CloudLinux - Paul Jacobs - CloudLinux Blog - Page 5
Bloggers

With more than a quarter of a century in IT, Paul brings with him a kaleidoscope of experiences and insight which he uses to drill into and pick apart the complexities of Linux server security and hosting issues, as Technical Evangelist and Content Writer for CloudLinux.

How do I spam thee? Let me count the ways.
Tags:

How do I spam thee? Let me count the ways.

How do I spam thee? Let me count the ways.
Spam is a nuisance. We have email to thank for that. The first email was sent in 1971, so why is it this particular blight on the bright face of electronic communications has never been effectively removed? Why does spam occur and who or what sends it? Greg Zemskov, Product Manager at Imunify360, asks these questions and gives some answers in his l...
Continue reading
  2068 Hits
  0 Comments
DON’T GET BLACKLISTED ON BLACK FRIDAY
Tags:

DON’T GET BLACKLISTED ON BLACK FRIDAY

DON’T GET BLACKLISTED ON BLACK FRIDAY
Black Friday-Cyber Monday is the busiest e-shopping weekend of the year, so don't let hackers get your site banned by search engines. If your site gets compromised by malicious actors and starts spreading malware, it will be blacklisted by Google safe browsing, Yandex SB, McAfee, ESET, and other security services, which means that online shoppers w...
Continue reading
  2449 Hits
  0 Comments
Take a load off your mind

Take a load off your mind

Take a load off your mind
Keeping an eye on system resources, especially CPU and memory loads, is second nature to experienced Linux system admins. For web hosters, these figures have an important economic significance, especially when they start to rise—overloaded servers lead to crashed applications and unhappy site owners. In his new blog post , Imunify360's Product Mana...
Continue reading
  1627 Hits
  0 Comments
The worst-kept secret (your password)
Tags:

The worst-kept secret (your password)

The worst-kept secret (your password)
Ineffective passwords continue to be a significant cause of cybersecurity breaches, despite the wealth of advice issued by governments and security companies, and despite the prevalence of password management programs and the enforcement of strict password policies. The latest article by Imunify360’s Greg Zemskov looks into the psychology behind pa...
Continue reading
  2093 Hits
  0 Comments
Kernel Update Methods: 3 Different Ways

Kernel Update Methods: 3 Different Ways

Kernel Update Methods: 3 Different Ways
If variety is the spice of life, then you'll want to know all about the different ways you can update a Linux kernel. This blog post runs the gamut, from a standard command-line update, through the use of 'kexec', and onto the live-patching solutions of which KernelCare is but one. It's a topic that straddles both security and stability: security, ...
Continue reading
  2144 Hits
  0 Comments
Don't let one bad apple spoil the whole box, Part 2 now published

Don't let one bad apple spoil the whole box, Part 2 now published

Don't let one bad apple spoil the whole box, Part 2 now published
Web hosters running multi-site servers are a favourite target for today’s economy-minded hacker who uses one weak site to gain access to a whole box of others on the same server. In this Part 1 of his article “Avoid Multi-site Hacking” , the new lead of Imunify360, Greg Zemskov, explains exactly what the threat is and how to mitigate it, covering t...
Continue reading
  1186 Hits
  0 Comments
Don't let one bad apple spoil the whole box

Don't let one bad apple spoil the whole box

Don't let one bad apple spoil the whole box
Web hosters running multi-site servers are a favourite target for today’s economy-minded hacker who uses one weak site to gain access to a whole box of others on the same server. In this Part 1 of his article “Avoid Multi-site Hacking” , the new lead of Imunify360, Greg Zemskov, explains exactly what the threat is and how to mitigate it, covering t...
Continue reading
  1806 Hits
  0 Comments
Why every month should be National Cybersecurity Awareness Month

Why every month should be National Cybersecurity Awareness Month

Why every month should be National Cybersecurity Awareness Month
This month, October 2018, in the US it is the 15th National Cybersecurity Awareness Month . Another month, another ‘awareness’ . Does this suppose that all the other 11 months we should be less aware? Do hackers make a special effort to be nicer in October? Do they leave love letters on your server instead of malware? Does it help if you live on To...
Continue reading
  1520 Hits
  0 Comments
While everyone’s out star-gazing, KernelCare shoots ‘Mutagen Astronomy’ back down to earth

While everyone’s out star-gazing, KernelCare shoots ‘Mutagen Astronomy’ back down to earth

While everyone’s out star-gazing, KernelCare shoots ‘Mutagen Astronomy’ back down to earth
It is Fall in the Northern Hemisphere, and everyone’s out gazing into the clear dark skies when they should be indoors looking after their servers. Why?  Because yet another 10-year-old flaw has been found in the Linux kernel, this time in the create_elf_tables() function, that, when subject to an integer overflow condition, can allow root-lev...
Continue reading
  2833 Hits
  0 Comments