Unified Threat Management for Comprehensive Hosting Security
Monday, March 3rd, 2014Tavis J. Hampton
ARTICLE Many managed hosting solutions now offer something called unified threat management (UTM). Rather than having separate solutions for firewall, anti-virus, intrusion detection, etc., all of it is rolled into one unified solution. All of it is managed through a single...
anti-spamanti-viruscontent filteringconverged infrstructurefirewall
5 Security Tips for a New VPS User
Thursday, February 20th, 2014Tavis J. Hampton
ARTICLE Your brand new virtual private server (VPS) will open you up to a whole new world of possibilities and power. It will also open you up to a new world of security threats. If you are accustomed to having most...
Error Message Security
Thursday, January 30th, 2014Tavis J. Hampton
ARTICLE One big part of web hosting that is easy to overlook is error message security. Every website is bound to display an error message from time to time, whether it is for a failed login attempt or an incorrect page...
apacheattackerCentOScyber criminalserror message
Time to Revisit Your Password Security
Wednesday, January 22nd, 2014Tavis J. Hampton
ARTICLE The annual list for the top (worst) passwords is out, and it does not bode well for password security. While many people have moved on from last year’s “password”, many have chosen “123456” as a replacement. Other favorites include “abc123”,...
Security: 5 Security Questions You Should Ask Your Hosting Provider
Thursday, November 14th, 2013Tavis J. Hampton
ARTICLE Your relationship with your web hosting provider should involve trust and cooperation. You should go into the relationship having full confidence that your data and your privacy will be safe. The only way to have that type of confidence is...
hardwarehosting provideroperating systempoliciessecurity
Increase Security with Fail2Ban Intrusion Protection
Friday, October 25th, 2013Tavis J. Hampton
ARTICLE When it comes to hosting security, the relevant question is not if someone will attempt to attack your server, it is when they will attempt it. If you are prepared for it, you may save your websites from harm. If...
banbrute force attackCentOSFail2baninstall
How to Use Secure Copy (SCP) to Transfer Files to Your Website
Tuesday, September 10th, 2013Tavis J. Hampton
ARTICLE There are many ways to transfer files to and from a web server. The most common method is FTP (file transfer protocol), but it is not secure and opens up your website to the possibility of being exploited. Among the...
Best Practices for Database Password Security
Monday, August 19th, 2013Tavis J. Hampton
ARTICLE The stakes are pretty high when it comes to database password security. In many instances, all of a website’s data is stored within one or more databases. If an attacker manages to gain access, all of that data, which may...
How Secure is Open Source Web Software?
Wednesday, June 26th, 2013Tavis J. Hampton
ARTICLE The primary feature of free and open source software is that its code is available for everyone to view. Running such software on the web is inexpensive and may even give you quality results, but is it secure? If anyone...
Apache HadoopCodeexploitsopen sourceproprietary
How Government Data Mining May Impact Your Website’s Security
Wednesday, June 12th, 2013Tavis J. Hampton
ARTICLE Website security has always been a concern for web and systems administrators, and it has more recently become a serious concern for users who are increasingly asked to provide and store personal information on websites and in the cloud. Recent...
apple Blacknight blog cloud Cloud computing cloud hosting cloudlinux Codero colocation cPanel Data Center data centers DDoS dedicated server Dedicated Servers Facebook Globalsign Go Daddy Google handy backup hosting i2Coalition ICANN linux Managed Hosting microsoft novosoft open-xchange open source Parallels Phoenix NAP R1Soft security SEO ServInt Softaculous softlayer spamexperts ssl virtualization VMware VPS web hosting windows wordpress
Latest from Gawkwire
Top Web Hosts