Tag: SSL
Visit our SSL section for all the answers to your Secure Socket Layer related questions including how to buy, generate and auto-renew a certificate.
How To Filter Spam Email
Introduction
Email. We all use it, and we all have spam issues from time to time. Whether you use Gmail, Outlook, Hotmail, Apple Mail, or another type of webmail software, spam is an annoyance that robs us of precious time that should be made available for more worthwhile pursuits. This article will demonstrate multiple methods for filtering out a significant portion of bothersome and inconvenient spam from our inbox.
Threat Stack Intrusion Detection System
Introduction
This article will review some of the more technical aspects of Threat Stack. Threat Stack is a platform-independent intrusion detection system (IDS) designed to provide users with a unique view into various integrated server security functions. It monitors both Linux and Windows servers as well as Kubernetes or other container-based server infrastructures to observe behaviors and detect malicious, uncommon, and risky activity.
What is SIEM? WPSiteSync
Security Information and Event Management (or SIEM) is a subset of the computer security field, where applications and services join forces with security event management and security information management. When united, these disciplines provide significantly improved real-time statistical data and threat analysis of alerts generated by the related applications. The 2021 Internet Security Threat Report from Sophos denotes that are not only the number of attacks on the rise but also the diverse nature of methodologies and vectors of incursions used. This necessitates the fact that adding a SIEM is especially warranted at this time.
Intrusion Detection Systems: Behind the Firewall
What is an Intrusion Detection System?
An intrusion detection system (or IDS) is a hardware device or software program that observers a network or system for security policy violations or malicious activity. Typically, any activity or intrusion violation is reported to either an administrator or is collected and logged in a central location using a security information and event management system (or SIEM) system. This system is a security-based technology developed initially for detecting exploits and vulnerabilities used against a computer or other target applications.
How to Stop Outgoing Email Spam
Introduction
The most effective method to protect a server from sending spam is to prevent it in the first place. In this article, we provide several techniques to use to keep the server from sending out unwanted spam or junk mail. Typically, unwanted, and unsolicited spam email is usually bulk sent out to an indiscriminate list of recipients. Spam is often used for commercial purposes but can be sent out in massive volume by a botnet or a network of infected computers.
How to Locate Open Ports in Linux
What is a Port?
First, let’s define what a port is. According to the IEFT, a port is:
How to Install Thunderbird on CentOS 8 & Ubuntu 20
What is Thunderbird?
Thunderbird is one of the most widely used open-source email clients in the world. Mozilla originally developed the software in 2004, but the project waned in 2014/15, and Mozilla stated that they would only deliver security and maintenance updates in the future. Until recently, the community maintained the software when a Mozilla Foundation subsidiary, MZLA Technologies Corporation, took over. Today, the improvements in security and stability are very much appreciated, and since version 78, Thunderbird has built-in OpenPGP encryption technology enabled by default. Earlier versions used the available PGP technology, but it needed to be installed as a supplemental plugin.
How to Install an SSL on a Core/Unmanaged Ubuntu Server
Why do I Need to Install or Reinstall My SSL Certificate?
According to Globalsign;
How to Install an SSL on a Core/Unmanaged CentOS Server
Why do I Need to Install or Reinstall My SSL Certificate?
According to Globalsign
Changing The SSH Port in WHM/cPanel
While there are many ways to make sure your server is as secure as possible, there are some basic steps that we can take to increase security. Users with a Linux server can change their SSH port to something other than the default port (22). The steps listed below, outline this task providing steps to enable this change.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.