Social Engineering

Social Engineering? What is that? The basic way to explain Social Engineering is when a person is able to do nothing more than ask you questions and get answers needed to gain access to your accounts. Without realizing it, you can give crucial information to an attacker while just talking to them. An example of a phone conversation, where social engineering happens, would be, “The Gas company” calls, and says there is an issue with the billing on your account, and they give you some simple verification information, the name of the local company, your name, and address,  maybe even the balance due, and start to request vital information, such as social… Read More

Continue Reading

How to force SSL with .htaccess

Making sure your site is using SSL is important. Below are some simple lines of code to add to nearly any site to get it to redirect. Rememeber that setting this redirect within your site, likely means that it is using php for the redirect. Adding a redirect in php can slow your site down, where as the apache or nginx redirect will be much faster.    You can force an HTTPS connection on sites that run on a server that uses Apache, by adding these rules to the top of the .htaccess file: RewriteEngine On RewriteCond %{HTTPS} off RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301] If your server uses Nginx, add this to the top of the… Read More

Continue Reading

SSL certificates

SSL certificates encrypt the traffic between your server and your customers. This traffic can include credit card information, usernames and passwords, and any other critical information that your site receives or sends. There are Multiple types of SSL certificates: Free LetsEncrypt/AutoSSL certificates Domain Validation DV SSL Organization Validation OV SSL Extended Validation EV SSL   At their base, They all do the same thing…Encrypt traffic. The differences between them is what causes the wide range in prices. For Free SSL certificates, and DV SSL’s, The only checks run by the Certificate Authority, or CA, Is that the domain is controlled by the person that is generating the order. OV and EV… Read More

Continue Reading

What is SSL? And why is it important

An SSL is an encryption method used for securely transferring data over a public network. When you visit a domain that is using https:// as the protocol in front of the domain name, it means you are using an SSL connection to the site. Any data you enter into the site will be transferred back to their server encrypted and secure. SSLs are a very important security feature that makes buying online a secure thing. Without some form of encryption in the transfer, credit card numbers, passwords, and other sensitive data would easily be obtained by attackers. When you browse to a site that you want to buy something from, … Read More

Continue Reading

How to install CWP (CentOS Web Panel)

Installing CWP is pretty straightforward. It is recommended to only do this after a fresh OS install, as the installer will replace many packages. The base hardware requirements, is a 32-bit server, with at least 512MB of RAM, or a 64-Bit server, with at least 1GB of RAM, Both with a minimum Hard drive size of 10GB. CWP supports CentOS 6 and 7, RHEL 6 & 7, and CloudLinux 6 & 7 To install for Versions 6, You will need to SSH into the server, and run: cd /usr/local/src  wget http://centos-webpanel.com/cwp-latest  sh cwp-latest For Versions 7, run: cd /usr/local/src  wget http://centos-webpanel.com/cwp-el7-latest  sh cwp-el7-latest If the download link doesn’t work then you can use… Read More

Continue Reading

The Difference Between Monitoring and Fully Managed Monitoring.

 Knowing when there is an issue is one of the most important things for a business or website owner. There are many places that can tell you when there is an issue, by simply pinging your site or server, This leads to many false positives, wasted time, and More stress! We do more than just ping your server. We install specialized software that takes readings, and reports it right to us! We are able to analyze any alerts and make sure it is real, and then start an investigation into what is going on. What happens when an actual issue arises? Now that you know there is an issue, who… Read More

Continue Reading