting options. With the help of our cutting-edge infrastructure, first-rate customer service, and market-leading features, you can receive the best performance and dependability with our plans.
Reseller hosting plans starting with 1500/- per month
 ALL OUR HOSTING PLANS INCLUDE:
Our hosting plans include the following features. With every hosting plan we offer, you will receive these features.
User Manager
Backups
SitePad Website Builder
1-Click Installer
Webmail Access
DNS Management
FTP Over SSL
File Manager
Multiple PHP versions
PHP Configuration
PHP INI Editor
Apache Handlers
phpMyadmin
Cache Manager
Cron jobs
Cloudlinux
Curl
Hotlink Protection
LiteSpeed Web Server
Unlimited Sub Domains
Unlimited FTP Accounts
SMTP, POP3, IMAP
Application Manager
Auto responders
Git™ Version Control
Imunify360
IP Blocker
Leech Protection
ModSecurity
Optimize Website
Remote MySQL®
Resource Usage
SEO and Marketing Tools
Softaculous Apps Installer
& many more...
FREQUENTLY ASKED QUESTIONS
The solutions to your most frequent queries are provided below.
What are the features of reseller hosting?
There are many essential features that come with reseller hosting, a few of which are:
a) 100% of your branding is yours.
b) WHM access is given to you so you can manage your CPANEL accounts.
c) Private nameservers are provided to you.
Q. Does these Product Comes with WHM Access?
Yes, you will be able to manage your Cpanel accounts and packages using WHM Reseller Access.
Q. Programming & Databases?
Unlimited MySQL Databases with phpMyAdmin Access.
Q. Will my services be setup immediately?
All the Packages will be activated instantly Once you clear the invoice Payment.
Q. Can i upgrade my Reseller Hosting plan?
Yes, You can upgrade anytime.
Q. Can i sell Hosting at my Own price ?
Yes, you are permitted to sell hosting at the price you want. However, using our packages to provide free hosting is not permitted.
0 notes
wpcity · 5 years ago
Text
InMotion Hosting Review- Is It Worth The Hype? (Honest Review)
InMotion Hosting Review- Is It Worth The Hype? (Honest Review) WP City
Tumblr media
Today, many established web hosting providers claim to be superior in speed, support, and reasonable pricing as compared to their competitors.
But here’s the catch:
Oftentimes, established hosting companies take advantage of their brand name and flashy ad campaigns to sell more instead of using it to provide more value to their customers.
Luckily, InMotion Hosting sets them apart by providing additional value to customers, investing in secure, fast, and reliable web hosting solutions.
InMotion Hosting Promo 41% OFF
Get The Deal
InMotion offers a full range of affordable hosting plans starting at $3.99/Month. With our exclusive InMotion Hosting coupon, you can receive up to 50% off on InMotion Hosting.
Since 2001, InMotion Hosting has grown a customer base of over 300,000 domains and data centers worldwide.
Reasonably, one might ask: what makes InMotion Hosting invincible in the web hosting industry?
Is InMotion Hosting reliable, or they just another established host getting by through flaunting their reputation alone?
In this InMotion Hosting review, we’ll take a look at every aspect of InMotion Hosting, like the key features, freebies, performance, speed, customer support, pricing, and value, followed by a list of the pros and cons.
Don’t forget to use our InMotion Hosting coupon to unlock the best discount available on InMotion.
Let’s dive in.
In-depth InMotion Hosting Review — Is it Worth The Hype?
InMotion in Summary
Tumblr media
InMotion Hosting has a solid reputation and has been a top-rated CNET-certified web hosting company for more than 17 years.
No matter what your needs require, InMotion offers various hosting solutions with reasonable pricing options.
They provide a wide range of web hosting services, such as :
Business hosting
Managed WordPress
Cloud VPS
Reseller plans
Dedicated servers
Additionally, InMotion offers a powerful website builder that you can use to build websites/blogs from scratch.
Specifically for WordPress, InMotion comes with WordPress hosting that is managed and optimized by experts.
Inmotion Coupon
Wordpress Hosting22% OFF
Get Coupon
VPS Hosting24% OFF
Get Coupon
Dedicated server41% OFF
Get Coupon
Share Hosting20% OFF
Get Coupon
Let’s take a closer look at the key features and benefits of InMotion Hosting.
Key Features & Benefits of InMotion
Free Website Transfers
Tumblr media
InMotion offers free website migration to its customers and promises that your website will experience zero downtime while they perform this transfer.
Free SSL Certificate
Tumblr media
While other web hosts don’t provide their customers with a free SSL certificate, InMotion comes with free SSL certificates that put secure tags (HTTPs) on your websites.
An SSL certificate is extremely important, as Google prefers sites secured with HTTPs, so having this additional security is a huge benefit of using InMotion’s services.
Free Website Backups
Tumblr media
They offer free website backups and renew backups of your website on a daily basis.
Other web hosting providers and established hosting platforms like GoDaddy don’t offer free backups or SiteGround backups for your website data on a weekly basis.
Also, the restoration of website data is free if used once every four months.
Easy Setup
Tumblr media
InMotion Hosting is easy to set up. Customers won’t face any issues in setting up a website after purchasing the hosting. InMotion comes with a one-click app installer and free website builder for new websites.
Free SSD Drives
Tumblr media
InMotion Hosting offers free SSD drives with all plans—most other web hosting services only offer traditional HDD drives with servers.
SSDs perform about 20% faster than traditional HHDs.
Furthermore, the SSD drive-based servers of InMotion Hosting are built to deliver faster loading times and faster retrieval of data for your websites.
Multiple Data Centers & Max Speed Zones
Tumblr media
InMotion Hosting has multiple data centers and comes with Max Speed Zones: geographical locations within a certain range of data centers. If you are located within a Max Speed Zone, InMotion guarantees that your website will load at least 6 times faster.
Strong Security (DDoS Protection)
Tumblr media
InMotion takes security very seriously, monitoring your website’s security 24/7 to make sure it is safe and secure.
Each website hosted through InMotion is covered by DDoS protection, using advanced firewall systems like ModSecurity.
90-Day Money-Back Guarantee
Tumblr media
Many web hosting providers offer only a 30-day money-back guarantee. In contrast, InMotion offers 90 days of money-back guarantee because they are confident in the quality of their services.
Premium Sucuri Plugin
Tumblr media
Standard WordPress hosting comes equipped with the Sucuri Plugin: a premium, all-in-one security plugin that costs around $200/Year. However, InMotion is offering it for free.
