<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title><![CDATA[FastWebHost]]></title>
<link><![CDATA[https://support.fastwebhost.com/]]></link>
<description />
<generator><![CDATA[Kayako fusion v4.73.3]]></generator>
<item>
<title><![CDATA[Ubuntu OS Initial Server Setup 12.04 &amp; 14.04/10]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/408]]></link>
<guid isPermaLink="false"><![CDATA[0d0fd7c6e093f7b804fa0150b875b868]]></guid>
<pubDate><![CDATA[Mon, 18 Jan 2016 21:15:14 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[Introduction to Ubuntu OS
When you first building a new Ubuntu 12.04 or 14.04/10 server, there are a few configuration steps that you should take early on as part of the basic setup.This will increase the security and usability of your server and will gi...]]></description>
<content:encoded><![CDATA[<h2><strong>Introduction to Ubuntu OS</strong></h2>
<p>When you first building a new Ubuntu 12.04 or 14.04/10 server, there are a few configuration steps that you should take early on as part of the basic setup.This will increase the security and usability of your server and will give you a solid foundation for subsequent actions.</p>
<h2>Step One &mdash; Root Login</h2>
<p>To log into your server, you will need to know your server's public IP address and the password for the "root" user's account. Please check your VPS Server Login email for server credentials.</p>
<p>If you are not already connected to your server, go ahead and log in as the&nbsp;<code>root</code>&nbsp;user using the following command (substitute the highlighted word with your server's public IP address):</p>
<p>&nbsp; <code>local$ &nbsp;ssh root@<span style="color: #ff6600;"><strong><span class="highlight">SERVER_IP_ADDRESS</span></strong></span></code></p>
<p>Complete the login process by accepting the warning about host authenticity, if it appears, then providing your root authentication (password or private key). If it is your first time logging into the server, with a password, you will also be prompted to change the root password.</p>
<h3 id="about-root">About Root</h3>
<p>The root user is the administrative user in a Linux environment that has very broad privileges. Because of the heightened privileges of the root account, you are actually&nbsp;<em>discouraged</em>&nbsp;from using it on a regular basis. This is because part of the power inherent with the root account is the ability to make very destructive changes, even by accident.</p>
<p>The next step is to set up an alternative user account with a reduced scope of influence for day-to-day work. We'll teach you how to gain increased privileges during the times when you need them.</p>
<div data-unique="step-two-&mdash;-create-a-new-user">&nbsp;</div>
<h2>Step Two &mdash; Create a New User</h2>
<p>Once you are logged in as&nbsp;<code>root</code>, we're prepared to add the new user account that we will use to log in from now on.</p>
<p>This example creates a new user called "demo", but you should replace it with a user name that you like:</p>
<p>&nbsp;</p>
<p>&nbsp;#&nbsp;adduser<code> <span class="highlight">demo</span></code></p>
<p>&nbsp;</p>
<p>You will be asked a few questions, starting with the account password.</p>
<p>Enter a strong password and, optionally, fill in any of the additional information if you would like. This is not required and you can just hit "ENTER" in any field you wish to skip.</p>
<div data-unique="step-three-&mdash;-root-privileges">&nbsp;</div>
<h2>Step Three &mdash; Root Privileges</h2>
<p>Now, we have a new user account with regular account privileges. However, we may sometimes need to do administrative tasks.</p>
<p>To avoid having to log out of our normal user and log back in as the root account, we can set up what is known as "super user" or root privileges for our normal account. This will allow our normal user to run commands with administrative privileges by putting the word&nbsp;<code>sudo</code>&nbsp;before each command.</p>
<p>To add these privileges to our new user, we need to add the new user to the "sudo" group. By default, on Ubuntu 14.04, users who belong to the "sudo" group are allowed to use the&nbsp;<code>sudo</code>&nbsp;command.</p>
<p>As&nbsp;<code>root</code>, run this command to add your new user to the&nbsp;<em>sudo</em>&nbsp;group (substitute the highlighted word with your new user):</p>
<p>&nbsp;</p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; #&nbsp;</code>gpasswd<code> -a <span class="highlight">demo</span> </code>sudo</p>
<p>&nbsp;</p>
<p>Now your user can run commands with super user privileges!&nbsp;</p>
<h2>Step Four &mdash; Add Public Key Authentication (Recommended)</h2>
<p>The next step in securing your server is to set up public key authentication for your new user. Setting this up will increase the security of your server by requiring a private SSH key to log in.</p>
<h3 id="generate-a-key-pair">Generate a Key Pair</h3>
<p>If you do not already have an SSH key pair, which consists of a public and private key, you need to generate one. If you already have a key that you want to use, skip to the&nbsp;<em>Copy the Public Key</em>&nbsp;step.</p>
<p>To generate a new key pair, enter the following command at the terminal of your&nbsp;local machine&nbsp;(ie. your computer):</p>
<p>&nbsp;</p>
<p><strong>local$ ssh-keygen</strong></p>
<p>&nbsp;</p>
<p>Assuming your local user is called "localuser", you will see output that looks like the following:</p>
<div class="secondary-code-label " title="ssh-keygen output">ssh-keygen output</div>
<pre class="code-pre "><code>Generating public/private rsa key pair.
