What is ransomware? Ransomware is a kind of cyber attack that involves hackers taking control of a computer system and blocking access to it until a ransom is paid. For cyber criminals to gain access to the system they need to download a type of malicious software onto a device within the network. This is often ..
The default setting for safe mode does not have the uninstaller service running. Here is how to set up the system to enable the running of the uninstaller service in safe mode. The method involves editing the Registry and is for experienced PC users only. Open the Registry Editor Navigate to the Registry key: HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ ..
How to use xRDP for remote access to Ubuntu 14.04 To remotely control my Windows machines, I always prefer to use RDP (Remote Desktop Protocol) as it performs much nicer than VNC . Desktop Manager Since the current desktop manager of Ubuntu (Unity which runs on Gnome) no longer seems to work with xRDP, an alternative desktop manager ..
The root’s ssh remote shell access is denied by default. Any attempt to remote login as root will result in Permission denied message: $ ssh email@example.com firstname.lastname@example.org’s password: Permission denied, please try again. email@example.com’s password: In order to enable root ssh login on Ubuntu 16.04 Xenial Xerus Linux run the following command: $ sudo sed ..
Difference between XEN, KVM and OpenVZ? Cloud Servers employ a technology known as virtualization: a technique where a physical server (known as node) is divided into virtual private servers (known as VPS, SSD-VPS, Storage-VPS, or VMs), which make it appear as if your site is running on a dedicated server. There are three major types ..
1. Install Mod SSL In order to set up the self signed certificate, be sure that Apache and Mod SSL are installed on our VPS. You can install both with one command: yum install mod_ssl 2. Create a New Directory Now, we need to create a new directory where we will store the server key and ..
How To Change the SSH Port for Your Linux Server Connect to your server via SSH. Switch to the root user. Run the following command: vi /etc/ssh/sshd_config Locate the following line: # Port 22 Remove # and change 22 to your desired port number. Restart the sshd service by running the following command: service sshd ..
After fresh system installation the root login on the Debian Linux is disabled by default. When you attempt to login as root user to your Debian Jessie Linux server the access will be denied. To enable SSH login for a root user on Debian Linux system you need to first configure SSH server. Open /etc/ssh/sshd_config ..
cPanel installation guide First install screen so you don’t have to look at cPanel while it installs for an hour. yum install screen -y 2. Open screen. screen 3. Run the following command. cd /home && curl -o latest -L https://securedownloads.cpanel.net/latest && sh latest 4. Hit ctr + a + d to detach screen. 5. Use ..
We recommend to do the following in order to make your cPanel & WHM server more secure. Use strong and secure passwords In order to increase the security of your server never use passwords that include dictionary words or significant dates. You need to use strong and complex passwords like ex: %gbAs41hoG9*! . Edit the /etc/login.defs file to ..