Google Apps Integration
Tumblr media
With InMotion, you can connect with Google Apps in three simple steps. Some established web hosts like GoDaddy require you to pay for their subpar email clients.
Find out more about InMotion Hosting
InMotion Hosting Performance & Speed
Tumblr media
When it comes to ensuring the reliability of web hosting services, we need to review its uptime, because we don’t want our website to go offline.
The uptime of a website refers to the amount of time your website is up and running online for users to browse.
Most web hosting providers tend to have average uptimes between 95% to 98%.
Based on our research, we found that InMotion Hosting has an average uptime of 99.97%. 
Another performance indicator of InMotion Hosting is their server speed. InMotion currently has two US-based data centers that are located on either coast. Additionally, InMotion Hosting uses SSD drives for all of their servers. 
Overall, InMotion server speeds are fast on a global scale. On average, InMotion has an average page loading time of 827ms. 
In other words, they are 7.4% faster than competitors who have an average loading time of 890ms. 
This is quite an important statistic, as speed is also one of Google’s algorithms that affects your rankings. 
Find out more about InMotion Hosting
InMotion Hosting Pricing & Value
Tumblr media
InMotion Hosting offers a wide range of hosting services, such as shared hosting, managed WordPress, Cloud VPS, reseller plans, dedicated servers, and more. 
No matter which hosting package you opt for, InMotion Hosting prices are extremely affordable.
Here’s a quick overview of InMotion’s pricing plans.
Shared Hosting Plans
Tumblr media
InMotion shared hosting, AKA, their “business hosting” plan, starts at $3.99/Month. They offer three different plans:
Launch Plus: This plan starts at $3.99/Month and supports 2 websites.
Power Plan: This plan starts at $5.99/Month and supports 6 websites.
Pro Plan: This plan starts at $5.99/Month and supports unlimited websites.
All shared hosting plans include free domain transfers, free SSL, 24/7 customer support, unlimited storage and bandwidth, and many marketing and security tools. 
All plans are even backed with a 90-day money-back guarantee.
Find out more about InMotion Hosting
WordPress Hosting Plans
Tumblr media
InMotion’s WordPress hosting is optimized for speed and reliability. 
The basic plan starts at $4.99/Month. If you’re a beginner, consider getting started with this plan. 
InMotion Hosting WordPress Plans:
WP-1000S: This plan starts at $4.99/Month for one website (Great for beginners).
WP-2000S: This plan starts at $7.99/Month for 2 websites (Great for small and medium business & blogging).
With every plan, InMotion Hosting offers free SSD storage, 24/7 expert support, unlimited email accounts, and more. For your convenience, every plan comes with pre-installed WordPress.
If you choose the premium plan, you’ll even get access to great plugins and theme bundles (200+ free themes).
Again, every plan is backed by a 90-day money-back guarantee.
Find out more about InMotion Hosting
All InMotion Hosting Plans Include
Free Domain: Yes! 
Ease of Signup: Get started in five simple steps (Follow our sign-up guide below).
Payment Methods: Supports credit cards, checks, and purchase orders.
Account Activation: Account activation takes little to no time.
Dashboard & cPanel Experience: Offers a cPanel with a simple interface.
App Installation (WordPress, Joomla): Offers one-click installation of popular CMS platforms and apps.
InMotion Hosting Coupon | Get up to 50% OFF NOW
We have listed an InMotion Hosting coupon that you can use to get up to 50% off on various hosting packages. 
You can use our special discount link to claim your InMotion Hosting discount offer right away automatically. 
How to use our InMotion Hosting Coupon
To claim this exclusive InMotion discount coupon, you need to visit the InMotion website using our special discount link. Next, just follow the steps listed below.
Step 1: Click any link on this page.
Step 2: Choose a plan, and click on the “Order Now” button to proceed.
Step 3: Review your hosting options.
Step 4: Create an account and enter your billing information.
Step 5: Review your order and checkout.
Note: Follow these steps carefully to claim the maximum discount offers on InMotion.
Find out more about InMotion Hosting
InMotion Hosting Customer Support: Fast, or Just Like Others?
InMotion Hosting claims that they are number one in web hosting customer service.
Frankly speaking, many established web hosting offers an unreliable and ineffective customer service.
Comparatively, InMotion provides expert customer support in the form of live chat, phone, email, and support tickets from your dashboard.
They will assist you with your challenges or questions 24 hours a day and 7 days a week. 
Upon testing their customer service via submitting a ticket, within 2 minutes we were connected to live support. The agent solved our problem right away.
Also, for dedicated hosting customers, they offer one-on-one customer support. 
The customer support team is a well-trained collection of experts, solving your problem quickly and consuming less time. All of the customer support staff have at least 160 hours of internal training before they are trusted to interact with customers.
Find out more about InMotion Hosting
Which InMotion Hosting Plan is Best for You?
After going through this InMotion Hosting review, you’re hopefully in a better position to choose a plan that is tailored to you.
Our recommendations are listed below:
We’re taking the example of the shared hosting plan of InMotion Hosting, whose basic plan starts at $3.95/Month.
If you’re just starting out and intend to run a basic website, consider choosing the Launch Plan.
If you intend to run a WordPress or other CMS-powered website then consider choosing the Power Plan.
If you intend to run a larger website and need more features & resources, then consider choosing the Pro Plan.
After initially selecting a plan, you can always upgrade to a higher hosting plan if you require more resources and features.
Find out more about InMotion Hosting
Pros & Cons of InMotion Hosting
Pros:
24/7 expert support
Average uptime of 99.97%
Blazing-fast server speed
Free domain migration
CDN included with every plan
Free private SSL certificate
Free automatic daily backups
Hacks & malware protection
One-click app installations
Managed WordPress hosting 
90-day money-back guarantee
Free website builder, plus free themes & plugins
Cons:
Limitation in some plans
Delayed verification process (Manual verification)
Find out more about InMotion Hosting
Conclusion: Is InMotion Right for You?
Through our experience with InMotion Hosting, we believe that they go above and beyond our expectations.
Undoubtedly, InMotion Hosting offers fast, reliable, and affordable web hosting services.
When we compare InMotion Hosting to other established hosts like BlueHost and HostGator, then InMotion stands apart with many superb features and freebies.
Furthermore, they are keen to provide superior customer support, solid uptimes, and various web hosting options to choose from.
If you’re willing to kickstart your online venture, then we strongly recommend getting started with InMotion Hosting right away.
Don’t forget to use our special discount to claim up to 50% off on various InMotion Hosting packages.
Keep in mind that all InMotion Hosting plans are backed with a 90-day money-back guarantee.
