Categories

A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

How to block an IP(IP range) in CSF

You can block a single IP address or IP range from WHM interface or from the server bash/ SSH shell.

Block an IP from WHM:

Log in to WHM as root. Navigate to Plugins section >> ConfigServer Security & Firewall  Explore for the Quick Deny section/button >> Enter the IP address or IP range in the red edit box that […]

How to remove ipaddress block from new cphulk (through SSH on cPanel server)

It’s by design the IP addresses are unreadable in the database. The “Blacklist Management” tab in the cPHulk interface allows you to remove an IP address from the interface. You can also unblock an IP address from the iptables block out with a command such as:

Code: /scripts/hulk-unban-ip IP-HERE ** Please change IP-HERE with IP […]

AntiVirus Software Review Product Comparisons

\r\n

\r\n

\r\n

Why Buy Antivirus Software?

\r\nToday, an unprotected computer isn’t just vulnerable, it’s probably already infected. New viruses, spyware, trojans, worms, and other malware are created every day. New threats are disguised to bypass other security measures, and specifically designed to catch you and your PC off guard.\r\n\r\nThe virus landscape […]

Worm or Virus – What is the Difference?

\r\n\r\nEveryone has been infected with a virus at one time or another either through the common cold or the flu. A virus attacks the human body by entering through one of the many openings and attaching itself to a host cell. It releases a piece of genetic information into the cell and recruits the cell’s […]

Top Rogue Scanners to Avoid

Fake Antivirus scanners, or Rogue scanners come in many forms. Many alter the properties of your browser window to make it look like a legitimate program, when in reality, it’s just a browser window. Others, executed via active-x, script or injected via a Virus, will actually look like a running program. These programs have a […]

SQL Injection: How To Prevent Security Flaws In PHP / MySQL

\r\n

\r\n

\r\n

\r\n

\r\n

What is SQL Injection\r\nMost new web developers have heard of SQL injection attacks, but not very many know that it is fairly easy to prevent an attacker from gaining access to your data by filtering out the vulnerabilities using MySQL extensions found in PHP. An SQL injection attack occurs when […]

ASP.Net Vulnerability Patch released: Microsoft Security Bulletin MS10-070

ASP.net Vulnerability patch released […]