5 Basic Server Security Tips

As we approach the end of the year, now might be a good time to review your security practices and fix any weaknesses in your system. The following are 5 basic security tips to keep your server secure.
1. Secure remote access – Whenever possible limit the amount of remote access users can obtain, and secure […]

How to Prevent Outgoing Spam on Your Server

Often when we think of spam, it usually relates to incoming spam inundating mail servers and bogging down systems. Another way spam can harm your dedicated server is from the inside.
Many spammers do not setup their own servers or paid hosting accounts to send spam. They want to be anonymous. Therefore, they often use other […]

Should You Offer SSH Access?

With a Linux or Unix dedicated server, you will probably access it via SSH on a regular basis. It is an essential feature for server system administrators. For other users, however, it is usually not essential and may even be a security risk. Do your hosting customers or company employees need access? A lot of […]

Best Practices for Password Security

In most cases, your password is the only thing standing between your server and all of its treasures, and the horde of violent hackers waiting to rip it to pieces.  Your password is your safeguard.  Without it, you have no access, and if it falls into the wrong hands, you are deep trouble.
There are several […]

5 Horrible Server Security Practices

There are plenty of horrible ways to get your server hacked, cracked, botnetted, malwared, spammed, virus infected, and any number of awful scenarios, but some are worse than others. I have more sympathy for a server administrator who is subjected to SQL injections and other stealthy, even sinister plots. They probably did not […]

How to Lock User Accounts After Login Failure

Few web hosting users are robotic enough to always type their usernames and passwords perfectly every time they try to log in, but repeated failed attempts to access an account could be evidence of a security problem. As a precaution, it is a good idea to have accounts locked after a number of failed […]

Linux Server Password Complexity

On a dedicated server, password complexity determines the length and character combinations of user passwords. In Linux password management is controlled by PAM (pluggable authentication modules), which is installed by default.
Unfortunately, configuring PAM is no walk in the park. Once you figure it out, however, you will not have to configure it very […]

Server User Password Management: Best Practices

Managing a dedicated server requires a bit of babysitting. Even though most website owners and users have been told once or possibly even several times to make secure passwords, many do not. They may actually have pretty good reasons to use weak passwords, especially if they have multiple accounts in various systems.
Because of […]