Tag: Security
Enhance the security of your server by reading through our easy to follow tutorials. From installing firewalls to auto-renewing SSLs, our expansive library is sure to be your bookmark favorite.
Changing The SSH Port in WHM/cPanel
While there are many ways to make sure your server is as secure as possible, there are some basic steps that we can take to increase security. Users with a Linux server can change their SSH port to something other than the default port (22). The steps listed below, outline this task providing steps to enable this change.
How to Install and Configure Rancher K3s
What is Rancher K3s?
K3s is an official Cloud Native Computing Foundation sandbox project that brings a lightweight, fully compliant Kubernetes distribution designed for lower resource production models like remote locations or on an IoT device. When used in conjunction with Rancher, K3s can easily be managed from within the Rancher orchestration platform.
How to Implement Zero Trust Security in 5 Steps
What is Zero Trust Security?
Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.
How to Repair the DNS DCV Error in cPanel
How Using Cloudflare Affects AutoSSL in cPanel
We have provided information about Cloudflare, AutoSSL, and the advantages of utilizing those services in previous articles. In this article, we will focus on solving one of the specific issues seen when using Cloudflare and AutoSSL together on a cPanel/WHM server. These services function admirably in almost every setting and can be relied upon to deliver the service they advertise. However, in certain situations, services can clash through no fault of their own.
How Was My Website Compromised?
In this tutorial, we will look at several methods that are used to compromise a website. In today's world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business.
Remote Desktop Protocol (RDP) is the easiest and most common method for managing a Windows server. Included in all versions of Windows server and has a built-in client on all Windows desktops. There are also free applications available for Macintosh and Linux based desktops. Unfortunately, because it is so widely used, RDP is also the target of a large number of brute force attacks on the server. Malicious users will use compromised computers to attempt to connect to your server using RDP. Even if the attack is unsuccessful in guessing your administrator password, just the flood of attempted connections can cause instability and other performance issues on your server. Fortunately, there are some approaches you can use to minimize your exposure to these types of attacks.
How to Install and Configure the Kubernetes Dashboard
The web-based Kubernetes console is an interface that provides information about the state of the Kubernetes cluster. The dashboard is also used for deploying containerized applications as well as for general cluster resource management. Traditionally, kubectl is primarily used in the terminal for nearly all cluster related tasks. Still, it is useful to have a visual representation of our cluster in a user-friendly interface. To install the dashboard, kubectl needs to be installed and running on the server.
How to Install Kubernetes Using Kubeadm on Ubuntu 18
What is Kubernetes?
In this article, we review what Kubernetes and Kubeadm are, how to install, create a cluster, and set up worker nodes using Kubeadm. If you are not yet familiar with Kubernetes, we recommend reading our article on the fundamental basics of Kubernetes.
How to Install and Configure Minikube on Ubuntu
Introduction
This article will demonstrate how to install and configure Minikube to set up a small Kubernetes cluster. We will then examine Kubernetes in more detail to apply that knowledge to a real-world example.
How to Install Kubernetes on Ubuntu, macOS, and Windows
What is Kubernetes?
Kubernetes (or K8s) is an open-source container orchestration system for automating computer application deployment, scaling, and management. Kubernetes manages and runs Docker containers on numerous hosts. The project was started by Google and is supported by many companies, including Microsoft, RedHat, IBM.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.