How to Stop and Disable Firewalld

Firewalld is a lightweight Linux firewall, but sometimes you may need to stop or disable it. This guide explains when it’s safe to turn it off, how to stop or disable it with Systemd, and what to do on UFW-based systems. Since disabling a firewall leaves your server exposed, safer alternatives include adjusting rules, opening only needed ports, or using zones. Always re-enable protection or ensure another firewall layer is in place.

Content Security Policy (CSP) Headers – Complete Reference Guide

Web security isn’t optional anymore. If you’re running a website in 2025, you absolutely need Content Security Policy headers configured. CSP is your first line of defense against cross-site scripting (XSS) attacks, code injection, and a host of other threats that can compromise your site and your users’ data. This guide walks you through everything Read More >

How To Open a Port in UFW

UFW makes managing firewall ports simple, helping you open, close, and verify access for web services, databases, and remote tools. This guide shows how to configure rules safely, check port status, and follow best practices like limiting access by IP, auditing regularly, and documenting changes. UFW is just one layer. If paired with updates, SSH keys, intrusion detection, and DDoS protection, it strengthens your server’s overall security. With the right setup, you’ll balance accessibility and protection while keeping your applications reliable and secure.

Why You Need To Keep Your Website’s PHP Version Up-to-Date

Running an outdated PHP version on your website is like leaving your front door unlocked in a high-crime neighborhood. You’re not just risking a break-in, you’re practically inviting it. If you’re still running PHP 7.4 or earlier, you’re sitting on a ticking time bomb that could explode at any moment, taking your website, customer data, Read More >

How to Use Monarx Security’s “Detect” Mode

In this article, we will focus on how to access the Monarx Dashboard to monitor your server’s security, and how to understand the results you have access to with “Detect” mode. Topics include: Accessing Monarx Security via Root WHM Understanding the Monarx Scan Results No Compromised Files Detected Compromised Files Detected Proactive Protection Safeguarding your Read More >

How to Remove the “Site is Unsafe” Warning

When you manage a website, your site may come under attack from a hacker or malware that can affect your viewers.  To help identify problem sites, some anti-malware software companies have extended their protection to include websites.  Websites that are detected to have malware or determined to be unsafe are often blocked by web protection Read More >

What is Monarx Security?

Monarx Security is a top-notch anti-malware solution that safeguards websites and applications developed using PHP and other programming languages. With its comprehensive threat detection and prevention system, Monarx Security protects against a wide range of threats, including web shells, adware, phishing, mailers, and more. If you’re an InMotion Hosting customer, you can watch Monarx Security Read More >

How to Log into Your Cisco ASA Firewall

Cisco Adaptive Security Appliance (ASA) 5500-X series firewalls are a hardware security add-on available for securing Dedicated Server Hosting plans. Having the Cisco ASA firewall inspect traffic before it reaches your server environment has great benefits: Reduce the load on web application firewall (WAF) solutions including ModSecurity and Fail2ban Conserve system processing power to improve Read More >

How to Encrypt Files with GPG

Encrypting files with GNU Privacy Guard (GPG) is one of the best known ways to protect your most critical data. If you have already followed our guide on creating a GPG key, you are now ready to encrypt files using your key, rendering these files readable only to people you have designated. Most Often Used Read More >

Giving Your Developer Access to Your Account

If you hire a developer or designer, there are a few different ways to provide them access to your website. Different types of websites require different types of access. In this article, we’ll walk you through the different levels of access you can give your developer and how to safely provide that account access. Levels Read More >

ClamAV or ImunifyAV Free – Which 1 is the Best cPanel Antivirus Scanner

Antivirus, anti-virus, AV, or anti-malware scanners protect users from uploading and using malicious data on your Linux VPS. While your choice of Linux operating system (OS), or distribution (distro), can change the probability for successful cyber attacks, it won’t negate it altogether. There are many free AV scanners for every OS including Bitdefender, MalwareBytes, and Read More >

Install Splunk on Linux – Complete Setup Guide

We have many guides on securing common web hosting solutions: cPanel servers, bare cloud servers, and even the popular WordPress content management system (CMS). Each includes great technical controls for a proactive approach to defense in depth. However, nothing can detect and prevent everything. The only way to address this is to apply administrative controls, Read More >

How to Hide your WordPress Admin URL with iThemes Security

Hiding your WordPress login URL is an excellent way to vastly increase the security of your site, especially from brute force attacks. In this article, we will show you how to effectively and easily change your WordPress admin URL with just a few clicks. Hiding your WordPress Admin URL First, log in to your WordPress Read More >

How to Open a Port in Firewalld

After you install Firewalld, the first thing you’ll likely want to do is open a port to connect with web applications on your Linux server. Only dhcp6-client and SSH are enabled by default. However, opening ports with Firewalld is an easy process. The first reason is that the commands are straightforward and easy to remember. Read More >

How to Install Firewalld on Linux

Firewalld is a front-end manager that allows users to easily manage Linux firewall rules. It has become a popular option for securing Linux web hosting servers throughout the last few years. It’s installed by default on many newer Linux distribution releases. An unique advantage to the command-line interface (CLI) application is that ruleset changes are Read More >

How to Configure Firewalld (Basic Commands)

Installing Firewalld grants a long list of commands available for configuring iptables rules. But there are a few tasks you should understand to get started with securing your server. Below we cover: Firewalld is pre-installed with our Cloud Server Hosting. Basic Firewalld Commands Firewalld Status These Systemd and Firewalld commands affect whether or how Firewalld Read More >

Check if a Port is Blocked with Netcat / Ncat

If you’re unable to connect to FTP, MySQL, or another service on your server, the port could be blocked by a firewall at any points before the actual software: Local workstation Local network router Virtual private network (VPN) or proxy DNS Resolver Internet service provider (ISP) (e.g. Verizon) Web application firewall (WAF) (e.g. Sucuri) Content Read More >

Does your Site have Malware?

If your website starts displaying a warning page about malware then you may need to take action to stop this from happening. Some major internet browsers will start displaying warning pages when a website has been detected to have malware. Use the information and steps in this article to learn how you can stop these Read More >