Basic .htaccess Security Tips
Thursday, March 13th, 2014Tavis J. Hampton  
ARTICLE If you web host runs Apache HTTP server to host your website, it might also allow users like you to utilize .htaccess files. If you are not sure if your host does allow them, you should check the host’s documentation...

AllowOverrideapachechmodconfiguration filehtaccess

Unified Threat Management for Comprehensive Hosting Security
Monday, March 3rd, 2014Tavis J. Hampton  
ARTICLE Many managed hosting solutions now offer something called unified threat management (UTM). Rather than having separate solutions for firewall, anti-virus, intrusion detection, etc., all of it is rolled into one unified solution. All of it is managed through a single...

anti-spamanti-viruscontent filteringconverged infrstructurefirewall

5 Security Tips for a New VPS User
Thursday, February 20th, 2014Tavis J. Hampton  
ARTICLE Your brand new virtual private server (VPS) will open you up to a whole new world of possibilities and power. It will also open you up to a new world of security threats. If you are accustomed to having most...


Error Message Security
Thursday, January 30th, 2014Tavis J. Hampton  
ARTICLE One big part of web hosting that is easy to overlook is error message security. Every website is bound to display an error message from time to time, whether it is for a failed login attempt or an incorrect page...

apacheattackerCentOScyber criminalserror message

Time to Revisit Your Password Security
Wednesday, January 22nd, 2014Tavis J. Hampton  
ARTICLE The annual list for the top (worst) passwords is out, and it does not bode well for password security. While many people have moved on from last year’s “password”, many have chosen “123456” as a replacement. Other favorites include “abc123”,...

APGcloudencryptedpasswordpassword generator

Security: 5 Security Questions You Should Ask Your Hosting Provider
Thursday, November 14th, 2013Tavis J. Hampton  
ARTICLE Your relationship with your web hosting provider should involve trust and cooperation. You should go into the relationship having full confidence that your data and your privacy will be safe. The only way to have that type of confidence is...

hardwarehosting provideroperating systempoliciessecurity

Increase Security with Fail2Ban Intrusion Protection
Friday, October 25th, 2013Tavis J. Hampton  
ARTICLE When it comes to hosting security, the relevant question is not if someone will attempt to attack your server, it is when they will attempt it. If you are prepared for it, you may save your websites from harm. If...

banbrute force attackCentOSFail2baninstall

How to Use Secure Copy (SCP) to Transfer Files to Your Website
Tuesday, September 10th, 2013Tavis J. Hampton  
ARTICLE There are many ways to transfer files to and from a web server. The most common method is FTP (file transfer protocol), but it is not secure and opens up your website to the possibility of being exploited. Among the...

file transferfreeBSDFTPgraphicallinux

Best Practices for Database Password Security
Monday, August 19th, 2013Tavis J. Hampton  
ARTICLE The stakes are pretty high when it comes to database password security. In many instances, all of a website’s data is stored within one or more databases. If an attacker manages to gain access, all of that data, which may...

algorithmsAPGdatabase securityencryptionlinux

How Secure is Open Source Web Software?
Wednesday, June 26th, 2013Tavis J. Hampton  
ARTICLE The primary feature of free and open source software is that its code is available for everyone to view. Running such software on the web is inexpensive and may even give you quality results, but is it secure? If anyone...

Apache HadoopCodeexploitsopen sourceproprietary