Articles

 Do you provide DDoS protection? How does it work?

We provide inbound DDoS filtering options for all our services where stated.DDoS Protection is...

 How do I block an IP address in my Linux Server?

If you want to block an IP to access your linux server, you will need to login to the shell as...

 How to check if your Linux server is under DDOS Attack?

Login to your server as root and fire the following command, using  which you can check if your...

 How to Harden PHP in WHM/cPanel Servers

PHP exploits are responsible for the vast majority of compromised servers. OverviewThis document...

 How to install ClamAV on CentOS

This document will guide you through the installation of ClamAV on CentOS.ClamAV is an open...

 Installing DOS Deflate to mitigate small SYN attacks

(D)DoS Deflate is a lightweight bash shell script designed to assist in the process of blocking a...

 Protect your Wordpress from Brute Force Attacks

A Brute Force attack uses a variety of different usernames and passwords to gain access to your...

 What is a DDoS attack?

DDoS attacks are an attempt by a malicious party to overload systems and networks with malicious...