Enter file in which to save the key (/Users/<span class="highlight">localuser</span>/.ssh/id_rsa):
</code></pre>
<p>Hit return to accept this file name and path (or enter a new name).</p>
<p>Next, you will be prompted for a passphrase to secure the key with. You may either enter a passphrase or leave the passphrase blank.</p>
<p>Note:&nbsp;If you leave the passphrase blank, you will be able to use the private key for authentication without entering a passphrase. If you enter a passphrase, you will need both the private key&nbsp;<em>and</em>&nbsp;the passphrase to log in. Securing your keys with passphrases is more secure, but both methods have their uses and are more secure than basic password authentication.</p>
<p>This generates a private key,&nbsp;<code>id_rsa</code>, and a public key,&nbsp;<code>id_rsa.pub</code>, in the&nbsp;<code>.ssh</code>&nbsp;directory of the<em>localuser</em>'s home directory. Remember that the private key should not be shared with anyone who should not have access to your servers!</p>
<h3 id="copy-the-public-key">Copy the Public Key</h3>
<p>After generating an SSH key pair, you will want to copy your public key to your new server. We will cover two easy ways to do this.</p>
<h3 id="option-1-use-ssh-copy-id">Option 1: Use ssh-copy-id</h3>
<p>If your local machine has the&nbsp;<code>ssh-copy-id</code>&nbsp;script installed, you can use it to install your public key to any user that you have login credentials for.</p>
<p>Run the&nbsp;<code>ssh-copy-id</code>&nbsp;script by specifying the user and IP address of the server that you want to install the key on, like this:</p>
<p><code>local$ ssh-copy-id <span style="color: #ff6600;"><span class="highlight">demo</span>@<span class="highlight">SERVER_IP_ADDRESS</span></span></code></p>
<p>&nbsp;</p>
<p><span class="highlight">After providing your password at the prompt, your public key will be added to the remote user's<code>.ssh/authorized_keys</code>&nbsp;file. The corresponding private key can now be used to log into the server.</span></p>
<h3 id="option-2-manually-install-the-key">Option 2: Manually Install the Key</h3>
<p>Assuming you generated an SSH key pair using the previous step, use the following command at the terminal of your&nbsp;local machine&nbsp;to print your public key (<code>id_rsa.pub</code>):</p>
<p><code>local$ cat ~/.ssh/id_rsa.pub</code></p>
<p>This should print your public SSH key, which should look something like the following:</p>
<div class="secondary-code-label " title="id_rsa.pub contents"><em><code>id_rsa.pub contents</code></em></div>
<p class="code-pre "><code><em>ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDBGTO0tsVejssuaYR5R3Y/i73SppJAhme1dH7W2c47d4gOqB4izP0+fRLfvbz/tnXFz4iOP/H6eCV05hqUhF+KYRxt9Y8tVMrpDZR2l75o6+xSbUOMu6xN+uVF0T9XzKcxmzTmnV7Na5up3QM3DoSRYX/EP3utr2+zAqpJIfKPLdA74w7g56oYWI9blpnpzxkEd3edVJOivUkpZ4JoenWManvIaSdMTJXMy3MtlQhva+j9CgguyVbUkdzK9KKEuah+pFZvaugtebsU+bllPTB0nlXGIJk98Ie9ZtxuY3nCKneB+KjKiXrAvXUPCI9mWkYS/1rggpFmu3HbXBnWSUdf </em><em><a href="mailto:localuser@machine.local">localuser@machine.local<br /></a></em><br /></code></p>
<p>Select the public key, and copy it to your clipboard.</p>
<h4 id="add-public-key-to-new-remote-user">Add Public Key to New Remote User</h4>
<p>To enable the use of SSH key to authenticate as the new remote user, you must add the public key to a special file in the user's home directory.</p>
<p>On the server, as the&nbsp;<code>root</code>&nbsp;user, enter the following command to switch to the new user (substitute your own user name):</p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; #&nbsp;</code>su<code> - <span class="highlight">demo</span> </code></p>
<p>Now you will be in your new user's home directory.</p>
<p>Create a new directory called&nbsp;<code>.ssh</code>&nbsp;and restrict its permissions with the following commands:</p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; $&nbsp;</code>mkdir<code> .ssh</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; $&nbsp;</code>chmod<code> 700 .ssh</code></p>
<p>&nbsp;</p>
<p><code>Now open a file in&nbsp;<em>.ssh</em>&nbsp;called&nbsp;authorized_keys&nbsp;with a text editor. We will use&nbsp;<em>nano</em>&nbsp;to edit the file:</code></p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; $ nano .ssh/authorized_keys</code></p>
<p>Now insert your public key (which should be in your clipboard) by pasting it into the editor.</p>
<p>Hit&nbsp;<code>CTRL-X</code>&nbsp;to exit the file, then&nbsp;<code>Y</code>&nbsp;to save the changes that you made, then&nbsp;<code>ENTER</code>&nbsp;to confirm the file name.</p>
<p>&nbsp;</p>
<p>Now restrict the permissions of the&nbsp;<em>authorized_keys</em>&nbsp;file with this command:</p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;$&nbsp;</code>chmod<code> 600 .ssh/authorized_keys</code></p>
<p>Type this command&nbsp;<em>once</em>&nbsp;to return to the&nbsp;<code>root</code>&nbsp;user:</p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;$ exit</code></p>
<p>Now you may SSH login as your new user, using the private key as authentication.</p>
<p>&nbsp;</p>
<h2>Step Five &mdash; Configure SSH Daemon</h2>
<p>Now that we have our new account, we can secure our server a little bit by modifying its SSH daemon configuration (the program that allows us to log in remotely) to disallow remote SSH access to the&nbsp;rootaccount.</p>
<p>Begin by opening the configuration file with your text editor as root:</p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp;# nano /etc/ssh/sshd_config</code></p>
<p>Next, we need to find the line that looks like this:</p>
<div class="code-label " title="/etc/ssh/sshd_config (before)">/etc/ssh/sshd_config (before)</div>
<pre class="code-pre "><code>PermitRootLogin yes
</code></pre>
<p>Here, we have the option to disable root login through SSH. This is generally a more secure setting since we can now access our server through our normal user account and escalate privileges when necessary.</p>
<p>Modify this line to "no" like this to disable root login:</p>
<div class="code-label " title="/etc/ssh/sshd_config (after)">/etc/ssh/sshd_config (after)</div>
<pre class="code-pre "><code>PermitRootLogin <span class="highlight" style="color: #ff6600;">no
</span></code></pre>
<p>Disabling remote root login is highly recommended on every server!</p>
<p>When you are finished making your changes, save and close the file using the method we went over earlier (<code>CTRL-X</code>, then&nbsp;<code>Y</code>, then&nbsp;<code>ENTER</code>).</p>
<div data-unique="step-six-reload-ssh">&nbsp;</div>
<h2>Step Six -- Reload SSH</h2>
<p>Now that we have made our change, we need to restart the SSH service so that it will use our new configuration.</p>
<p>Type this to restart SSH:</p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;# service ssh restart</code></p>
<p>Now, before we log out of the server, we should&nbsp;test&nbsp;our new configuration. We do not want to disconnect until we can confirm that new connections can be established successfully.</p>
<p>Open a&nbsp;new&nbsp;terminal window on your local machine. In the new window, we need to begin a new connection to our server. This time, instead of using the root account, we want to use the new account that we created.</p>
<p>For the server that we showed you how to configure above, you would connect using this command. Substitute your own user name and server IP address where appropriate:</p>
<p><code>&nbsp; &nbsp; &nbsp; &nbsp; local$ ssh <strong><span style="color: #ff6600;"><span class="highlight">demo</span>@<span class="highlight">SERVER_IP_ADDRESS</span> </span></strong></code></p>
<p>Note:&nbsp;If you are using PuTTY to connect to your servers, be sure to update the session's&nbsp;<em>port</em>&nbsp;number to match your server's current configuration.</p>
<p>You will be prompted for the new user's password that you configured. After that, you will be logged in as your new user.</p>
<p>Remember, if you need to run a command with root privileges, type "sudo" before it like this:</p>
<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <code>$ </code>sudo<code> <span class="highlight">command_to_run</span> </code></p>
<p>If all is well, you can exit your sessions by typing:</p>
<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <code>$ exit</code></p>
<p>&nbsp;</p>
<h2>Where To Go From Here?</h2>
<p>At this point, you have a solid foundation for your server. You can install any of the software you need on your server now. We'll keep posting new tutorials like firewall setup and installation of software stacks soon.</p>
<p>All the best with your cloud server.</p>
<p>Happy VPS Hosting.</p>
<pre class="code-pre command">&nbsp;</pre>
<pre class="code-pre custom_prefix">&nbsp;</pre>]]></content:encoded>
</item>
<item>
<title><![CDATA[CentOS 6 Initial Server Setup]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/409]]></link>
<guid isPermaLink="false"><![CDATA[a96b65a721e561e1e3de768ac819ffbb]]></guid>
<pubDate><![CDATA[Wed, 20 Jan 2016 21:21:16 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[The Basics
When you first begin to access your fresh new virtual private server, there are a few early steps you should take to make it more secure. Some of the first tasks can include setting up a new user, providing them with the proper privileges, and...]]></description>
<content:encoded><![CDATA[<h3>The Basics</h3>
<p>When you first begin to access your fresh new virtual private server, there are a few early steps you should take to make it more secure. Some of the first tasks can include setting up a new user, providing them with the proper privileges, and configuring SSH.</p>
<div data-unique="step-one&mdash;root-login">&nbsp;</div>
<h2>Step One&mdash;Root Login</h2>
<p>Once you know your IP address and root password, login as the main user, root.</p>
<p>It is not encouraged to use root on a regular basis, and this tutorial will help you set up an alternative user to login with permanently.</p>
<pre><code>ssh root@123.45.67.890</code></pre>
<p>The terminal will show:</p>
<pre><code>The authenticity of host '69.55.55.20 (69.55.55.20)' can't be established.
