Eaccelerator is a PHP accelerator/encoder/caching utility that is based off of the old mmcache (which is no longer being maintained).
What Eaccelerator does is: it caches your PHP scripts so that the database is no longer being queried everytime someone needs a script. This is particularly useful for large forums, but pretty much anyone can benefit from it. Since these scripts are cached, you’ll notice a decrease in memory use and server load.
Continue reading PHP optimization How-To: Installing Eaccelerator
>Server security is as important as network security because servers
often hold a great deal of an organization’s vital information. If a
server is compromised, all of its contents may become available for the
cracker to steal or manipulate at will. The following sections detail
some of the main issues.
Continue reading Server Security Considerations
This tutorial is for system admins and will run you through how to Detect and Clean a hacked cPanel server with T0rnkit
Continue reading Detect and Clean a hacked cPanel server with this T0rnkit Tutorial
Disguising your server signature is always a good idea as you wont reveal the operating system to potential script kiddies and hackers.
Continue reading How to change your server signature
Check out those basic rules to avoid spam robots to use your email for spaming !
Continue reading HERE ARE SIX SIMPLE THINGS YOU CAN DO TO HELP KEEP SPAM AT BAY
RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.
Continue reading How To Install RKHunter
chkrootkit: shell script that checks system binaries for rootkit modification.
Continue reading How To Install CHKROOTKIT
BFD is a modular shell script for parsing applicable logs and checking for authentication failures.
Continue reading Install BFD (Brute Force Detection)
Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server.
Continue reading Disable Telnet Access
SSH Protocol 1 based systems are facing many automated “root kits”.
As a result to step up the security Protcol 2 should be enabled as soon as possible.
Continue reading Force the use of SSH protocol 2