Home » Security

Linux Server Security Tutorials & cPanel Security Hardening Guides

cPanel is a very robust control panel in terms of general code security, but on default cPanel installations cPanel security isn’t 100% hardened. That’s why we’ve written useful and practical cPanel Security tutorials to help you with your cPanel Server Security Hardening.

Follow our Linux Server Security tutorials, as well as our cpanel security hardening guides, prevent hacking, data loss and angry customers screaming at your phone. Start securing your cPanel server today.

Migrate from DSO to suPHP on cPanel/WHM servers

suPHP is an Apache module that let’s you handle PHP requests in a secure and fast way. It’s not as fast as DSO module, however suPHP provides much better security by limit users to use restricted file and directory permissions, and also to run PHP scripts as the real system user, and not as nobody (as it happens…

Read More »

How to Install Suhosin on cPanel

Joomla, WordPress, Drupal and other popular web apps are the most common target of web attacks these days, and not everybody is updating this apps as they should to keep their websites safe from vulnerabilities. Suhosin doesn’t update your app code (that’s your responsibility) but it will add another great layer of protection against common attacks for the…

Read More »

How to Disable custom user based php.ini files in cPanel

One of the biggest security issues in cPanel servers is to allow attackers to manipulate PHP settings by their own by placing php.ini files inside public_html directories. If you enable suPHP to enforce your server security, you are on the right path. suPHP forces web process to run as the FTP user, and this is a huge advantage…

Read More »

Secure /tmp partition on cPanel using /scripts/securetmp

On Linux systems there are a few temporal directories used for storage, like /tmp, /var/tmp and /dev/shm. This directories are used to store temporary files from different services such as Apache, MySQL, etc. However, sometimes this directories are also used by crackers and script kiddies to store malicious/malware and virus executables. This malicious scripts can be an open…

Read More »