ECDSA key fingerprint is 79:95:46:1a:ab:37:11:8e:86:54:36:38:bb:3c:fa:c0.
Are you sure you want to continue connecting (yes/no)?</code> </pre>
<p>Go ahead and type yes, and then enter your root password.</p>
<h2>Step Two&mdash;Change Your Password</h2>
<p>Currently, your root password is the default one that was sent to you when you ordered VPS. The first thing to do is change it to one of your choice.</p>
<pre><code>passwd</code></pre>
<p>CentOS is very cautious about the passwords it allows. After you type your password, you may see a BAD PASSWORD notice. You can either set a more complex password or ignore the message&mdash;CentOS will not actually stop you from creating a short or simple password, although it will advise against it.</p>
<h2>Step Three&mdash; Create a New User</h2>
<p>After you have logged in and changed your password, you will not need to login again to your VPS as root. In this step, we will make a new user, with a new password, and give them all of the root capabilities.</p>
<p>First, create your user; you can choose any name for your user. Here I&rsquo;ve suggested Demo</p>
<pre><code>/usr/sbin/adduser demo</code></pre>
<p>Second, create a new user password:</p>
<pre><code>passwd demo<br /><br /></code></pre>
<h2>Step Four&mdash; Root Privileges</h2>
<p>As of yet, only root has all of the administrative capabilities. We are going to give the new user the root privileges.</p>
<p>When you perform any root tasks with the new user, you will need to use the phrase &ldquo;sudo&rdquo; before the command. This is a helpful command for 2 reasons: 1) it prevents the user from making any system-destroying mistakes 2) it stores all the commands run with sudo to the file &lsquo;/var/log/secure' which can be reviewed later if needed.</p>
<p>Let&rsquo;s go ahead and edit the sudo configuration. This can be done through the default editor, which in CentOS is called &lsquo;vi&rsquo;</p>
<pre><code>/usr/sbin/visudo</code></pre>
<p>Find the section called user privilege specification.</p>
<p>It will look like this:</p>
<pre><code># User privilege specification
root    ALL=(ALL)       ALL
</code></pre>
<p>Under the details of root's privileges, add the following line, granting all the permissions to your new user.</p>
<p>To began typing in vi, press &ldquo;a&rdquo;.</p>
<pre><code>demo    ALL=(ALL)       ALL</code></pre>
<p>Press&nbsp;<code>Escape</code>,&nbsp;<code>:</code>,&nbsp;<code>w</code>,&nbsp;<code>q</code>, then&nbsp;<code>Enter</code>&nbsp;to save and exit the file.</p>
<h2>Step Five&mdash; Configure SSH (OPTIONAL)</h2>
<p>Now it&rsquo;s time to make the server more secure. These steps are optional. They will make the server more secure by making login more difficult.</p>
<p>Open the configuration file</p>
<pre><code>sudo vi /etc/ssh/sshd_config</code></pre>
<p>Find the following sections and change the information where applicable:</p>
<pre><code>Port 25000
Protocol 2
PermitRootLogin no
UseDNS no</code></pre>
<p>We&rsquo;ll take these one by one.</p>
<p>Port: Although port 22 is the default, you can change this to any number between 1025 and 65535. In this example, I am using port 25000. Make sure you make a note of the new port number. You will need it to login in the future, and this change will make it more difficult for unauthorized people to log in.</p>
<p>PermitRootLogin: change this from yes to no to stop future root login. You will now only login as the new user.</p>
<p>Add this line to the bottom of the document, replacing demo with your username:</p>
<pre><code>AllowUsers demo</code></pre>
<p>Save and Exit</p>
<h2>Step Six&mdash; Reload and Done!</h2>
<p>Reload SSH, and it will implement the new ports and settings.</p>
<pre><code>service sshd reload</code></pre>
<p>To test the new settings (don&rsquo;t logout of root yet), open a new terminal window and login into your virtual server as your new user.</p>
<p>Don&rsquo;t forget to include the new port number.</p>
<pre><code>ssh -p 25000 demo@123.45.67.890</code></pre>
<p>Your prompt should now say:</p>
<pre><code>[demo@yourname ~]$</code></pre>
<pre><code>&nbsp;</code></pre>]]></content:encoded>
</item>
<item>
<title><![CDATA[Debian 7 Initial Server Setup]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/410]]></link>
<guid isPermaLink="false"><![CDATA[1068c6e4c8051cfd4e9ea8072e3189e2]]></guid>
<pubDate><![CDATA[Mon, 25 Jan 2016 01:44:00 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[The Basics
Once new VPS is ready, it is important to create a new user and provide it with root privileges. This not only makes your virtual server more secure, but also prevents any drastic system damage/change that can happen when operating as root.
