How to Optimize and Secure a Virtual Private Server (VPS)

How to Optimize and Secure a Virtual Private Server (VPS)

This article covers a wide range of methods for securing and optimizing your VPS. We do not provide any warranty for this article, so if you are not sure what you are doing please make sure you research before you do it.

Secure cPanel/WHM and the Root User on VDS:

Checking for formmail:

Form mail is used by hackers to send out spam email, by relay and injection methods. If you are using matts script or a version of it, you may be in jeopardy.

Command to find pesky form mails:
find / -name “[Ff]orm[mM]ai*”

CGIemail is also a security risk:
find / -name “[Cc]giemai*” View more

Leave a Comment

Security Defender Removal Guide

Security Defender is a computer infection from the Rogue.PCDefPlus family of rogue anti-spyware programs. This infection is considered a rogue because it deliberately displays false scan results, false security alerts, and hijacks your computer so that you are unable to run your normal applications. This infection is promoted as a utility that is required to view an online video, but actually installs the Security Defender infection instead. View more

Tagged: Leave a Comment

5 Useful windows shortcuts

Press the Windows key + D to quickly bring up your desktop.” View more

Leave a Comment

IP Addresses Explained

Every machine on the the Internet has a unique number assigned to it, called an IP address. Without a unique IP address on your machine, you will not be able to communicate with other devices, users, and computers on the Internet. You can look at your IP address as if it were a telephone number, each one being unique and used to identify a way to reach you and only you. View more

Leave a Comment