Malware / Virus Scan: We can scan your server for malicious files and viruses and clean it up for you.
CHKRootKit: A common Unix-based program intended to help system administrators check their system for known rootkits.
RootKit Hunter: A Unix-based tool that scans for rootkits, backdoors and possible local exploits.
Securing and Upgrading of SSH Server: It increases security during SSH connections.
CSF or APF Firewall : Iptables (netfilter) based firewall systems designed around the essential needs of today's Internet deployed servers and the unique needs of custom deployed Linux installations.
LFD Login Failure Detection: We provide you with control over the LFD (Login Failure Daemon) settings and provide you with ways to monitor login attempts to help detect Brute-Force attacks.
Anti-DoS Configuration: DDoS mitigation is a set of techniques or tools for resisting or mitigating the impact of distributed denial-of-service (DDoS) attacks on networks attached to the Internet by protecting the target and relay networks.
Brute Force Detection: A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works.
AntiSpam Detection and Prevention: It is a software to help and prevent incoming and outgoing spam from the server.
Log Analysis Software Installation: Log analysis software helps to document application log files for records and analytics.
System Integrity Monitor: System Integrity Monitor is a software that can restart failed services, monitor your server loads.
SPRI: SPRI (System Priority) is a utility designed to queue different processes with different priority levels based on 3 class levels of importance (high, med, low).
Secure and Optimize Apache (HTTP): It tweaks apache to perform better, and prevent unnecessary information from being easily seen.
MySQL Optimization: It increases performance of MySQL.
host.conf Strengthening: It prevents DNS lookup poisoning & spoofing protection.
nsswitch.conf Modification: It secures and optimizes DNS lookups.
sysctl.conf Strengthening: It helps prevent TCP/IP stack from syn-flood attacks and other network abuses.
FTP Strengthening: It upgrades and secures your FTP software.
Removal of Unused Software: It prevents exploits and wasted resources.
Removal of Old Logs: Save space by deleting old archived logs.
Shell Fork Bomb / Memory Hog Protection: It prevents a user logged into a shell from overwhelming all the assets on your server.
Root Logger: It is a tool for monitoring MySQL threads and processes.
MyTOP: It logs and emails you every time someone accesses root with the timestamp and their IP address.
MultiTail: View multiple log files simultaneously.
TMP Directory Strengthening (/tmp, /var/tmp, /dev/shm): It helps prevents execution of malicious scripts.
Password Scanner: It scans for easy to guess and common passwords.
File Manager: It allows you to edit system files through WHM in case SSH is inaccessible.
Firewall Admin: It allows you to edit firewall allow & deny list and configure through WHM.
Mod_Security: It protects against common URL based hack injections (installed upon specific request only).
Mod_Evasive: It defends HTTP based attacks (installed upon specific request only).
PHP Tightening: We configure PHP settings to tighten the security of a PHP installation and help protect your server from malicious attacks.