1...]]></description>
<content:encoded><![CDATA[<h3>The Basics</h3>
<p>Once new VPS is ready, it is important to create a new user and provide it with root privileges. This not only makes your virtual server more secure, but also prevents any drastic system damage/change that can happen when operating as root.</p>
<h2>1) Root Login</h2>
<p>Once you know your IP address, login as the "root" user from the command line.</p>
<pre><code>ssh root@xxx.xxx.xx.xx</code></pre>
<p>Prompt:&nbsp;Are you sure you want to continue connecting (yes/no)?</p>
<p>Go ahead and type yes.</p>
<h3>Potential Warning</h3>
<p>If you happen to receive a "man in the middle" warning, this is most likely because another fingerprint is associated with the virtual server's IP. To fix this, simply remove the files in the&nbsp;.ssh/known_hosts&nbsp;directory by utilizing the "remove" command:</p>
<pre><code>rm .ssh/known_hosts</code></pre>
<p>Retry logging in as the root user.</p>
<p>&nbsp;</p>
<h2>2) Change Your Password</h2>
<p>The next step is to change root password received to one of your choice from the command line:</p>
<pre><code>passwd</code></pre>
<p>It will ask you to type and confirm a password of your choice.</p>
<div data-unique="3)-create-a-new-user-">&nbsp;</div>
<h2>3) Create a New User</h2>
<p>In this step, we will make a new user and give them all of the root capabilities.</p>
<p>You can make your username whatever you wish. Here, we'll be using "demo"-- simply replace it with your chosen username when applicable.</p>
<pre><code>adduser <span class="highlight">demo</span></code></pre>
<p>After you set the password, you do not need to enter any further information about the new user. You can leave all the following lines blank if you wish.</p>
<div data-unique="4)-root-privileges">&nbsp;</div>
<h2>4) Root Privileges</h2>
<p>As of yet, only root has all of the administrative capabilities. We are going to give the new user the root privileges.</p>
<p>When you perform any root tasks with the new user, you will need to use the phrase &ldquo;sudo&rdquo; before the command. This is a helpful command for a few reasons, primarily in that it prevents the user from making any system-destroying mistakes and stores all the commands run with sudo to the file &lsquo;/var/log/secure' (which can be reviewed later if needed).</p>
<p>Let&rsquo;s go ahead and edit the sudo configuration. This can be done by using a text editor:</p>
<pre><code>visudo</code></pre>
<p>Find the section called user privilege specification. It will look like this:</p>
<pre># User privilege specification
root    ALL=(ALL:ALL) ALL</pre>
<p>Add the following line right below the root privilege specification, granting all the</p>
<p>permissions to your new user:</p>
<pre><span class="highlight">demo</span>    ALL=(ALL:ALL) ALL</pre>
<p>Type &lsquo;cntrl x&rsquo; then 'y' to save and exit the file. Hit 'enter' to return to the command line.</p>
<div data-unique="5)-ssh-as-new-user">&nbsp;</div>
<h2>5) SSH as New User</h2>
<p>At the moment, you are still logged into the root directory. In the future, login to your server directly with your newly setup username:</p>
<pre><code>ssh demo@xxx.xxx.xx.xx</code></pre>
<p>However, since you are already logged into your server as root, you can save time by using the sudo command to change over to your new user.</p>
<pre><code>su demo</code></pre>
<p>Remember, although you are now logged into your new username, you are still operating in the root directory. Simply use the&nbsp;cd&nbsp;command in order to switch over to your username's home directory.</p>
<p>Now you're all set!</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[How to setup VPS for web hosting, email and domain DNS services]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/412]]></link>
<guid isPermaLink="false"><![CDATA[b9228e0962a78b84f3d5d92f4faa000b]]></guid>
<pubDate><![CDATA[Tue, 02 Feb 2016 21:27:06 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[Basic VPS Software:
By default, FastWebHost provides VPS with basic OS installation with unmanaged service.
You can use the server for any application hosting ( WordPress, Joomla, Drupal or any development apps) and customize it.
Things get complicated...]]></description>
<content:encoded><![CDATA[<h2>Basic VPS Software:</h2>
<p>By default, FastWebHost provides VPS with basic OS installation with unmanaged service.</p>
<p>You can use the server for any application hosting ( WordPress, Joomla, Drupal or any development apps) and customize it.</p>
<p>Things get complicated to setup domains on a plain server If you are not a Linux administrator or with limited Linux knowledge. If you are looking to host websites on your VPS, then we recommend to get/install control panel for your server.</p>
<p>&nbsp;</p>
<h2>Web-based Control Panels:</h2>
<p>Web-based control panels are for system administration for Linux. Using any modern web browser, you can setup user accounts, Apache, DNS, file sharing and much more.&nbsp;</p>
<p>The web control panels allow you to setup domains, install other software applications on the server with just a few clicks.<br /><br />There are two types of web control panels, Licensed and Free panels.&nbsp;<br /><br /><strong>1) Licensed Web Panels like Cpanel ( we use this officially)</strong></p>
<p>cPanel - &nbsp;<a href="http://cpanel.net">http://cpanel.net</a> Worlds #1 control panel for easy web hosting businesses.<br />You can get Cpanel License after placing an order. The Cpanel license costs $14.99 per month.</p>
<p>Open helpdesk ticket at <a href="http://support.fastwebhost.com,">http://support.fastwebhost.com,</a>&nbsp;to generate an invoice for cPanel.</p>
<p>Webuzo&nbsp;- &nbsp;&nbsp;<a href="http://webuzo.com/" target="_blank">http://webuzo.com</a>&nbsp;&nbsp;</p>
<p>Webuzo License costs are $5 per month.</p>
<p><br /><strong>2) Free Web Control Panels (Open Source)</strong></p>
<p>CentOS web panel -&nbsp;<a href="http://centos-webpanel.com/" target="_blank">http://centos-webpanel.com/</a>&nbsp;<br />Kloxo -&nbsp;<a href="http://lxcenter.org/software/kloxo" target="_blank">http://lxcenter.org/software/kloxo</a><br />zPanel -&nbsp;<a href="http://www.zpanelcp.com/about/features/" target="_blank">http://www.zpanelcp.com/about/features/</a><br />webmin -&nbsp;<a href="http://www.webmin.com/" target="_blank">http://www.webmin.com/</a><br />Ajenti - &nbsp;<a href="http://ajenti.org/">http://ajenti.org/</a></p>
<p>&nbsp;</p>
<p>Before installing any Control Panel on VPS, check OS Compatability and resource requirements.</p>
<p>In the case of Free Web Control panels, FastWebHost doesn't provide support&nbsp;for all third party applications.</p>
<p>&nbsp;</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[How To Log Into Your VPS with PuTTY ( Windows users )]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/413]]></link>
<guid isPermaLink="false"><![CDATA[0deb1c54814305ca9ad266f53bc82511]]></guid>
<pubDate><![CDATA[Tue, 02 Feb 2016 22:27:11 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[OVERVIEW
PuTTY is a free software application for Windows 95, 98, XP, Vista, 7 and 10 which can be used to make an SSH connection to your server.