If you enjoyed this InMotion Hosting review and felt that it provided you with better insights to InMotion Hosting, then feel free to share it.
Get Started with InMotion Hosting
InMotion Hosting Review- Is It Worth The Hype? (Honest Review) Editor
source https://www.wpcity.com/inmotion-hosting-review/?utm_source=rss&utm_medium=rss&utm_campaign=inmotion-hosting-review
0 notes
x-sapphire-flames-x-blog · 7 years ago
Text
HTTP Error - WordPress Flash Uploader
HTTP Error - WordPress Flash Uploader
Recently several of our customers moved their websites to a VPS (Virtual Private Server) running 64-Bit CentOS, WHM, cPanel, Apache 2.2, PHP 5.3, and My SQL 5.x, This move was triggered by their desire to get better performance and greater control out of running their own hosted web environment and the VPS seemed like the best fit at the time. Overall their move went better than expected with no major problems. However, one error that they noticed that occurred repeatedly when they tried to use the Flash Uploader in WordPress, was the dreaded HTTP Error.
Flash Uploader in WordPress HTTP Error
I’ll call this HTTP Error the dreaded error, because after researching for hours, trying all the various suggested fixes, and having nothing work consistently our customers asked us for some help with the error we did some research for them and finally stumbled upon a website that provided us with enough information to correct the problem.
First of all, let me point out that this error IS RELATED to the MOD_SECURITY module within Apache. In earlier versions of WordPress, it was a bug, but it was fixed back in version 2.8. So if you are seeing this error in a later version of WordPress (we are running 3.2.1) it is most likely related to your Apache web server incorporating the MOD_SECURITY module. In order to fix the issue you need to determine if you have mod_security or mod_security2 installed because the resolution for each of these modules is quite different.
MOD_SECURITY is an open source web application firewall that is installed as a module for Apache-based web servers. There are two widely used versions of the mod_security module, the first release of mod_security was just plain mod_security, the latest release is referred to as mod_security2. At the time of this post the latest release of mod_security is MODSecurity 2.6.
What Causes the HTTP Error
As I mentioned, our customers are running CentOS 5.7 with WHM and cPanel so the examples you see here are based on that configuration. However, you should be able to apply our suggestions to your own environment if you have an understanding of your server operating system and the location of the server files for Apache and Mod_Security.
The HTTP Error is caused by mod_security because there is a security rule in mod_security that is triggered by the WordPress Flash Uploader. This security rule is meant to stop known security flaws in Flash that have been exploited to inject code into your website. You can see this security rule trigger a message in your mod_security logs in WHM when you try to upload a file using the Flash Uploader. The message we were receiving was the following;
Access denied with code 406 (phase 2). Pattern match “^Shockwave Flash” at REQUEST_HEADERS:User-Agent. [file “/usr/local/apache/conf/modsec2.user.conf”] [line “203”]
Your message may be different based upon the version of mod_security you have installed. As you can see from our message, it clearly states that the rule triggered by the pattern match was in the modsec2.user.conf file which helped us to determine that we had mod_security2 installed.
You will want to determine the mod_security that you have installed and then apply the fix defined in the appropriate section below.
MOD_SECURITY
If you have the earlier version of mod_security installed, then it’s a little easier to fix the HTTP Error for the Flash Uploader because your changes can all be incorporated in the.htaccess file in your root directory. This is one of the most confusing aspects of the fixes we found on the internet because not too many websites distinguished the fixes between mod_security and mod_security2.
For mod_security you just need to disable this rule for the async-upload.php file in your.htaccess file. You can do this by inserting the following directive into your.htaccess file in the root of your website.
SecFilterEngine Off
SecFilterScanPOST Off
Now when you use the WordPress Flash Uploader this mod_security rule will not be triggered. The Flash Uploader uses the page async-upload.php and by the above directive the security filter and scanning have been turned off for that one page.
It’s important to point out that you do not want to disable mod_security for your entire website! We found numerous posts on the internet that defined the above directive without the Files specification. DON’T DO THIS! You will open your website up to all type of vulnerability because you will completely disable mod_security.
Once you have made these changes to your.htaccess file and saved the changes, your Flash Uploader should now work, as changes made to the.htaccess file are immediate.
MOD_SECURITY2
If you are running mod_security2 then the.htaccess changes will not work!
Mod_security2 does not allow changes to it’s security rules via the.htaccess file. The only way you can make changes is through a file called /usr/local/apache/conf/modsec2/custom.conf. This is an important difference between mod_security and mod_security2 and one that I am sure has caused many web site owners a lot of anguish and grief.
To fix this error, if you are running mod_security2, requires a 2 Step process;
Step 1 –
A) In WHM, open your MOD_Security log under Plugins/Mod Security.
B) At the top of the page you will see an “Edit Config” button. Click it and open the Mod Sec2 Rules.
C) Scroll down until you find the following entry under #Spam Bots –
SecRule HTTP_User-Agent “^Shockwave Flash”
D) We need to change this entry to add an ID so that we can reference it in our mod_security override later. Copy this rule to a new line, comment out the old rule and add the following –
#SecRule HTTP_User-Agent “^Shockwave Flash”
SecRule HTTP_User-Agent “^Shockwave Flash” “id:xxxxxxxxxx”
Replace “xxxxxxxxxx” with an arbitrary number to be used as the ID for this rule. It doesn’t matter what the number is, but you will need to remember it for Step 2(C) in these instructions.
E) Scroll back to the top of the Modsec2 Rules and ensure that the 2 lines below are uncommented in your Modsec2 file. The lines should appear as below;
## whitelist ##
Include “/usr/local/apache/conf/modsec2/whitelist.conf”
Include “/usr/local/apache/conf/modsec2/custom.conf”
We will be making changes to the custom.conf file in Step 2 and we want to ensure that our changes are included in the ModSec2 Rules.
F) Save this file by clicking on the “Save Configuration” button at the bottom of the page.
Step 2 –
A) Now open a SSH connection to your server using your favorite SSH Client. We used Putty for our purposes.
B) CD over to /usr/local/apache/conf/modsec2/
C) Using vi, modify the file custom.conf as follows;
SecRuleRemoveById xxxxxxxxxx
There may already be other entries in this file. If so, just add this entry to the bottom of this file and save it.
Again, it is important that you replace the “xxxxxxxxxx” with an arbitrary number that you selected in Step 1(D) above. This number is an arbitrary ID that we assigned and use to identify the Mod_sec2 security role that we want to override.
D) Reboot your server for the changes that you made to take effect.
