The theory goes something like this: The search engine Powers That Be have decided that if other sites are linking to your site, it must be a winner; therefore, it deserves a boost in rankings (when all else is equal). If you think about it, this makes a lot of sense. People link to good sites, not bad ones.
Continue reading What is Link Popularity?
Copywriting for search engines is one of the more important aspects of the SEO industry. Ensuring your content is relevant and keyword rich is an effective method to “impress” the search engines. By impress, I mean that the majority of search engines value optimized content with keyword-laden text. However, if you have too much keyword density, Google and others can consider this spam, and may penalize your site.
Continue reading Keyword Density: How Much Is Too Much
Setting up server side includes — or SSIs — in Apache is quite easy, we’ll show you how.
Most people set up SSIs to allow them to include text files within their Web pages, like a regular footer or nav bar. Of course you can do other useful things, like echoing a date or even executing CGIs — but first, you have to configure Apache to use server side includes.
Continue reading How to Set Up Server Side Includes in Apache
RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.
Continue reading How To Install RKHunter
Tornkit is a rootkit which lets an intruder have unrestricted access to your dedicated server. This guide will help you remove it.
Continue reading Remove T0rnkit v8
chkrootkit: shell script that checks system binaries for rootkit modification.
Continue reading How To Install CHKROOTKIT
BFD is a modular shell script for parsing applicable logs and checking for authentication failures.
Continue reading Install BFD (Brute Force Detection)
Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server.
Continue reading Disable Telnet Access
SSH Protocol 1 based systems are facing many automated “root kits”.
As a result to step up the security Protcol 2 should be enabled as soon as possible.
Continue reading Force the use of SSH protocol 2