REQUIREMENTS
Before you start, you'll need:

Your VPS SSH login credentials. Please check VPS Welcome em...]]></description>
<content:encoded><![CDATA[<h2 class="h3 u-textAllcaps">OVERVIEW</h2>
<p>PuTTY is a free software application for Windows 95, 98, XP, Vista, 7 and 10 which can be used to make an SSH connection to your server.</p>
<h2 class="h3 u-textAllcaps">REQUIREMENTS</h2>
<p>Before you start, you'll need:</p>
<ul>
<li>Your VPS SSH login credentials. Please check VPS Welcome email.</li>
</ul>
<h2>Step One&mdash;Dowload PuTTY</h2>
<p>To log into your VPS on windows, you will need to have PuTTY, an SSH client, installed on your computer.</p>
<p>If you do not have it yet, you can download the program&nbsp;<a href="http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html" target="_blank">here</a>.&nbsp;Choose the windows installer.</p>
<p>&nbsp;</p>
<h2>Step Two&mdash;Set Up the Configuration Screen</h2>
<p>Once PuTTY is downloaded and installed, starting the program will take you to the configuration screen, where you need to make just a couple of changes.</p>
<p><img src="http://support.fastwebhost.com/img/kbimages/Putty_settings.png" alt="Putty Settings" width="449" height="434" /></p>
<ul>
<li>Fill in the &ldquo;Host Name (or IP address)&rdquo; field with the VPS IP address from the welcome email, make sure the port number is 22, and the connection type is SSH.</li>
<li>Additionally, click on the sidebar entry, SSH, and select &ldquo;2 only&rdquo; as the preferred SSH protocol version.</li>
<li>Once everything is configured, you can name and save these preferences for the future by clicking on Session in the sidebar and typing a title into the Saved Sessions field.</li>
<li>Then click save.</li>
</ul>
<p>&nbsp;</p>
<h2>Step Three&mdash;Connect</h2>
<p>Double click on the session name to connect, and accept the subsequent pop up that asks if you want to connect to the host.</p>
<p>If this is your first time connecting to the server from this computer, you will see the following output. Accept the connection by clicking Yes.</p>
<p><img src="http://support.fastwebhost.com/img/kbimages/Putty_alert.png" alt="Putty Alert" width="403" height="256" /></p>
<p>&nbsp;</p>
<p>a) Once the SSH Connection is open, you should see a terminal prompt asking for your username:</p>
<pre><code class="code-output">
login as:
</code></pre>
<p class="content_dv content_ve content_dv_40">Connect with your SSH user root.</p>
<p class="content_dv content_ve content_dv_40"><img src="http://support.fastwebhost.com/img/kbimages/Putty_connect.jpg" alt="Putty Connection" width="560" height="300" /></p>
<p class="content_dv content_ve content_dv_40">b) Next, enter your password. Please note that you will NOT see your cursor moving, or any characters typed (such as ******), when typing your password. This is a standard PuTTY security feature. Hit enter.</p>
<pre><code class="code-output">
Using keyboard-interactive authentication.
Password:</code></pre>
<p>c)&nbsp;You are now logged into your server with SSH. You should see output like this:</p>
<pre><code class="code-output">
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.

Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.<br />
example.com@n11:~$
</code></pre>
<p>&nbsp;</p>
<p>You can begin typing commands at the prompt.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[VPS/Cloud Server FAQ's]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/365]]></link>
<guid isPermaLink="false"><![CDATA[9be40cee5b0eee1462c82c6964087ff9]]></guid>
<pubDate><![CDATA[Wed, 05 Mar 2014 23:47:30 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[1) How to start/shutdown my VPS server?
You can Start/Stop/Reboot server from your billing manager. Once you login to billing click on &nbsp;My Products &amp; Services &nbsp;&gt;&gt; &nbsp;View Details
Once you open VPS page, you can see all the feature...]]></description>
<content:encoded><![CDATA[<h3 dir="ltr"><strong><span style="font-size: 12pt;">1) How to start/shutdown my VPS server?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">You can Start/Stop/Reboot server from your billing manager. Once you login to billing click on &nbsp;<strong>My Products &amp; Services &nbsp;&gt;&gt; &nbsp;View Details</strong></span></p>
<p dir="ltr"><span style="font-size: 12pt;">Once you open VPS page, you can see all the features to Start/Stop/Shutdown/Recovery and Reboot buttons. Just click respective operation to do on your server.</span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">2) Can I SSH to my Server?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">Absolutely. You can use any standard SSH client to connect server. Default port is 22.</span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">3) How many IPs do I get?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">All servers come with 1 dedicated IP address.</span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">4) Can I get Control Panel to manage web sites my server?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">Yes, we provide cPanel/WHM as an optional service ($14.99/mo) for VPS servers. Cpanel is the standard control panel used in web hosting industry. <a title="www.cpanel.net" href="http://www.cpanel.net">www.cpanel.net</a></span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">5) Can I setup third-party control panel on my server?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">You can buy and install any third-party control panel software on your server. There are lot of web hosting control panel vendors. Please go to below link for more information.</span></p>
<p dir="ltr"><span style="font-size: 12pt;"><a title="http://en.wikipedia.org/wiki/Comparison_of_web_hosting_control_panels" href="http://en.wikipedia.org/wiki/Comparison_of_web_hosting_control_panels">http://en.wikipedia.org/wiki/Comparison_of_web_hosting_control_panels</a></span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">6) Can you suggest any control panel which works better on your servers?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">We recommend following control panel softwares.</span></p>
<p dir="ltr"><span style="font-size: 12pt;">1) cPanel &nbsp;($14.99/mo) as an add-on service to our servers.</span></p>
<p dir="ltr"><span style="font-size: 12pt;">2) Webuzo ($2.5) from <a title="http://www.webuzo.com/" href="http://www.webuzo.com/">http://www.webuzo.com/</a></span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">7) How much technical knowledge do I need?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">VPS/Cloud server systems with FastWebHost are very easy to get up and running with pre-installed software and require very little experience to get started. However, remember that this is not a managed service by default, so you will be responsible for maintaining your server. We therefore recommend that you take the time to gain a basic understanding of Linux administration.</span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">8) What are the support services covered on my VPS server?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">We have given full access to manage server from our billing manager. You can Start/Stop/Shutdown/Reboot your server anytime without our help. Infact, you can even rebuild OS with clean installation by yourself.</span></p>
<p dir="ltr"><span style="font-size: 12pt;">We can&rsquo;t provide support for software/scripts installed on your server.</span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">9) What if I want to change my OS?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">If you require OS changes open HelpDesk ticket to get support from our staff.</span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">10) What if I break my cloud/VPS server?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">If you break your system, you can quickly get it running again, either by restoring a recent available backup, or by deleting it and creating a new VM with a clean installation.</span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">11) Can I firewall my server?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">Absolutely. We recommend configuring iptables on all cloud servers, as well as keeping up-to-date with patches to keep your systems secure. We also recommend installing&nbsp;Advanced Policy Firewall (APF). See more about APF <a href="https://www.rfxn.com/projects/advanced-policy-firewall/" target="_blank">Here</a></span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">12) How do you backup server?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">Once backups are enabled on your server, it will automatically be backed up every week and every month, so you will always have the opportunity to roll back your cloud server in case something goes wrong.</span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">14) Do you provide MySQL DBs?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">Yes, you can install MySQL Database server on your server. Running a MySQL service is quick and simple, giving you full control over your database.</span></p>
<h3 dir="ltr"><strong><span style="font-size: 12pt;">15) How many web sites I can host on my VPS server?</span></strong></h3>
<p dir="ltr"><span style="font-size: 12pt;">We don&rsquo;t limit to how many services, domains, or applications you can run from your server. However, you need to make sure you allocate enough resources to deal with the services you expect to provide.</span></p>
<div>&nbsp;</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[How to create a CSR and install a SSL Certificate in WHM]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/403]]></link>
<guid isPermaLink="false"><![CDATA[bbf94b34eb32268ada57a3be5062fe7d]]></guid>
<pubDate><![CDATA[Thu, 13 Aug 2015 22:58:11 -0700]]></pubDate>
<dc:creator />
<description><![CDATA[&nbsp;


Login to your WebHost Manager control panel.