Once your server comes back on-line from your reboot, test your changes by uploading a file to your WordPress site via the Flash Uploader. If you followed all of the steps correctly your file should now upload fine without the Dreaded HTTP Error!
Ata Rehman
0 notes
josidel · 8 years ago
Text
Security measures to protect an unmanaged VPS.
Virtual private server 
have long been thought of as a next-generation shared hosting solution.
They use virtualization ‘tricks’ to let you coin your own hosting environment and be a master of your server at a pretty affordable price.
If you are well-versed in server administration, then an unmanaged VPS will help you make the most of your virtual machine’s capabilities.
However, are you well-versed enough in security as well?
Here is a Linux VPS security checklist, which comes courtesy of our Admin Department.
What exactly is an unmanaged VPS?
Before we move to the security checklist, let’s find out exactly what an unmanaged VPS is and what benefits it can bring to you.
With an unmanaged VPS, pretty much everything will be your responsibility.
Once the initial setup is complete, you will have to take care of server maintenance procedures, OS updates, software installations, etc. Data backups should be within your circle of competence as well.
This means that you will need to have a thorough knowledge of the Linux OS. What’s more, you will have to handle any and all resource usage, software configuration and server performance issues.
Your host will only look into network- and hardware-related problems.
Why an unmanaged VPS?
The key advantages of unmanaged VPSs over managed VPSs are as follows:
you will have full administrative power and no one else will be able to access your information;you will have full control over the bandwidth, storage space and memory usage;you will be able to customize the server to your needs specifically;you will be able to install any software you want;you will save some money on server management – it really isn’t that hard to set up and secure a server if you apply yourself and updating packages is very easy;you will be able to manage your server in a cost-efficient way without the need to buy the physical machine itself (you would have to if you had a dedicated server);
Unmanaged VPS – security checklist
With an unmanaged VPS, you will need to take care of your sensitive personal data.
Here is a list of the security measures that our administrators think are key to ensuring your server’s and your data’s health:
1. Use a strong password
Choosing a strong password is critical to securing your server. With a good password, you can minimize your exposure to brute-force attacks. Security specialists recommend that your password be at least 10 characters long.
Plus, it should contain a mix of lower and uppercase letters, numbers and special characters and should not include common words or personally identifiable information. You are strongly advised to use a unique password so as to avoid a compromised service-connected breakthrough.
A strong password may consist of phrases, acronyms, nicknames, shortcuts and even emoticons. Examples include:
1tsrAIn1NGcts&DGS!:-) (It’s raining cats and dogs!) humTdumt$@t0nAwa11:-0 (Humpty Dumpty sat on a wall) p@$$GOandCLCt$500 :-> (Pass Go and collect $500)
2. Change the default SSH port
Modifying the default SSH port is a must-do security measure.
You can do that in a few quick steps:
Connect to your server using SSHSwitch to the root userRun the following command: vi /etc/ssh/sshd_configLocate the following line: # Port 22Remove # and replace 22 with another port numberRestart the sshd service by running the following command: service sshd restart
3. Disable the root user login
The root user has unlimited privileges and can execute any command – even one that could accidentally open a backdoor that allows for unsolicited activities.
To prevent unauthorized root-level access to your server, you should disable the root user login and use a limited admin account instead.
Here is how you can add a new admin user that can log into the server as root via SSH:
Create the user by replacing example_user with your desired username (in our case – ‘admin’): adduser adminSet the password for the admin user account: passwd adminTo get admin privileges, use the following command: echo 'admin ALL=(ALL) ALL' >> /etc/sudoersDisconnect and log back in as the new user: ssh [email protected] you are logged in, switch to the root user using the ‘su’ command: su password: whoami rootTo disable the root user login, edit the /etc/ssh/sshd_config file. You will only need to change this line:  #PermitRootLogin yes to: PermitRootLogin no
You will now be able to connect to your server via SSH using your new admin user account.
4. Use a rootkit scanner
Use a tool like rkhunter (Rootkit Hunter) to scan the entire server for rootkits, backdoors and eventual local exploits on a daily basis; you’ll get reports via email;
5. Disable compilers for non-root users (for cPanel users)
Disabling compilers will help protect against many exploits and will add an extra layer of security.
From the WebHost Manager, you can deny compiler access to unprivileged (non-root) users with a click.
Just go to Security Center ->Compiler Access and then click on the Disable Compilers link:
Alternatively, you can keep compilers for selected users only.
6. Set up a server firewall
An IPTABLES-based server firewall like CSF (ConfigServer Firewall) allows you to block public access to a given service.
You can permit connections only to the ports that will be used by the FTP, IMAP, POP3 and SMTP protocols, for example.
CSF offers an advanced, yet easy-to-use interface for managing your firewall settings.
Here is a good tutorial on how you can install and set up CSF.
Once you’ve got CSF up and running, make sure you consult the community forums for advice on which rules or ready-made firewall configurations you should implement.
Keep in mind that most OSs come with a default firewall solution. You will need to disable it if you wish to take advantage of CSF.
7. Set up intrusion prevention
An intrusion prevention software framework like Fail2Ban will protect your server from brute-force attacks. It scans logfiles and bans IPs that have unsuccessfully tried to log in too many times.
Here’s a good article on how to install and set up Fail2Ban on different Linux distributions.
You can also keep an eye on the Google+ Fail2Ban Users Community.
8. Enable real-time application security monitoring
Тhe best real-time web application monitoring and access control solution on the market – ModSecurity, allows you to gain HTTP(S) traffic visibility and to implement advanced protections.
ModSecurity is available in your Linux distribution’s repository, so installing it is very easy:
apt-get install libapache2-modsecurity
Here’s a quick guide on how to install and configure ModSecurity.
Once you’ve got ModSecurity up and running, you can download a rule set like CRS (OWASP ModSecurity Core Rule Set). This way you won’t have to enter the rules by yourself.
9. Set up anti-virus protection
One of the most reliable anti-virus engines is ClamAV – an open-source solution for detecting Trojans, viruses, malware & other malicious threats. The scanning reports will be sent to your email address.
ClamAV is available as a free cPanelplugin.
You can enable it from the Manage Plugins section of your WHM:
  Just tick the ‘Install ClamAV and keep updated’ checkbox and press the ‘Save’ button.
10. Enable server monitoring
For effective protection against DDoS attacks, make sure you install a logfile scanner such as logcheck or logwatch. It will parse through your system logs and identify any unauthorized access to your server.
