Tag: Security

Enhance the security of your server by reading through our easy to follow tutorials. From installing firewalls to auto-renewing SSLs, our expansive library is sure to be your bookmark favorite.

Reading Time: 5 minutes

The most common way to remotely manage a Windows server is through Remote Desktop Protocol. By default, Liquid Web’s Windows servers only allow the members of the administrators' group remote desktop access. However, the Remote Desktop Users group grants its members access to securely connect to the server through RDP (Remote Desktop Protocol) as well.

Continue reading →
Reading Time: 2 minutes

Once in a while, perhaps on a Development server, MySQL will not be set up with a root password. The aforementioned configuration is generally thought of as against best practices, however, if it is what you're dealing with, then it could also interfere with PhpMyAdmin.

Continue reading →

How to Upgrade Ubuntu 16.04 to Ubuntu 18.04

Posted on by Justin Palmer | Updated:
Reading Time: 6 minutes

If you are still using Ubuntu version 16.04, you may want to consider updating to the latest Long Term Support release, version 18.04. In this post, we will cover what a Long Term Support release is and why you would want to use it. You will also learn the significant changes between 16.04 and 18.04. Last, but not least, you will also learn how to upgrade your dedicated server from Ubuntu 16.04 to Ubuntu 18.04.

Continue reading →
Reading Time: < 1 minute

When updating from Ubuntu 16.04 to 18.04, we used the following command as one of the steps to update to the newer version. 

Continue reading →
Reading Time: 7 minutes

What is Mimikatz?

Mimikatz is a tool created by the French developer, Benjamin Delpy used to gather credentials and can carry out a range of operations connected with penetration testing. Its creation stems from a noted vulnerability of the Windows system function called WDigest. WDigest is designed to allow larger Windows-based network users to establish credentials in multiple applications on a LAN or WAN. This feature stores authentication credentials in memory and allows for their automatic reuse so users only have to enter their login details once.

Continue reading →
Reading Time: 7 minutes

What is the Browser Cache?

The browser cache is used for storing website data like HTML, CSS, JavaScript, and images. Caching is a method of storing data that can be used later. Like other programs that you may have installed, browsers use caching to store website data on your computer instead of requesting the data from a web server to make web pages load faster.

Continue reading →
Reading Time: 6 minutes

What is OpenSSH?

OpenSSH logo

OpenSSH is an open-source utility developed by The OpenBSD Project. SSH stands for "Secure SHell." This service encrypts traffic on both ends, eliminating security risks from hackers or eavesdroppers. It can be used for remote operations like file transfers and offers key-based passwordless authentication. In this tutorial, we will demonstrate how to harness the power of SSH's on your Windows server to send basic remote commands and transfer files using password authentication.

Continue reading →
Reading Time: 11 minutes

What is OpenSSL?

OpenSSL is a free and open-source software cryptography library that provides cryptographic functionality to applications to ensure secure internet communication. It is widely used on many server applications, and it is available for most Unix-like operating systems (including Solaris, Linux, Mac OS X, the four open-source BSD operating systems), OpenVMS and Microsoft Windows.

Continue reading →
Reading Time: 3 minutes

Ubuntu 16.04 LTS provides you the ability to add a user for anyone who plans on accessing your server.  Creating a user is a basic setup but an important and critical one for your server security. In this tutorial, we will create a user and grant administrative access, known as root, to your trusted user.

Continue reading →
Reading Time: 2 minutes

Introduction

SNMP, or Simple Network Management Protocol, is widely used to communicate with and monitor network devices, servers, and more, all via IP. In the previous article, we installed an SNMP agent on a CentOS 6.5 server. This agent allows for the collection of data from our server and makes the information available to a remote SNMP manager. To add a little security, we'll now change the port that SNMP listens on.

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434