security








How to Secure SSH

This document lists several helpful changes that you can make to your server to improve SSH security.

Read more






Manage Ip Access

The Manage Ip Access interface allows you to revoke permission to log in to your Manage2 account from an IP address in the removed IP range.

Read more

PCI Compliance and Software Versions

This document discusses some of the specific software packages that contain known vulnerabilities. This document will also help you determine whether developers used the backport process to patch a software package.

Read more

PHP Handlers

PHP handlers contain libraries that the Apache web server uses to interpret and run PHP code.

Read more

PHP Security Concepts

Web applications written in PHP may contain security vulnerabilities that malicious users can exploit to gain sensitive information about your system or your users.

Read more


Security Best Practices

This document describes some security best practices that will help you protect your websites, files, and accounts from attackers.

Read more

Security Levels

This document explains the security levels for advisories that we post on our Security page.

Read more