On the left menu click on Generate a SSL Certificate and Signing Request.


In the Generate a New Certificate Signing Request section, enter the following information:
Email - Your email ad...]]></description>
<content:encoded><![CDATA[<div class="_zXc"><strong>&nbsp;</strong></div>
<div class="_yXc"><ol class="_jYe">
<li>
<p>Login to your WebHost Manager control panel.</p>
</li>
<li>
<p>On the left menu click on <strong>Generate a SSL Certificate and Signing Request</strong>.</p>
</li>
<li>
<p>In the <strong>Generate a New Certificate Signing Request</strong> section, enter the following information:</p>
<p><strong>Email</strong> - Your email address where the CSR will be sent.</p>
<p><strong>Password</strong> - Make up a password to be associated with the certificate. You will need to remember this password later.</p>
<p><strong>Host</strong> - The domain that you enetered or selected when generating the private key.</p>
<p><strong>City</strong> - The city in which your organization is located.</p>
<p><strong>State</strong> - The state in which your organization is located. Do not use an abbreviation.</p>
<p><strong>Country</strong> - Your two-digit country code.</p>
<p><strong>Company Name</strong> - The legally registered name of your organization/company.</p>
<p><strong>Company Division</strong> - The name of your department within the organization (frequently this entry will be listed as "IT," "Web Security," or is simply left blank).</p>
</li>
<li>
<p>Click the <strong>Create</strong> button.</p>
<p>&nbsp;</p>
<p>Your &ldquo;<em><strong>CSR</strong></em>&rdquo; should look similar to this:</p>
<div class="white_box">&nbsp;
<div class="white_box">-----BEGIN CERTIFICATE REQUEST-----<br />MIIDBDCCAewCAQAwgaIxCzAJBgNVBAYTAlVTMQswCQYDVQQIDAJ2YTEXMBUGA1UE BwwOVklSR0lOSUEgQkVBQ0gxEzARBgNVBAoMCm15IGNvbXBhbnkxGzAZBgNVBAsM EmFjY291bnRzICBiaWxsYWJsZTEUMBIGA1UEAwwLZXhhbXBsZS5jb20xJTAjBgkq hkiG9w0BCQEWFmpvaG5wYXVsYmltaEBnbWFpbC5jb20wggEiMA0GCSqGSIb3DQEB AQUAA4IBDwAwggEKAoIBAQC71pAAJ+R2pFahbxNba2amArYf2sihhlJY7JCTO5Cr S+CcHH7SoWfdasf sedfasffdGButpAgFLYzbMtmP2nT0M0wfPvCwA0eyheli24wn3bM2e oxxN78CUNUfWZZUfGh3ppq0XJpnu7dncSzomQuSH5BAxi+riK76oA9nNkTY/3aUG DOcKZmkEYuZaNeA9EAew7R04TM5YW2WReecrHQ1Ay0AtRvbtQBlQNNNnrfZlakob Yk0OBleS+8Sf5tXl7et13BKNEYfhY8Xj5Ag5xxSdrWoT46L2RzmtSvV1gc946Kcl 0N7tZe3ydTCeA8kcMG4gpz5W7y6JePjOV5bk8qPBIIjRAgMBAAGgHDAaBgkqhkiG 9w0BCQcxDQwLR2V0MW5Nb3Rpb24wDQYJKoZIhvcNAQEFBQADggEBACU/ZpVJPvqG jiri+Gtov2Hi1Kqd7NE+RjHUL3eZvd/EoZGRFu871ZcFiMQLxSwdP3ssrHF6aQRW 9MrVd1/k2M5qzmxf3Vd/bklWMYOhsniW8aG778893IAdqXIF+iZAeX95543kb5qQ Ji0yw0fcBZb6wAroMqAtDPWNySK6DF/hOSNvLZ7BsUdsKq5R5NzYrUKnzB4m/dnF /2gFm5apPdXJvmXbuNGVFZ3VBi40mafWwJ0kjMVqNgCE0qr97W0bBHCHCZ5vYQZz JOvexPVsrJQUYHcTe0REk73XUAHtgIhpxUQ8uZrLQXUHoRcDiharJgTal9YQnPZc 78TaTKV0NtU=</div>
<div class="white_box">-----END CERTIFICATE REQUEST-----</div>
</div>
</li>
</ol></div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Secure your LAMP based Cloud VPS]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/406]]></link>
<guid isPermaLink="false"><![CDATA[8cb22bdd0b7ba1ab13d742e22eed8da2]]></guid>
<pubDate><![CDATA[Wed, 26 Aug 2015 17:53:53 -0700]]></pubDate>
<dc:creator />
<description><![CDATA[We&rsquo;ve put together a little guide to help you reduce the risk of your your LAMP based servers from getting hacked. LAMP is one of the most popularly used Application Stacks. It stands for Linux, Apache, PHP and MySQL.