Use software like Nagios or Monitis to run automatic service checks to make sure that you do not run out of disk space or bandwidth or that your certificates do not expire.
With a service like Uptime Doctor or Pingdom, you can get real-time notifications when your sites go down and thus minimize accidental downtime.
11. Run data backups
Make regular off-site backups to avoid the risk of losing data through accidental deletion.
You can place your trust in a third-party service like R1Soft or Acronis, or you can build your own simple backup solution using Google Cloud Storage and the gsutil tool.
If you are on a tight budget, you can keep your backups on your local computer.
12. Keep your software up to date
Keeping your software up to date is the single biggest security precaution you can take.
Software updates range from regular minor bug fixes to critical vulnerability patches. You can set automatic updates to save time.
However, keep in mind that automatic updates do not apply to self-compiled applications. It’s advisable to first install an update in a test environment so as to see its effect before deploying it to your live production environment.
Depending on your particular OS, you can use:
yum-cron (for CentOS)unattended upgrades (for Debian and Ubuntu)dnf-automatic (Fedora)
If you have not obtained an unmanaged VPS yet, you could consider our solutions:
OpenVZ VPS packages – all setups from 4 to 10 are unmanaged and come with SSH/full root access (for cPanel setups only) and with a CentOS/Debian/Ubuntu OS installation;KVM VPS setups – all four setups are unmanaged and offer SSH/full root access; OS options include CentOS/Debian/Ubuntu as well as a few OS ISO alternatives like Fedora and FreeBSD;
via Blogger http://ift.tt/2AIEre3
0 notes
webdesignersolutions · 8 years ago
Link
I run a hosting company which host mostly WordPress sites. As you know brute force attacks on WordPress has been a big issue for the past few years. About six months ago after I was able to block most attacks they got even stronger and harder to stop. I figured out how to block them 99% of the time which keeps my server resources down and keeps my clients sites from wasting resources.
If you run your own servers you can use the guide below to protect your clients sites.
This guide is for someone running cPanel 64 or greater with EasyApache 4. Parts of this guide will work for cPanel 58-64 and EasyApache 3 however some features may be missing.
Writing this current guide base on my current server setup. These methods may work with other platforms such as Plesk but I don’t have the environment to test.
Step One – Apache Config
The first thing I did was block ALL xmlrpc.php traffic from anyone but WordPress IPs. These IPs may changes but the list I’m currently using has been working fine for over a year.
You need to add the code below in your apache config. If you’re running cPanel you can login to WHM and search for Apache Configuration. Once you’re on that menu select Include Editor and select the All Versions drop down under Pre VirtualHost Include.
Screenshot
Add your IP address so you can access everything after you block it
This code will redirect all xmlrpc.php and wp-trackback.php to localhost aka 127.0.0.1. You may have clients that use both so make sure they’re not using the WordPress app or using Trackbacks. We decided as a company to block them because they were used for attacks more than anything and not one of our clients reported issues either. If they need xmlrpc.php or wp-trackback.php you can put them on their own server. No need to compromise your security for one client.
<FilesMatch “^(xmlrpc\.php|wp-trackback\.php)”> Order Deny,Allow Deny from all Allow from *.wordpress.com Allow from 192.0.64.0/18 Allow from 185.64.140.0/22 Allow from 2a04:fa80::/29 Allow from 76.74.255.84 Allow from 76.74.255.85 Allow from 192.0.65.204 Allow from 192.0.65.205 Allow from 192.0.80.244 Allow from 192.0.80.246 Allow from 192.0.96.247 Allow from 192.0.96.248 Allow from 192.0.123.250 Allow from xxx.xxx.xxx.xxx <—————- **ADD YOUR IP ADDRESS OR REMOVE THIS LINE** (If you don’t the config will error) Satisfy All ErrorDocument 403 http://127.0.0.1/ </FilesMatch> Step Two – Mod Security
The next step requires Mod Security to be installed. This is a free option within cPanel. Hopefully you’re running the latest cPanel 62+ which has a nice interface for Mod Security.
You can install Mod Security via EasyApache 4. Once you’re login to WHM search for EasyApache 4. Since you most likely already have a running config you can click the blue button to customize your current config. Once everything loads click Apache Modules and search for mod_security. You want to have mod_security2 and mod_security2-mlogc. (You may already have mod_security2 installed but mod_security2-mlogc is a new feature since cPanel 62+.
Screenshot
If yours shows blue and unaffected you already have both installed. If not hit next until you get to the review screen and hit provision
(If you’re running cPanel 62 it’s called modsec-sdbm-util. If you’r’re not running 62+ you can install the plugin from Kenneth Power github https://github.com/escherlat/modsec-sdbm-util)
What mod_security2-mlogc does is clean up your ModSec logs so they don’t get really large in size. I had an issue where the log file /var/cpanel/secdatadir/ip.pag would get 25GB in size and cause the server to overload.
Once you have ModSec installed you can install click the WHM icon at the top left to refresh the page. Then search for ModSecurity in the WHM search panel. Select ModSecurity™ Vendors and add / install the OWASP ModSecurity Core Rule Set V3.0 rules. (You may already have the 2.0 rules installed) Personally I’ve found the 3.0 rules to be better than the 2.0 rules. I have disabled the 2.0 rules all together.
Search for ModSecurity™ Configuration within WHM and make sure everything is turned on. I have Audit Log Level set to Only log noteworthy transactions, Connections Engine set to Process the rules, Rules Engine set to Process the rules. You can setup the other stuff as well such as Geolocation Database and Project Honey Pot if you want but I’m not going to talk about those within this guide.
Step Three – CMC
You don’t need to install this if you want to modify the files via command line or ftp but I found it’s easier using this plugin. The install instructions are pretty easy.
https://www.configserver.com/cp/cmc.html
Install instructions: https://download.configserver.com/cmc/INSTALL.txt
Once you have CMC installed you can click the WHM icon at the top left to refresh the page. Search for ConfigServer ModSec in the WHM search and select it. Scroll down to the bottom and select modsec/modsec2.user.conf under ConfigServer ModSecurity Tools and select edit.
This is the rule that will block 99% of the attacks. In the last 7 days it’s blocked over 42,5000+ attacks!
