<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Post4VPS Forum | Free VPS Provider - VPS Protection]]></title>
		<link>https://post4vps.com/</link>
		<description><![CDATA[Post4VPS Forum | Free VPS Provider - https://post4vps.com]]></description>
		<pubDate>Fri, 22 May 2026 22:07:19 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[free anti-ddos websites]]></title>
			<link>https://post4vps.com/Thread-free-anti-ddos-websites</link>
			<pubDate>Sat, 24 Apr 2021 12:44:22 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=874">hamed</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-free-anti-ddos-websites</guid>
			<description><![CDATA[<span style="color: #454638;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: MsYekan, Tahoma;" class="mycode_font">Hi friends, I had a few questions.</span></span></span><br />
<span style="color: #454638;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: MsYekan, Tahoma;" class="mycode_font">What is the best VPS Anti attack and Website anti ddos (free) and how can I get it, does it need a visa card or is it completely free?</span></span></span><br />
<span style="color: #454638;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: MsYekan, Tahoma;" class="mycode_font">Please share the sites that offer this package for free. Thank you</span></span></span>]]></description>
			<content:encoded><![CDATA[<span style="color: #454638;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: MsYekan, Tahoma;" class="mycode_font">Hi friends, I had a few questions.</span></span></span><br />
<span style="color: #454638;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: MsYekan, Tahoma;" class="mycode_font">What is the best VPS Anti attack and Website anti ddos (free) and how can I get it, does it need a visa card or is it completely free?</span></span></span><br />
<span style="color: #454638;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: MsYekan, Tahoma;" class="mycode_font">Please share the sites that offer this package for free. Thank you</span></span></span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Update your Laravel!]]></title>
			<link>https://post4vps.com/Thread-Update-your-Laravel</link>
			<pubDate>Sun, 28 Mar 2021 14:10:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=1446">LightDestory</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Update-your-Laravel</guid>
			<description><![CDATA[I open this thread to let you know that you must always update your software!<br />
<br />
Recently a new <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3129" target="_blank" rel="noopener" class="mycode_url">CVE</a> has been filled that explain how to exploit a "Ignition" bug that allows the arbitraty execution of code. IT is really dangerous.<br />
One of my friend VPS has been infected buy a <a href="https://blog.aquasec.com/threat-alert-kinsing-malware-container-vulnerability" target="_blank" rel="noopener" class="mycode_url">cryptominer</a>, the aricle I am going to post here talks about Docker APIs but the same "malicious command" has been used on Laravel's exploting. He requested my help to eradicate that maleware... well it was a nightmare, killing the process was useless because a new one will start soon after. What you need to do is find a a cron job that let the malware in.<br />
<br />
Another <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21263" target="_blank" rel="noopener" class="mycode_url">CVE</a> regards databse queries... but it is less dangerous that a miner inside your server! As the CVE article says, most of attempt of this exploit will result on "no result" from the query...<br />
<br />
<br />
Stay safe, stay updated!]]></description>
			<content:encoded><![CDATA[I open this thread to let you know that you must always update your software!<br />
<br />
Recently a new <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3129" target="_blank" rel="noopener" class="mycode_url">CVE</a> has been filled that explain how to exploit a "Ignition" bug that allows the arbitraty execution of code. IT is really dangerous.<br />
One of my friend VPS has been infected buy a <a href="https://blog.aquasec.com/threat-alert-kinsing-malware-container-vulnerability" target="_blank" rel="noopener" class="mycode_url">cryptominer</a>, the aricle I am going to post here talks about Docker APIs but the same "malicious command" has been used on Laravel's exploting. He requested my help to eradicate that maleware... well it was a nightmare, killing the process was useless because a new one will start soon after. What you need to do is find a a cron job that let the malware in.<br />
<br />
Another <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-21263" target="_blank" rel="noopener" class="mycode_url">CVE</a> regards databse queries... but it is less dangerous that a miner inside your server! As the CVE article says, most of attempt of this exploit will result on "no result" from the query...<br />