Mitigate the risks of your ser...]]></description>
<content:encoded><![CDATA[<p>We&rsquo;ve put together a little guide to help you reduce the risk of your your LAMP based servers from getting hacked. LAMP is one of the most popularly used Application Stacks. It stands for Linux, Apache, PHP and MySQL.</p>
<p><strong>Mitigate the risks of your servers being attacked</strong></p>
<p><strong>General Security Guidelines to be followed for securing your Web Server</strong></p>
<ul>
<li>Sign up for updates and announcements from the Web Server Mailing List.</li>
<li>Upgrade to the latest version whenever there is an update.</li>
<li>Install only the modules you require and disable unnecessary ones.</li>
<li>Make sure you log all admin level accesses with date, times and usernames</li>
<li>Do not display your server version or OS version in error messages.</li>
</ul>
<h3><strong>For Servers with Apache:</strong></h3>
<h4><strong>1.&nbsp;&nbsp; Hide the Apache Version number, and other sensitive information</strong></h4>
<p>It is essential to hide the Apache Version Number your server is running, as well as other sensitive information. You can do this by following the simple steps listed below.</p>
<p>Add or Edit the following two directives in your httpd.conf file</p>
<p><strong>ServerSignature Off<br /> ServerTokens Prod</strong></p>
<p>The ServerSignature appears on the bottom of pages generated by apache such as 404 pages, directory listings, etc.</p>
<p>The ServerTokens directive is used to determine what Apache will put in the Server HTTP response header. By setting it to Prod it sets the HTTP response header as follows:</p>
<p>Server: Apache</p>
<h4><strong>2.&nbsp;&nbsp; Make sure apache is running under its own user account and group</strong></h4>
<p>When Apache is installed, the default user is set as &ldquo;nobody&rdquo;. However if there other applications that also run as the user nobody on your system, then a compromise of apache can also compromise other installations. It is best to add a separate user &ldquo;apache&rdquo; and then modify the following directives in httpd.conf to run apache as it own user.</p>
<p><strong>User apache<br /> Group apache<br /> </strong></p>
<h4><strong>3.&nbsp;&nbsp; Ensure that files outside the web root directory are not accessed.</strong></h4>
<p>It is always good practice to restrict access for files outside the web root directory to maintain security and ensure that these files are only accessed by people who need to access them.</p>
<p>&lt;Directory /&gt;<br /> Order Deny,Allow<br /> Deny from all<br /> Options None<br /> AllowOverride None<br /> &lt;/Directory&gt;<br /> &lt;Directory /html&gt;<br /> Order Allow,Deny<br /> Allow from all<br /> &lt;/Directory&gt;</p>
<p>Note that because we set &ldquo;Options None&rdquo; and &ldquo;AllowOverride None &ldquo;this will turn off all options and overrides for the server. You now have to add them explicitly for each directory that requires an Option or Override.</p>
<h4><strong>4.&nbsp;&nbsp; Turn off directory browsing, Follow symbolic links and CGI execution</strong></h4>
<p>You can do this with an Options directive inside a Directory tag.</p>
<ul>
<li>If you want to turn off all Options simply use:</li>
</ul>
<p>Options None</p>
<ul>
<li>If you only want to turn off some, separate each option with a space in your Options directive:</li>
</ul>
<p>Options -ExecCGI -FollowSymLinks -Indexes</p>
<h4><strong>5.&nbsp; Install modsecurity</strong></h4>
<p>ModSecurity is an Apache add on module which can detect and prevent http attacks.&nbsp; It can come in really handy in preventing SQL injections in case your developers forget to add input validation or identify and block information disclosure issues such as leaking detailed error messages, Social Security Numbers or Credit Card Numbers. Follow these steps to install mod-security</p>
<p>On CentOS:</p>
<p><em>yum install mod_security</em></p>
<p>On Ubuntu:</p>
<p><em>apt-get install mod_security.</em></p>
<p><em>service httpd restart</em></p>
<h4><strong>6.&nbsp; Disable any unnecessary modules</strong></h4>
<p>There are several modules that are enabled on your Apache Web Server that you may not need. To search for modules installed run:</p>
<p><em>grep LoadModule httpd.conf</em></p>
<p>Here are some modules that are typically enabled but often not needed:</p>
<p>mod_imap</p>
<p>mod_include</p>
<p>mod_info</p>
<p>mod_userdir</p>
<p>mod_status</p>
<p>mod_cgi</p>
<p>mod_autoindex.</p>
<p>To disable them add a # sign in front of them.</p>
<p>You can also go through the Apache <a href="http://httpd.apache.org/docs/2.0/mod/">module documentation</a> and disable or enable any that you need.</p>
<h4><strong>7.&nbsp; Lower the Timeout value</strong></h4>
<p>The default Timeout directive is set to 300 seconds. Decreasing this value help&rsquo;s mitigating the potential effects of a denial of service attack.</p>
<p><em>Timeout 45</em></p>
<h4><strong>8.&nbsp; Limit large requests</strong></h4>
<p>In order to mitigate the effects of a denial of service attack, limit the amount of body that can be</p>
<p>sent in an http request.&nbsp; If you do not have large uploads then you can limit this to 1Mb via the below directive.</p>
<p><em>LimitRequestBody 1048576</em></p>
<h4><strong>Application and Database Security</strong></h4>
<p>SQL injection is another common way of extracting data from poorly coded websites. Here is how you can prevent it and other such attacks.</p>
<ul>
<li>Ensure your Applications like Joomla, WordPress, Drupal etc are upto date.</li>
<li>Subscribe to Bug updates and Vulnerability reports.</li>
<li>Try and avoid world writable 777 permissions your files or folders.</li>
<li>Regularly check for viruses or infections by scanning your web package.</li>
<li>If you are using MySQL or MariaDB run the mysql secure installation script.</li>
<li>If your application requires you to store confidential information like username, passwords, credit card data etc. then ensure that all communication is encrypted by using a Digital Certificate.</li>
</ul>
<h3><strong>For servers with PHP:</strong></h3>
<h4><strong>1.&nbsp; Run PHP as a separate User</strong></h4>
<p>It is recommended to Install php as a separate user than as an Apache Module. If you install php as an Apache Module then php will run with the apache user permission and any compromise of a vulnerable php script can lead to a server wide compromise.</p>
<p>A better way to install php would be with <a href="http://php-fpm.org/">php-fpm</a> a fastcgi process manager which lets you run and manage php scripts as a separate user.</p>
<h4><strong>2.&nbsp; Use the POST method to pass important parameters like credit card information</strong></h4>
<p>Many developers already know this. PHP has two methods to pass variable information via a form the GET method and the POST method. The most important difference between these methods is that the GET method makes your pass information visible to everyone via a URL while POST method does not. Hence sensitive information like usernames, passwords should always be passed via the POST method.</p>
