Cyber-attacks are executed in a nearly uncountable amount of ways. One such style of attack is an injection attack (i.e. when an attacker supplies an untrusted input to a program which is the executed). There are many types of injections attacks, however, the most common ones are SQL injection (SQLi) and Cross-site Scripting (XSS). Today we will delve a little deeper on what exactly is a SQLi attack, how it is carried out and how to defend yourself against it.
What is SQLi?
SQL injection (SQLi) is a type of injection attack that allows the execution of malicious SQL statements. This style...
In the modern age of technology, new security threats arrive daily, but most don’t see the day of light in the public discussion. Every now and then, however, an exceptionally devastating threat makes the news, usually when it is already too late. Such was the WannaCry ransomware outbreak in 2017 which affected hospitals, universities and telecommunication providers in more than 150 countries, causing over $300 million in estimated damages. Now, a new threat has popped up, named BlueKeep or CVE-2019-0708.
It is a software vulnerability affecting older versions of Microsoft Windows...
Despite the global efforts in cybersecurity, the internet is still a very dangerous place, filled with malware and spyware. Having a quality antivirus is crucial to the safety of your data and even hardware. This article will explain how you enable virus protection for your emails on your server running Plesk. Here's what you need to do:
Go to the Mail tab.
Click on the email address you wish to configure the antivirus on.
Click on the Antivirus tab and select the checkbox: "Switch on antivirus protection for this email address". Choose the desired mail...
What is a Proxy Server?
What happens when you browse the web? You type an address on your browser and within few seconds (even less) you get the page you wanted. Without your knowledge, you might have used a proxy server to access the internet.
A proxy server is an intermediary server which separates you from the website you want to access. When using a proxy server, the internet traffic initiated from you will flow through the proxy server to the destination. The destination website will send the results back to you through the proxy server (this doesn’t happen all the time). If...
What is a Blacklist?
Depending on the source, the amount of daily spam emails being sent is anywhere between 80 to 95% of all emails sent on the internet that day. With such large numbers, most experts agree that manually sorting through your inbox to get rid of spam has become highly inefficient. As such, public blacklists of mail servers and IP addresses have been created to prevent repeat offenders from relaying spam.
A blacklist is a list of blocked domains, email addresses or IP addresses. When a website gets on one of these lists, users can no longer access the site directly and...
Microsoft Windows Server 2008 and 2008 R2 were both great technological breakthroughs in the hosting fields, introducing new features which are essential for any modern system, such as a shift from 32-bit to 64-bit computing, advanced analytics and budding server virtualization technologies. Unfortunately, all good things must come to an end, including Microsoft’s support for these industry-forming server operating systems. As many know, misfortune never comes alone, so along with their Windows Server 2008 versions, Microsoft is also discontinuing support for SQL Server 2008 and 2008...
One of the most important changes to be made in the CentOS is changing iptables to firewalld. If you want to revert this switch and go back to using iptables, it is possible however, you must originally configure the firewall. Follow the steps outlined below to change firewalld to iptables.
Use the following code to install iptables:
yum install –y iptables-services
Then mask firewalld service:
systemctl mask firewalld
Now, we should enable the iptables service:
systemctl enable iptables systemctl enable ip6tables
Next, enter the iptables directory and set all the rules that you...