By using cPanel you can create, import, manage and remove SSH keys. These keys will be used when confirming a specific computer has the right to use SSH to connect to your website. Step 1: Login to yo...
What is port Scan? Port Scanning is one of the most popular reconnaissance techniques attackers use to discover services they can break into. All machines connected to a Local Area Network (LAN) or th...
Resource Usage Restrictions Processes Processes invoked by the web server, cron, shell or any other method should not exceed the following limitations: Consume more than 1 GB of RAM. Utilize in excess...
This is best answered by the examples below... For example, a customer signs up with us and has attacks up to 40k PPS or so. Very small, right? Likely, the customer is being attacked by an attacker wh...
The offending site will be suspended and the owner will be given an opportunity to fix the problem or move to a Dedicated server. It is possible that sometimes we suspend a problem directory, but not ...
iFrame injection attacks are not quite as common as they once were on the web, however, from time to time, they do still happen. We were recently alerted to an iFrame injection by one of our users an...
You can not view your website in Firefox or Internet Explorer because the domain is blocked by Google safe browsing. Malicious software found on website is hosted on external domains, most likely some...
Spam assassin is enabled by default on all email accounts. Eicra.com use the following block lists to filter spam emails 1. Spamhaus (SBL-XBL) SBL-XBL is a combination of 2 famous spam checking agains...
You can stop spammers using various different spam filtering systems which are located within your control panel. Spam Assassin Spam Assassin is a mail filter installed on a mail server used to identi...
iFrame injection attacks are not quite as common as they once were on the web, however, from time to time they do still happen. Due to how cPanel forums are configured, you would need to have an acco...