<h4><strong>3.&nbsp; Always Validate Form and Text Input</strong></h4>
<p>Cross site scripting and SQL injection can both be prevented if form or file input is validated.</p>
<p>Cross site scripting allows a hacker to run malicious code on your server by simply uploading a file with malicious code in it to be run on the server and SQL injection allows a hacker to get access to your database by injecting malicious queries in your form to get database information like table name. A simple way to validate php code can be found at <a href="http://www.w3schools.com/php/php_form_validation.asp">http://www.w3schools.com/php/php_form_validation.asp</a></p>
<h4><strong>4 . Hide the PHP version</strong></h4>
<p>Open php.ini and add the following</p>
<p><em>Vim /etc/php.ini</em></p>
<p><em>expose_php = Off</em></p>
<p><strong>5.Log all php errors to a file and not on the website</strong></p>
<p><em>display_errors = Off</em></p>
<p><em>log_errors = On</em></p>
<p><em>error_log = /var/log/httpd/php_error.log</em></p>
<h3><strong>For servers with MySQL or MariaDB:</strong></h3>
<h4><strong>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Run MySQL Secure Install</strong></h4>
<p>After installing MySQL run the mysql_secure_installation script.</p>
<p><em>sudo&nbsp; &nbsp;/usr/bin/mysql_secure_installation</em></p>
<p>This script will prompt you to add a mysql root password, lock root access to localhost and remove any unwanted databases like the test database.</p>
<h4><strong>2. &nbsp; &nbsp; </strong><strong>Secure MySQL users and Database</strong></h4>
<p>Log into your MySQL Server and ensure that all MySQL users have a password and delete any unwanted user. Grant access to only those databases that the respective users would use.</p>
<p>Following the steps detailed above, you can go a long way in ensuring that your customer&rsquo;s data remains secure.&nbsp; In the next article I will add detail steps on Linux OS and Firewall Security.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Do I need a domain name (FQDN) for the hostname (VPS Hosting)?]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/407]]></link>
<guid isPermaLink="false"><![CDATA[f4f6dce2f3a0f9dada0c2b5b66452017]]></guid>
<pubDate><![CDATA[Tue, 01 Sep 2015 12:48:46 -0700]]></pubDate>
<dc:creator />
<description><![CDATA[The hostname is an arbitrary identifier for your VPS. It can be either a Fully Qualified Domain Name (FQDN) or a single word. It must be at least 4 characters. It may not contain any underscores.If you want to buy a domain name to use here, you will need ...]]></description>
<content:encoded><![CDATA[<p>The hostname is an <strong>arbitrary identifier</strong> for your VPS. It can be either a <strong>Fully Qualified Domain Name</strong> (FQDN) or a <strong>single word</strong>. It must be <strong>at least 4 characters</strong>. It may not contain any underscores.<br /><br />If you want to buy a domain name to use here, you will need to do so first <a href="https://www.fastwebhost.com/domain-names.html">here =&gt;</a>. &nbsp;</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Change Hostname of Linux, CentOS, Ubuntu and Debian]]></title>
<link><![CDATA[https://support.fastwebhost.com/index.php?/Knowledgebase/Article/View/411]]></link>
<guid isPermaLink="false"><![CDATA[17d63b1625c816c22647a73e1482372b]]></guid>
<pubDate><![CDATA[Mon, 25 Jan 2016 02:05:34 -0800]]></pubDate>
<dc:creator />
<description><![CDATA[Changing the Hostname
You&rsquo;ll need to set your system&rsquo;s hostname and fully qualified domain name (FQDN). Your hostname should be something unique. Note that the system&rsquo;s hostname has no relationship to websites or email services hosted o...]]></description>
<content:encoded><![CDATA[<h2 id="setting-the-hostname">Changing the Hostname</h2>
<p>You&rsquo;ll need to set your system&rsquo;s hostname and fully qualified domain name (FQDN). Your hostname should be something unique. Note that the system&rsquo;s hostname has no relationship to websites or email services hosted on it, aside from providing a name for the system itself. Your hostname should&nbsp;<em>not</em>&nbsp;be &ldquo;www&rdquo; or anything too generic.</p>
<p>Hostname's examples, "server1", "wwwbox2", or "server50.mydomain.com".</p>
<p>&nbsp;</p>
<h2>CentOS 7 / Debian 8 / Fedora version 18 and above / Ubuntu 15.04</h2>
<p>Replace&nbsp;<strong><code>hostname</code></strong>&nbsp;with one of your choice.</p>
<pre>hostnamectl set-hostname hostname</pre>
<p>&nbsp;</p>
<h2 id="debian-7--slackware--ubuntu-1404">Debian 7 / Slackware / Ubuntu 14.04</h2>
<p>Replace&nbsp;<strong><code>hostname</code></strong>&nbsp;with one of your choice.</p>
<p>&nbsp;</p>
<p><code>echo "hostname" &gt; /etc/hostname&nbsp;</code></p>
<p><code>hostname -F /etc/hostname</code></p>
<p>&nbsp;</p>
<div class="highlight plaintext">
<p>Check if the file&nbsp;<code>/etc/default/dhcpcd</code>&nbsp;exists.</p>
<pre><code>ls /etc/default</code></pre>
<div class="highlight plaintext">&nbsp;</div>
<p>If so, edit it and comment out the&nbsp;<strong><code>SET_HOSTNAME</code></strong>&nbsp;directive:</p>
<dl class="file-excerpt"><dt>/etc/default/dhcpcd</dt><dt></dt><dt>
<pre><code>#SET_HOSTNAME='yes'</code></pre>
</dt><dt></dt><dd>
<div class="highlight plaintext">
<p>&nbsp;</p>
</div>
</dd></dl>
<h2 id="centos-6--fedora-version-17-and-below">CentOS 6 / Fedora version 17 and below</h2>
<p>Replace&nbsp;<strong><code>hostname</code></strong>&nbsp;with one of your choice.</p>
<pre><code>1) echo "HOSTNAME=hostname" &gt;&gt; /etc/sysconfig/network
2) hostname "hostname"</code></pre>
<h3>&nbsp;</h3>
<h3 id="update-etchosts"><strong>Update /etc/hosts</strong></h3>
<p>Next, edit your&nbsp;<code>/etc/hosts</code>&nbsp;file to resemble the following example, replacing&nbsp;<code>hostname</code>&nbsp;with your chosen hostname,&nbsp;<code>example.com</code>&nbsp;with your system&rsquo;s domain name, and&nbsp;67.227.230.55&nbsp;with your system&rsquo;s IP address. As with the hostname, the domain name part of your FQDN does not necessarily need to have any relationship to websites or other services hosted on the server (although it may if you wish). As an example, you might host &ldquo;www.something.com&rdquo; on your server, but the system&rsquo;s FQDN might be &ldquo;mars.somethingelse.com.&rdquo;</p>
<dl class="file"><dt>/etc/hosts</dt><dt></dt><dt>
<pre><code>127.0.0.1 localhost.localdomain localhost 
67.227.230.55 hostname.example.com hostname</code></pre>
</dt><dt></dt><dd>
<div class="highlight plaintext">&nbsp;</div>
</dd></dl>
<p>If you have IPv6 enabled on your Linode, you will also want to add an entry for your IPv6 address, as shown in this example:</p>
<dl class="file"><dt>/etc/hosts</dt><dt></dt><dt>
<pre><code>127.0.0.1 localhost.localdomain localhost 
67.227.230.55 hostname.example.com hostname 
0:0:0:0:0:ffff:43e3:e637 hostname.example.com hostname</code></pre>
</dt><dd>
<div class="highlight plaintext">
<p>&nbsp;</p>
<p>Now your VPS is ready with new hostname.</p>
<p>&nbsp;</p>
</div>
</dd></dl></div>]]></content:encoded>
</item>
</channel>
</rss>