Explore Our Latest Updates
Stay informed and inspired with our blogs to navigate and resolve any technical challenges that you may encounter.
Resolving Bash vulnerability in InterWorx servers : How to fix CVE-2014-6217 Bash “Shell Shock” vulnerability
[UPDATE 1st Oct] - More vulnerabilities were reported since this post was originally written on Sep 26th. See the notes at the bottom. Highly critical Bash code injection vulnerability CVE-2014-6217 was declared on 24th Sep, and a patch is now available for InterWorx...
Resolving Bash vulnerability in Parallels Virtuozzo Containers
[UPDATE 1st Oct] - More vulnerabilities were reported since this post was originally written on Sep 26th. See the notes at the bottom. Highly critical Bash code injection vulnerability CVE-2014-6217 was declared on 24th Sep, and a patch is not yet known to be...
Resolving Bash vulnerability in DirectAdmin servers : How to fix CVE-2014-6217 Bash “Shell Shock” vulnerability
[UPDATE 1st Oct] - More vulnerabilities were reported since this post was originally written on Sep 26th. See the notes at the bottom. Highly critical Bash code injection vulnerability CVE-2014-6217 was declared on 24th Sep, and a patch is now available for...
Resolving Bash vulnerability in Parallels Plesk Linux servers : How to fix CVE-2014-6217 Bash “Shell Shock” vulnerability
[UPDATE 1st Oct] - More vulnerabilities were reported since this post was originally written on Sep 26th. See the notes at the bottom. Highly critical Bash code injection vulnerability CVE-2014-6217 was declared on 24th Sep, and a patch is now available for Parallels...
Resolving Bash vulnerability in cPanel/WHM servers : How to fix CVE-2014-6217 Bash “Shell Shock” vulnerability
[UPDATE 1st Oct] - More vulnerabilities were reported since this post was originally written on Sep 26th. See the notes at the bottom. Highly critical Bash code injection vulnerability CVE-2014-6217 was declared on 24th Sep, and a patch is now available for cPanel/WHM...
Is WordPress getting hacked often? Here’s a guide to secure Linux WordPress hosting in Amazon Web Services(AWS) EC2 servers
With WordPress powering 61% of CMS based websites, it has become a lucrative target for hackers. Google blacklisting for phishing and email blacklisting for spamming is quite common in WordPress hosting. A well maintained WordPress site is immune to hacking, but in...
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.