Month: August 2004

W

What is Link Popularity?

The theory goes something like this: The search engine Powers That Be have decided that if other sites are linking to your site, it must be a winner; therefore, it deserves a boost in rankings

K

Keyword Density: How Much Is Too Much

Copywriting for search engines is one of the more important aspects of the SEO industry. Ensuring your content is relevant and keyword rich is an effective method to “impress” the search engines. By impress, I

H

How to Set Up Server Side Includes in Apache

Setting up server side includes — or SSIs — in Apache is quite easy, we’ll show you how. Most people set up SSIs to allow them to include text files within their Web pages, like

H

How To Install RKHunter

RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don’t have any rootkits, backdoors, and local exploits but running tests and e-mailing you results.

R

Remove T0rnkit v8

Tornkit is a rootkit which lets an intruder have unrestricted access to your dedicated server. This guide will help you remove it.

H

How To make chkrootkit e-mail you daily

Make chkrootkit e-mail you logs daily.

H

How To Install CHKROOTKIT

chkrootkit: shell script that checks system binaries for rootkit modification.

I

Install BFD (Brute Force Detection)

BFD is a modular shell script for parsing applicable logs and checking for authentication failures.

D

Disable Telnet Access

Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and ‘crackers/hackers’ can obtain these passwords easily compared to SSH, and then takeover your dedicated web server.

F

Force the use of SSH protocol 2

SSH Protocol 1 based systems are facing many automated “root kits”. As a result to step up the security Protcol 2 should be enabled as soon as possible.