Distributed denial of service attacks are frustrating — they’re frustrating for the company under attack, and frustrating for the web host. They can also be costly in terms of business and goodwill lost. Fortunately, there are ways to deal with them, if you are willing to prepare for the possibility of a DDoS before it happens.
Ok first just take a breath, you are getting nothing done by worrying. This guide is meant to try and help mitigate the effects of an attack that is in progresss. I have compiled a lot of the things that I do but it is very possible I have forgotten something. Please feel free to add suggestions at the bottom if you would do it a different way or if this works good for you.
This guide is not meant to take the place of a professional looking at your server but it should give you a very good idea of what is going wrong and point you in the right direction to solving the problem. A lot of this requires you to have an idea of what is happening with your server on a normal basis so you can see what is abnormal with it. It would not be a bad idea to run a few of these tests to see what is normal under your normal busy periods.
Continue reading HELP! My server is under a DDOS attack!
Eaccelerator is a PHP accelerator/encoder/caching utility that is based off of the old mmcache (which is no longer being maintained).
What Eaccelerator does is: it caches your PHP scripts so that the database is no longer being queried everytime someone needs a script. This is particularly useful for large forums, but pretty much anyone can benefit from it. Since these scripts are cached, you’ll notice a decrease in memory use and server load.
Continue reading PHP optimization How-To: Installing Eaccelerator
>Server security is as important as network security because servers
often hold a great deal of an organization’s vital information. If a
server is compromised, all of its contents may become available for the
cracker to steal or manipulate at will. The following sections detail
some of the main issues.
Continue reading Server Security Considerations
This tutorial is for system admins and will run you through how to Detect and Clean a hacked cPanel server with T0rnkit
Continue reading Detect and Clean a hacked cPanel server with this T0rnkit Tutorial
Disguising your server signature is always a good idea as you wont reveal the operating system to potential script kiddies and hackers.
Continue reading How to change your server signature
Check out those basic rules to avoid spam robots to use your email for spaming !
Continue reading HERE ARE SIX SIMPLE THINGS YOU CAN DO TO HELP KEEP SPAM AT BAY
RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.
chkrootkit: shell script that checks system binaries for rootkit modification.
Continue reading How To Install CHKROOTKIT
BFD is a modular shell script for parsing applicable logs and checking for authentication failures.
Continue reading Install BFD (Brute Force Detection)