Add the following entry: (More about the other rules below – Do not add them until you read the rest of this post)
<Locationmatch “/wp-login.php”> SecRule REQUEST_METHOD “POST” “deny,status:401,id:972687,chain,msg:’wp-login request blocked, no referrer'” SecRule &HTTP_REFERER “@eq 0” </Locationmatch>
Screenshot
What this does is block any connection that doesn’t have a referrer (https://en.wikipedia.org/wiki/HTTP_referer)
Step Four- CSF
Hopefully by now you already have a firewall installed however if you don’t you need to install ConfigServer Security & Firewall.
https://configserver.com/cp/csf.html
This is another easy install.
https://download.configserver.com/csf/install.txt
Once you have CSF installed you can click the WHM icon at the top left to refresh the page. Search for firewall in the WHM search and select it. If you don’t already have it setup click Firewall Profiles under csf – ConfigServer Firewall and select one to fit your environment. I always start with protection_high and adjust some settings so if you don’t know how CSF works pick medium and apply profile. It will ask you to restart csf & lfd.
Once the page refresh select Firewall Configuration. Search for LF_MODSEC. The default should be set to 3 or 5 depending on the profile you have. You can start with 3 as you monitor the blocks however I have mine set to 1 because I don’t get anymore false positive on ModSec so if someone hits a ModSec rule once they are automatically added to the firewall block. I also have DENY_IP_LIMIT set to 5000 and DENY_TEMP_IP_LIMIT set to 1000. The limit you set depends on your servers. I could have a lot higher but feel 5000 is a good limit.
Screenshot
Screenshot
One last step is setting up ldf blocklist. You can find this on the main firewall screen (very bottom) after clicking it from the WHM search. You will find a few entries already in there by default but I added two to my list. Below is my current config for blocklist.
The two other list I added were myip.ms Latest blacklist and myip.ms user submitted blacklist. You may also not have GreenSnow Hack List depending on your CSF install.
PLEASE NOTE: You may not be able to use all of these depending on your server size. I suggest adding one or two at a time and slowly add the others over the next few days. Watch your server load and loading time of your clients sites to make sure the firewall is not slowing down your server.
Screenshot
# Spamhaus Don’t Route Or Peer List (DROP) # Details: http://www.spamhaus.org/drop/ SPAMDROP|86400|0|http://www.spamhaus.org/drop/drop.lasso # Spamhaus Extended DROP List (EDROP) # Details: http://www.spamhaus.org/drop/ SPAMEDROP|86400|0|http://www.spamhaus.org/drop/edrop.lasso # DShield.org Recommended Block List # Details: http://dshield.org DSHIELD|86400|0|http://www.dshield.org/block.txt # TOR Exit Nodes List # Set URLGET in csf.conf to use LWP as this list uses an SSL connection # Details: https://trac.torproject.org/projects/tor/wiki/doc/TorDNSExitList TOR|86400|0|https://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=1.2.3.4 # Alternative TOR Exit Nodes List # Details: http://torstatus.blutmagie.de/ ALTTOR|86400|0|http://torstatus.blutmagie.de/ip_list_exit.php/Tor_ip_list_EXIT.csv # BOGON list # Details: http://www.team-cymru.org/Services/Bogons/ BOGON|86400|0|http://www.cymru.com/Documents/bogon-bn-agg.txt # Project Honey Pot Directory of Dictionary Attacker IPs # Details: http://www.projecthoneypot.org HONEYPOT|86400|0|http://www.projecthoneypot.org/list_of_ips.php?t=d&rss=1 # C.I. Army Malicious IP List # Details: http://www.ciarmy.com CIARMY|86400|0|http://www.ciarmy.com/list/ci-badguys.txt # BruteForceBlocker IP List # Details: http://danger.rulez.sk/index.php/bruteforceblocker/ BFB|86400|0|http://danger.rulez.sk/projects/bruteforceblocker/blist.php # OpenBL.org 30 day List # Set URLGET in csf.conf to use LWP as this list uses an SSL connection # Details: https://www.openbl.org OPENBL|86400|0|https://www.openbl.org/lists/base_30days.txt # MaxMind GeoIP Anonymous Proxies # Set URLGET in csf.conf to use LWP as this list uses an SSL connection # Details: https://www.maxmind.com/en/anonymous_proxies MAXMIND|86400|0|https://www.maxmind.com/en/anonymous_proxies # Blocklist.de # Set URLGET in csf.conf to use LWP as this list uses an SSL connection # Details: https://www.blocklist.de # This first list only retrieves the IP addresses added in the last hour BDE|3600|0|https://api.blocklist.de/getlast.php?time=3600 # This second list retrieves all the IP addresses added in the last 48 hours # and is usually a very large list (over 10000 entries), so be sure that you # have the resources available to use it #BDEALL|86400|0|http://lists.blocklist.de/lists/all.txt # Stop Forum Spam # Details: http://www.stopforumspam.com/downloads/ # Many of the lists available contain a vast number of IP addresses so special # care needs to be made when selecting from their lists #STOPFORUMSPAM|86400|0|http://www.stopforumspam.com/downloads/listed_ip_1.zip # GreenSnow Hack List # Details: https://greensnow.co GREENSNOW|3600|0|http://blocklist.greensnow.co/greensnow.txt # myip.ms Latest blacklist # Set URLGET in csf.conf to use LWP as this list uses an SSL connection # Details: https://myip.ms/browse/blacklist/Blacklist_IP_Blacklist_IP_Addresses_Live_Database_Real-time MYIPMSBLACKLIST|86400|0|https://myip.ms/files/blacklist/csf/latest_blacklist.txt # myip.ms user submitted blacklist # Set URLGET in csf.conf to use LWP as this list uses an SSL connection # Details: https://myip.ms/browse/blacklist/1/usrs/0/Yes_Blacklist_IP_Addresses_Live.html MYIPMSUSERS|86400|0|https://myip.ms/files/blacklist/csf/latest_blacklist_users_submitted.txt
After you have made the changes above hit change and restart csf & lfd.
Bonus – modsec2.user.conf Bad Bots
We had a lot of issues with Baidu and Yandex using a lot of resources on clients sites so we decided to block them all together. We also have a bad bot list we put together from resources online which you can block via ModSec.
First thing you want to do is create a file badbotlist.txt under /etc/apache2/conf.d/modsec/ or on your computer and upload to /etc/apache2/conf.d/modsec/.
Add the text from this document into your file.
ModSec Bad Bots List: https://docs.google.com/document/d/1SjtAywpkLR6dX0Va_tKgpdMxAIOsHTf_xcMaQ5XK6no/edit?usp=sharing
Once you have the file add this to your modsec/modsec2.user.conf (You can do this via ConfigServer ModSecurity Control)
SecRule REQUEST_HEADERS:User-Agent “@pmFromFile badbotlist.txt” “id:350001,rev:1,severity:2,log,msg:’BAD BOT – Detected and Blocked. ‘”
Hit change / restart CSF & LFD
Bonus – modsec2.user.conf xmlrpc.php
While xmlrpc.php is getting blocked via Apache Config I noticed some slipping though if the attacker is trying to break into /blog/xmlrpc.php
Adding this code below will stop those attacks.
