Date:
April 17, 2015
Category:
Author:
Ashley Peck
No Comments
During the development and maintenance of websites today, various attacks and vulnerabilities must be considered to protect the vital information and functionality which lies within the web server. If left undefended, malicious users may exploit these in order to gain control and potentially cause irreparable damage to your website. This post is designed to highlight... Read More >>
At the moment about 90% of our SPAM is coming from India and China (The Russians seem to be on holiday). Of the Indian SPAM, the majority originates from airtelbroadband.in Like many ISPs Airtelbroadband don't seem to care that they are being used to send spam. Sometimes our only recourse is to reject all emails... Read More >>
Find is a really useful tool. I must use it many times every day. Here are some useful examples: Finding all files matching find all directories in current folder $ find . -type d find all files: $ find . -type f Find all .php files $ find . -type f -name "*.php" Find all... Read More >>
Do you ever find that your server performance has suddenly taken a nose dive ? One of the most common causes of this is a brute force attack on your web server. You can quickly determine if this is the case by using top or ps. It is often caused by a small number of... Read More >>
The J T Response email server uses Spam Assassin to mark messages likely to be spam. In this post we are going to explain how to set up your own personal filters on Microsoft Outlook to move messages marked as SPAM to your junk folder. We used Microsoft Outlook 2000. If you have a different... Read More >>
The J T Response email server uses Spam Assassin to mark messages likely to be spam. In this post we are going to show how to set up your own personal filters on Microsoft Outlook 2010 to move messages marked as SPAM to your Junk folder. We used Microsoft Outlook 2010. If you have a... Read More >>
We use Spamassin and Amavis to keep control of spam being sent to our users. These use blacklist services to help determine if a message is a spam. The blacklists keep a list of servers that are known to regularly send SPAM. If the sending server gives a positive match on a black list it... Read More >>
The J T Response email server uses Spam Assassin to mark messages likely top be spam. In this post we are going to explain how to set up your own personal filters on the Mac Mail App to move messages marked as SPAM to your Junk folder. We used Mail on Yosemite. If you have... Read More >>
The J T Response email server uses Spam Assassin to mark messages likely top be spam. In this post we are going to explain how to set up your own personal filters on Mozilla Thunderbird to move messages marked as SPAM to your Junk folder. We used Thunderbird version 31.2. If you have a different... Read More >>
If you have a problem logging into WHM as root, and get the following message: The login is invalid This could be because brute force protection is enabled and you are being blocked by the server. You can disable it as root from the command line as follows: Get the process id's of any cphilkd... Read More >>