Select Page

Server Security


How to scan server for malware

How to scan server for malware

Google blacklists up to 6,000 websites EVERY DAY for serving malware. Almost all of these sites are classified as “compromised sites”, which means it was infected with malware without the knowledge of the site owner.

A malware infection could lead to loss in SEO ranking, and business reputation. Building back the site traffic could take weeks, if not months.

(more…)

Server security monitoring – Why do it, and what to monitor

Server monitoring services are a dime a dozen. You get an alert when a service (HTTP, SMTP, etc.) goes down. But is that enough for you to keep your server safe and secure?

What if your server is vulnerable to a new software bug, or what if someone is trying to brute force your password? Wouldn’t you want to know, and take action?

That is why Server Security Monitoring is important. (more…)

LFD saying “Suspicious process running under user XXXX”? Here’s how we fixed it

Here at Bobcares, our Dedicated Support Engineers maintain servers of web hosts, web designers, and other online businesses.

In cPanel and Plesk servers, a common error we see from LFD (Login Failure Daemon) is Suspicious process running under user XXXX. (more…)

How to prevent mod-security 403 server errors in webhosting servers

How to prevent mod-security 403 server errors in webhosting servers

[Fri Jul 15 16:03:06 2016] [error] [client 91.***.**.**] ModSecurity: Access denied with code 403, [Rule:'ARGS|!ARGS:/page_content/|!ARGS:file|

This is a common error faced by web hosts, website owners and server owners. It means that the mod-security rules in the web server are blocking access to the users who try to access any URL in their site. (more…)

Are you shunning server updates? Think twice before you do that!

Are you shunning server updates? Think twice before you do that!

Server updates – We all know it’s important, but many often, server owners push aside these server updates, until its too late..

One may have many reasons for that, and most often it happens as we think it’s not that important or a top priority matter. Server owners may also be worried about something going wrong after the update.

In our Emergency support services, we often come across customers who had their servers hacked due to not keeping their servers updated. (more…)

Secure your Windows 2003 and 2008 servers from WannaCry ransomware

Secure your Windows 2003 and 2008 servers from WannaCry ransomware

WannaCry ransomware is all over the news now, causing the internet world to shake in doubt and fear. With over 200,000 computers in 150 countries being affected, the damage is really wide-spread.

For businesses and servers that are affected by this malware, the impact of this attack is huge and can lead to loss of business. As a result, it is important to secure your servers for ensuring their normal functioning. (more…)

A complete 14 point guide to secure cPanel servers

Security is one of the major concerns we tackle in our Outsourced hosting Support for web hosting companies. Server compromises can lead to financial loss and affect the business credibility.

With our expertise managing hundreds of cPanel servers for web hosts, we have been able to identify and address all the security loop holes that can happen in a cPanel server. (more…)

How to fix Root Privilege Escalation vulnerability (CVE-2016-6664) in MySQL, MariaDB and PerconaDB

How to fix Root Privilege Escalation vulnerability (CVE-2016-6664) in MySQL, MariaDB and PerconaDB

MySQL database server is widely used by online businesses to store their critical and valuable data. MariaDB and Percona are other database servers based on MySQL.

But the confidentiality and security of these database servers goes for a toss when one fine morning a vulnerability or exploit in the software gets published.

It was only a couple of months ago that the MySQL vulnerability CVE-2016-6662 ‘Remote Root Code Execution’ / ‘Privilege Escalation’ got revealed.

Two more critical vulnerabilities in MySQL has been revealed recently, which can lead to a server hack by executing arbitrary code and gaining root privilege.

(more…)

How to mitigate Linux “Off-path” TCP exploits (CVE-2016-5696) in CentOS, RedHat, Ubuntu and Debian

How to mitigate Linux “Off-path” TCP exploits (CVE-2016-5696) in CentOS, RedHat, Ubuntu and Debian

If you have a website, chances are that it’s running on a Linux server. And the latest news is that, Linux servers with kernel versions 3.6 to 4.6 are vulnerable to malware injection attacks.

This was demonstrated on Aug 10th, when security researchers injected phishing content “on the fly” on USA Today website.

The good news is, you can protect your servers. Today, we’ll see how. (more…)

Top 5 reasons why 24/7 expert server monitoring is important for security and uptime

Top 5 reasons why 24/7 expert server monitoring is important for security and uptime

People love fast websites, and so does Google. It’s then no surprise that the top spots in Google search results are occupied by fast websites with high uptime.

It’s a popular belief that using a monitoring tool is a good hedge against preventing or recovering from a downtime. In reality, by the time an alert is received, and help called for, a website would have gone down. (more…)

Page 1 of 3123