<Locationmatch “/xmlrpc.php”> SecRule REQUEST_METHOD “POST” “deny,status:401,id:48658231,chain,msg:’xmlrpc request blocked, no referrer'” SecRule &HTTP_REFERER “@eq 0” </Locationmatch> Bonus – Extra Modsec Rules
I also noticed some attackers trying to exploit by doing // in front to get by the main block those.
SecRule QUERY_STRING “//” “redirect:http://127.0.0.1,id:2894326” Bonus – Comodo ModSec
Comodo has a nice set of ModSec rules that you can add via ModSecurity™ Vendors inside WHM.
Here is a guide on install those rules.
https://help.comodo.com/topic-212-1-670-8350-.html
Bonus – Cloudflare Page Rules
Cloudflare allows you to use three page rules for free. If you have a client that is still getting a lot of attacks I highly suggest putting them on Cloudflare. Here is a guide how to setup the page rules.
After you have the site added to cloudflare and the name servers changed / verified. Go to Page Rules.
Cloudflare allows you to have three page rules for free. If you need more it’s only 5 dollars for 5 more.
These are the three that i’m using to block most attacks via cloudflare.
Create a rule with the following matches.
First rule
(This rule is only for a bot or someone visiting wp-login.php and not the rest of your site)
URL Matches: yourclientsdomain.com/wp-login.php
First setting: Browser Integrity Check – On (Documentation)
Second setting: Security level – I’m under attack. (Documentation)
Screenshot
Second rule
(This rule is only for a bot or someone visiting /wp-admin and not the rest of your site – Kind of redundant since wp-admin redirects to wp-login.php but saves a php process redirecting)
URL Matches: yourclientsdomain.com/wp-admin
First setting: Browser Integrity Check – On (Documentation)
Second setting: Security level – I’m under attack. (Documentation)
Screenshot
Third rule
(This rule is only for a bot or someone visiting xmlrpc.php and not the rest of your site)
URL Matches: yourclientsdomain.com/xmlrpc.php
First setting: Browser Integrity Check – On (Documentation)
Second setting: Security level – I’m under attack. (Documentation)
Screenshot
If this client has their own server because they use xmlrpc.php change security level to high. This will still block most bots and allow WordPress Android, iPhone, and Windows app to work. If not, you can just keep it as I’m under attack.
Screenshot
Final Steps
Monitor your ModSec Hit List by searching for ModSecurity™ Tools under WHM. Search and monitor the IPs getting blocked in the firewall to make sure legit traffic isn’t getting blocked.
You can view the original post with images at the following sites.
https://troyglancy.com/stopped-wordpress-brute-force-attacks-server
https://medium.com/@troyglancy/how-i-stopped-wordpress-brute-force-attacks-b8ad8bbd2081
Submitted August 03, 2017 at 07:44PM by messyentrepreneur https://www.reddit.com/r/webhosting/comments/6rhmvy/how_i_stopped_wordpress_brute_force_attacks/?utm_source=ifttt
from Blogger http://webdesignersolutions1.blogspot.com/2017/08/how-i-stopped-wordpress-brute-force.html via IFTTT
0 notes
webcranks21-blog · 8 years ago
Text
What is ModSecurity and why you need it?
New Post has been published on https://webcranks.com/blog/?p=53
What is ModSecurity and why you need it?
With the growing use of internet, deployment of web applications has also increased. These applications are used to perform functions like collecting personal and confidential information like credit and bank account information, internet chatting, sending emails etc.
But these web applications, being easily accessible, are a gateway to the web and database vulnerabilities which are on the rise nowadays.
How your web page acquires vulnerabilities?
  Improper/poor coding of website or web applications
  Complex set up of applications
  Downloading of open source applications – WordPress, Joomla  etc.wikis, bulletin boards, and portals without much upgrade or patching.
What are the common security vulnerabilities that attack web applications?
As per research, a maximum number of web attacks are carried at the web application level. Some of the common vulnerabilities are
SQL injection and Blind SQL injection.
Cross Site Scripting (XSS).
OS Command Injection and remote command access.
File name injection.
ColdFusion, PHP and ASP injection.
E-Mail Injection
HTTP Response Splitting.
Universal PDF XSS.
Trojans & Backdoors Detection
Thus, one needs a strong security solution like MOD SECURITY which detects and blocks these web vulnerabilities on one hand and strengthens the security of the server on the other hand.
What is Mod Security?
Mod Security is an open source, embedded web application firewall which protects your website and its applications against various attacks by blocking malicious scripts, programs and injections with the help of regular expressions and set of rules.
It is a module for Apache web servers and checks all HTTP requests that reach Apache and Nginx- supplementary web server of Apache.
What can Mod Security do to protect your website?
The Mod Security engine scans all the requests which come to the web server and relative responses which are sent from the server as per its set of rules. If the check succeeds, the HTTP request is passed to the website content but if it fails, then it blocks the request and performs following actions
Security monitoring and access control
Virtual patching
 Full HTTP traffic logging
Security assessment
Web application hardening
Passive security assessment
Simple request or Regular expression based Filtering
URL Encoding Validation
Auditing
IP Reputation
 Null byte attack prevention
Server identity masking
Uploads memory limits
How to recognize if Mod Security is installed on the web server?
Recognizing Mod Security is quite easy. For e.g. any website which shows messages like 406 error-Not Acceptable, 403 Forbidden error ,404 Not found error and other false positive symptoms instead of displaying the web page shows that server on which it is hosted has Mod Security installed on it.These messages occur due to the violation of the Core Rules Set (CRS) by the mod security.
You can also check whether your web hosting company is providing it or not by directly logging into your control panel and checking it.
What to do when your IP is blocked/blacklisted?
Regular triggering of Mod Security rules results into blocking of respective IP address in server firewall from which request has been sent regularly.
Blocking off your IP address means nothing is accessible to you on the web server. So, in that case, you need to contact your hosting provider. Note- Mod Security Rules and IP address can be White listed by the support team of the web host only. (Whitelisting your IP will allow any requests from that particular IP which would normally be blocked by Mod Security to be allowed instead.
How to disable Mod Security from Apache module?
If at any point of time you feel that rules of this security tool are interfering with the operations of the website and do not find modification of rules comfortable ,then the best solution for you is to disable Mod Security filtering and rules.
