How to check and stop if DDoS attack is going on.

Distributed denial-of-service attacks
In a distributed attack, the attacking computers are often personal computers
with broadband connections to the Internet that have been compromised by viruses
or Trojan horse programs. These allow the perpetrator to remotely control machines
to direct the attack, and such an array of computers is called a botnet. With
enough such slave or zombie hosts, the services of even the largest and most well-connected
websites can be disrupted.

Continue reading How to check and stop if DDoS attack is going on.

Installing and configuring Linux CDP Agents

R1Soft CDP is a easy to install and use continous data protection
system, primarily targeted at the hosting market. It backups up
multiple servers to a central backup server; multiple backup windows
can be performed per day, and files or even the whole disk can be
restored from the image. This tutorial will show you how to install the Linux Agent on a server which you want to be backed up, and how to
configure it.

Continue reading Installing and configuring Linux CDP Agents

cPanel Name Server Setup

It seems no matter which flavor of linux / unix you are running and which control panel software that setting up custom name servers is always a problem. This How-To will be for installing name servers on a Linux CPanel server. Custom Name Servers are great because you can provide your webhosting customers with ns1.yourcompany.com instead of your server / upllink providers name servers. You will also know how to install Custom name servers for your reseller accounts.
Continue reading cPanel Name Server Setup

APF firewall. Daily automated email showing firewall status

Charles Sweeney writes : This is how to get your server to send you a daily email showing the status of your APF firewall. In other words, letting you know if it’s running or not!
APF firewall. Daily automated email showing firewall status

Continue reading APF firewall. Daily automated email showing firewall status

Syctl.conf Hardening

The purpose of syctl hardening is to help prevent spoofing and dos attacks. This short guide will show what I have found to be a good configuration for the sysctl.conf configuration file. The most important of the variables listed below is the enabling of syn cookie protection. Only place the bottom two if you do not want your server to respond to ICMP echo, commonly referred to as ICMP ping or just ping requests. Continue reading Syctl.conf Hardening

Security Guide for cPanel servers

You must keep your box secure at all times, getting compromized could lead to dataloss, which means you loose clients which isnt a very good way to run your buisness. You dont have to be an expert, there are just simple instructions you have to follow, check your box daily for any unknown proccesses, cheak on your clients regularly to make sure they are not up to no good. The easiest of steps can make you that one bit more secure which helps.
Continue reading Security Guide for cPanel servers

Dealing With Distributed Denial of Service Attacks

Distributed denial of service attacks are frustrating — they’re frustrating for the company under attack, and frustrating for the web host. They can also be costly in terms of business and goodwill lost. Fortunately, there are ways to deal with them, if you are willing to prepare for the possibility of a DDoS before it happens.

Continue reading Dealing With Distributed Denial of Service Attacks