Security

 

    SSL Certificates

 

    How to order an SSL certificate

    What is SSL Certificate?

    How Do I Install SSL Certificate?

    What is Certificate Signing Request (CSR)?

    How to generate a CSR

    What is Certificate Authority (CA)?

    What does the CA (Certificate Authority) do with the CSR?

    How to use www and non-www domains with an SSL certificate

    How to install a third-party SSL certificate

    What is Let's Encrypt SSL certificate?

    Getting Free SSL/TLS Certificate from Let's Encrypt

    How does an SSL certificate work?

    Does SSL Work on Email?

    SSL certificates and Server Name Indication (SNI) support

    What is Standard SSL?

    What is Extended SSL?

    How to renew SSL certificate

    Adding your own SSL Certificate

 

   Vulnerabilities and Exploits

 

    Meltdown & Spectre Security Vulnerabilities

    Securing Windows SMB and NetBios/NetBT Services

    Malicious URL Troubleshooting and Guidelines

    Linux Kernel Local Privilege Escalation Vulnerability (CVE-2016-5195)

    Multiple OpenSSL vulnerabilities (CVE-2016-2107 and CVE-2016-2108)

    Critical OpenSSL vulnerabilities - DROWN CVE-2016-0800

    Critical Linux vulnerability CVE-2015-7547 in GNU C Library (glibc)

    Botnet Troubleshooting and Guidelines

    Guide to Zeus Infections

    Guide to Microsoft SQL Server Browser Service Access Amplification Issues

    Securing your Memcached Server

    Guide to Mayhem Infection

    Protecting Intelligent Platform Management Interface (IPMI) devices

    Sinkhole HTTP Referers and what to do about them

 

 

    Acceptable Usage Guidelines

 

     Reporting malicious URLs, such as phishing, hosted on the KEKhost/KEKhosting network

    Understanding USA's Anti-Spam Law (CAN SPAM)

    Understanding Canada's Anti-Spam Legislation (CASL)

    Complying with IETF standards and managing security incidents on your website and server

    Reporting unsolicited emails (spam) from the KEKhost/KEKhosting network

    Sending Copyright & Trademark infringement notices to KEKhost/KEKhosting

    Acceptable Use Policy Notifications

    Determining if a server is blacklisted

    Acceptable Use Policy

 

 

   Best Practices

 

    Guide to Microsoft Active Directory rootDSE/C-LDAP security issues

    Forum and Comment Spam

    Using Spamhaus DNSBL queries on KEKhost/KEKhosting network

    Brobot Malware Troubleshooting and Guidelines

    Installing and configuring ConfigServer Security & Firewall (CSF)

    Copyright and Trademark Guide

    Guide to Objectionable Content

    Recognizing Phishing Attacks

    Detecting Malicious Processes in Linux and Windows

    Denial of Service Guide

    Information on Hosting of Illegal Content

    Spam Issue Troubleshooting and Guidelines

    Ensuring abuse notifications are received

    Verifying CMS versions on multiple websites

    Guide to DNS Open Recursion Amplification Issues