Here’s how you can disable Mod Security for your account/website:
Step 1. Log into your hosting CPanel account
Step 2. Find Mod Security in the search bar
Step 3. Click on Mod Security icon
Step 4. See the dashboard for Mod Security-Domain Manager
Step 5. Final step to disable Mod Security.
Once you have disabled the Mod Security on your account, one essential point you need to consider is that your website will now be at risk from vulnerabilities. If you have any doubt regarding this write up, feel free to drop comments in the section below.
0 notes
webdesignersolutions · 8 years ago
Link
Difficulties redirecting a web page
OK so I have a web page on a sub domain that I need to redirect to a page on the main domain, like this
directory.example.com/submit-site
to
example.com/submit-your-site
the subdomain and main domain are hosted on separate servers too.
This is what I have tried so far:
.htaccess – initially I tried it this way, the problem is that the server where the subdomain is located is a real mess and there has been next to no house keeping done there for years ( I have inherited this from someone else), there are multiple copies of the site with generic names and its difficult for me to identify the right directory that I should be in so I an edit the right .htaccess file.
I did eventually find what I thought was the correct dir and make the redirect in the .htaccess file there but nothing redirects afterwards so I can only assume it was the wrong file or directory?
cpanel redirects – I tried this next in the cpanel account, its fairly straight forwards and I think I did ti correctly but again nothing redirects after so I guess I did something wrong?
I should add that I read in cpanel docs that the above wont work if ModSecurity is enabled and I checked in the httpd.conf file for that and only saw this so it looks like its not running?
<IfModule mod_security2.c> SecRuleEngine Off </IfModule>
httpd.conf & vhosts – this is the last thing I tried. The server that the subdomain is on has numerous websites on it setup as virtualhosts all with different ips. In the httpd.conf file it has this warning above each vhosts block
DO NOT EDIT. AUTOMATICALLY GENERATED. IF YOU NEED TO MAKE A CHANGE PLEASE USE THE INCLUDE FILES.
so I did some reading and found this article about how to make the required changes
http://www.zyxware.com/articles/2714/how-to-make-custom-changes-to-virtualhost-settings-in-httpd-conf-on-a-whmcpanel-vps-without-losing-the-changes
so I created the directory and virtualhost.conf file as specified in the article and then added the vhost block with the redirect in but then got this warning when running '/scripts/ensure_vhost_includes –all-users'
<VirtualHost> cannot occur within <VirtualHost> section
I found a serverfault post about this that advised to add a closing </VirtualHost> at the top but that just threw up even more errors and warnings and I also tried removing the VirtualHost tags from the file and that didnt give any warnings but just like all the other methods above the redirect didnt work too.
So Im pretty stumped right now, any suggestions?
Submitted May 28, 2017 at 08:44PM by easy_c0mpany80 via reddit https://www.reddit.com/r/webhosting/comments/6dy27t/difficulties_redirecting_a_web_page/?utm_source=ifttt
0 notes
webdesignersolutions · 8 years ago
Text
Difficulties redirecting a web page via /r/webhosting
Difficulties redirecting a web page
OK so I have a web page on a sub domain that I need to redirect to a page on the main domain, like this
directory.example.com/submit-site
to
example.com/submit-your-site
the subdomain and main domain are hosted on separate servers too.
This is what I have tried so far:
.htaccess - initially I tried it this way, the problem is that the server where the subdomain is located is a real mess and there has been next to no house keeping done there for years ( I have inherited this from someone else), there are multiple copies of the site with generic names and its difficult for me to identify the right directory that I should be in so I an edit the right .htaccess file.
I did eventually find what I thought was the correct dir and make the redirect in the .htaccess file there but nothing redirects afterwards so I can only assume it was the wrong file or directory?
cpanel redirects - I tried this next in the cpanel account, its fairly straight forwards and I think I did ti correctly but again nothing redirects after so I guess I did something wrong?
I should add that I read in cpanel docs that the above wont work if ModSecurity is enabled and I checked in the httpd.conf file for that and only saw this so it looks like its not running?
<IfModule mod_security2.c> SecRuleEngine Off </IfModule>
httpd.conf & vhosts - this is the last thing I tried. The server that the subdomain is on has numerous websites on it setup as virtualhosts all with different ips. In the httpd.conf file it has this warning above each vhosts block
DO NOT EDIT. AUTOMATICALLY GENERATED. IF YOU NEED TO MAKE A CHANGE PLEASE USE THE INCLUDE FILES.
so I did some reading and found this article about how to make the required changes
http://www.zyxware.com/articles/2714/how-to-make-custom-changes-to-virtualhost-settings-in-httpd-conf-on-a-whmcpanel-vps-without-losing-the-changes
so I created the directory and virtualhost.conf file as specified in the article and then added the vhost block with the redirect in but then got this warning when running '/scripts/ensure_vhost_includes --all-users'
<VirtualHost> cannot occur within <VirtualHost> section
I found a serverfault post about this that advised to add a closing </VirtualHost> at the top but that just threw up even more errors and warnings and I also tried removing the VirtualHost tags from the file and that didnt give any warnings but just like all the other methods above the redirect didnt work too.
So Im pretty stumped right now, any suggestions?
Submitted May 28, 2017 at 08:44PM by easy_c0mpany80 via reddit https://www.reddit.com/r/webhosting/comments/6dy27t/difficulties_redirecting_a_web_page/?utm_source=ifttt
0 notes
webdesignersolutions · 8 years ago
Text
Difficulties redirecting a web page : webhosting
OK so I have a web page on a sub domain that I need to redirect to a page on the main domain, like thisdirectory.example.com/submit-sitetoexample.com/submit-your-sitethe subdomain and main domain are hosted on separate servers too.This is what I have tried so far:.htaccess - initially I tried it this way, the problem is that the server where the subdomain is located is a real mess and there has been next to no house keeping done there for years ( I have inherited this from someone else), there are multiple copies of the site with generic names and its difficult for me to identify the right directory that I should be in so I an edit the right .htaccess file.I did eventually find what I thought was the correct dir and make the redirect in the .htaccess file there but nothing redirects afterwards so I can only assume it was the wrong file or directory?cpanel redirects - I tried this next in the cpanel account, its fairly straight forwards and I think I did ti correctly but again nothing redirects after so I guess I did something wrong?I should add that I read in cpanel docs that the above wont work if ModSecurity is enabled and I checked in the httpd.conf file for that and only saw thi from bitly http://bit.ly/2qtCVb4 via IFTTT
0 notes