How FTP Works ?

What is FTP?

FTP or file transfer protocol is a commonly used protocol for exchanging files over any network that supports the TCP/IP protocol (such as the Internet or an intranet). There are two computers involved in an FTP transfer: a server and a client. The FTP server, running FTP server software, listens on the network for connection requests from other computers. The client computer, running FTP client software, initiates a connection to the server.

(more…)

Zend Guard – Protect your PHP code

Zend Guard – Protect your PHP code

Zend Guard is the most widely distributed PHP encryption product on the market. Available for over 7 years, Zend’s dedicated team of developers makes it the most stable and robust encoder on the market. It protects PHP 4 and PHP 5 applications from reverse engineering, unauthorized customization, unlicensed use and redistribution.

(more…)

Jailshell

Jailshell

When you try to run some commands in console, jailshell enabled user accounts on cPanel server give this error sometimes.

-jailshell: fork: Resource temporarily unavailable

This is a bug in cPanel’s jailshell. Commands such as ls, cat etc returns this error.

(more…)

Anonymous FTP Access

Anonymous FTP Access

Anonymous FTP allows a user to retrieve documents, files, programs, and other archived data from anywhere in the Internet without having to create a userid and password. With the special userid of “anonymous” the network user can bypass local security checks and have access to publicly accessible files on the remote system. You can allow anonymous FTP access to visitors wishing to download or upload files to your web site as if you were running your own FTP server.

(more…)

What is Brute Force Attack?

What is a brute force attack and how to prevent this attack?

Brute force attack is a very common method, it is nothing but a simple script used to crack the password. The script uses every possible character combination as a password until it finds the right one, and in order to recover one character from the password (a-z), characters are enough. Once the password is hacked, the hackers could do any possible damage to your data stored on the server.

(more…)

What is SSH PORT?

Secure Shell Port

SSH or Secure Shell is a cryptographic association show for working alliance benefits securely over an unsteady association. Typical applications consolidate inaccessible request line, login, and distant request execution, anyway any association organization can be gotten with SSH.

(more…)

SpamAssassin

SpamAssassin

The Spam Assassin is software for scanning email messages & determining their probability of being a spam, and reporting its outcome. The software compares different parts of email messages with a large set of rules. Each rule adds or removes points from a message’s spam total score. A message with a substantial enough score is labeled to be spam.

(more…)

Mod_Security

mod_security: what exactly does it block?

mod_security is one of the important security tweak we perform on a server when try to secure our server. mod_security integrates with Apache to stop attackers from being able to issue commands to the server through vulnerable scripts and software packages which are installed on the server. By default, mod_security blocks from being called from within a URL.

(more…)