How to Hide Your NGINX Server Version

Date: January 8, 2020          1 Minute to Read Banner grabbing is the act of scanning websites to find server information including services and open ports. This technique is used during vulnerability assessments. Hiding your server version from scanning tools makes it harder for hackers to know what vulnerabilities can be exploited on your server. We use Read More >

How to Set WP Cerber Security Notifcations

Date: 08/07/2019 2 Minutes to Read In this article: WP Cerber Notifications Strong Email Authentication Your website truly is more secure with VPS Hosting. cPHulk brute force protection, ConfigServer & Firewall (CSF), and Scheduled cPanel backups safeguard your data and peace of mind in various ways. Yet those tools have one important thing in common Read More >

WP Cerber Security Antispam and Bot Detection Settings

Date: 08/23/2019 | 2 Minutes to Read In this article: Antispam Settings reCAPTCHA As we stated when covering WP Cerber Security hardening options, the plugin can replace other WordPress security plugins. In that article, we discussed replacing the maintenance page as an example. This time we replace the WordPress Heartbeat API and reCAPTCHA plugins. WP Read More >

WP Cerber Security Tools

Date: 08/16/2019 2 Minutes to Read In this article: Export & Import Settings Diagnostic Info Logs Plugin Update Changelog License for Paid users These tools display info for troubleshooting and options for plugin setup. The WP Cerber Security WordPress plugin is a versatile security suite including an IP access list, automated email notifications, and other Read More >

Search for PunyCode Look-alikes With Hold Integrity IDN Checker

Date: 10/28/2019          2 Minutes to Read Learn how to find internationalized domain names (IDNs) that spoof your domain with punycode encoding and could hinder your ability to attract to new visitors. What is Punycode? Search for Domain Spoofing What is Punycode? Web browsers use punycode to render domains with non-Latin alphabets such as Greek and Cyrillic. Read More >

How to Deal With the “on this day I hacked your OS” Scam Email

Date: 10/18/2019          5 Minutes to Read In this article, we cover a phishing email starting with the following sentence: on this day I hacked your OS and got full access to your account user@example.com Such phishing emails aim to create feelings of desperation and fear. We want to combat this by ensuring you better understand how Read More >