<br />
<br />
Stay safe, stay updated!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[IMPORTANT - enhance security of your Ubuntu 14.04 lts install if still using it]]></title>
			<link>https://post4vps.com/Thread-IMPORTANT-enhance-security-of-your-Ubuntu-14-04-lts-install-if-still-using-it</link>
			<pubDate>Thu, 20 Aug 2020 22:15:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=461">rudra</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-IMPORTANT-enhance-security-of-your-Ubuntu-14-04-lts-install-if-still-using-it</guid>
			<description><![CDATA[I hear that some people are still using Ubuntu 14.04 LTS on their VPS. This is to inform them , in case they dont already know it, about Ubuntu Advantage - ESM ( extended security maintenance ).<br />
<br />
this is extended support for 14.04 lts that provides security updates essential to keep your system secure and stable.<br />
<br />
You can use this service provided by Ubuntu on upto 3 machines for free in case it is personal use. (known community members their can use on upto 50 machines for free for personal use ).<br />
<br />
What to do - steps<br />
<br />
go to <a href="https://ubuntu.com/advantage" target="_blank" rel="noopener" class="mycode_url">https://ubuntu.com/advantage</a> <br />
<br />
login ( if you already have a ubuntu one account. it is free ) or register and then login. Now you will see a command with token like 'ua attach token'<br />
<br />
you run that with sudo or on root account and your system will be configured automagically.<br />
<br />
now check with 'ua status'<br />
<br />
now update using apt-get as you normally do and profit !!!<br />
<br />
NOTE: I am working on bringing Ubuntu OS upgrade without using  control panel vnc / novnc. Hopefully I will succeed and then you will get to enjoy the latest LTS on your VPS. fingers crossed ...]]></description>
			<content:encoded><![CDATA[I hear that some people are still using Ubuntu 14.04 LTS on their VPS. This is to inform them , in case they dont already know it, about Ubuntu Advantage - ESM ( extended security maintenance ).<br />
<br />
this is extended support for 14.04 lts that provides security updates essential to keep your system secure and stable.<br />
<br />
You can use this service provided by Ubuntu on upto 3 machines for free in case it is personal use. (known community members their can use on upto 50 machines for free for personal use ).<br />
<br />
What to do - steps<br />
<br />
go to <a href="https://ubuntu.com/advantage" target="_blank" rel="noopener" class="mycode_url">https://ubuntu.com/advantage</a> <br />
<br />
login ( if you already have a ubuntu one account. it is free ) or register and then login. Now you will see a command with token like 'ua attach token'<br />
<br />
you run that with sudo or on root account and your system will be configured automagically.<br />
<br />
now check with 'ua status'<br />
<br />
now update using apt-get as you normally do and profit !!!<br />
<br />
NOTE: I am working on bringing Ubuntu OS upgrade without using  control panel vnc / novnc. Hopefully I will succeed and then you will get to enjoy the latest LTS on your VPS. fingers crossed ...]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[default OS reinstall plan - kvm vps users]]></title>
			<link>https://post4vps.com/Thread-default-OS-reinstall-plan-kvm-vps-users</link>
			<pubDate>Fri, 14 Aug 2020 22:19:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=461">rudra</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-default-OS-reinstall-plan-kvm-vps-users</guid>
			<description><![CDATA[I have some questions for the current users of vps 2,3,6,7,9,16,17,18 .... these are the kvm VPS s without control panel.<br />
<br />
1) what are the Linux flavours you use ? centos, ubuntu. please mention version<br />
<br />
2) could you afford to spare / reserve say 3-5 GB space on your HDD for system recovery or reinstall on your own any time you like ? <br />
<br />
3) do you want option to emergency reboot to a live environment with vnc access and recover / reinstall from there ?<br />
<br />
4) do you use passwords or key file to login to your vps through ssh ?<br />
<br />
5) what is your current hdd partition scheme ? what would you do differently if you could configure it during install ?<br />
<br />
thanks<br />
<br />
re. I'm working on getting a unified system to fresh install Linux on these VPSs. So your input is very important.<br />
<br />
thanks..]]></description>
			<content:encoded><![CDATA[I have some questions for the current users of vps 2,3,6,7,9,16,17,18 .... these are the kvm VPS s without control panel.<br />
<br />
1) what are the Linux flavours you use ? centos, ubuntu. please mention version<br />
<br />
2) could you afford to spare / reserve say 3-5 GB space on your HDD for system recovery or reinstall on your own any time you like ? <br />
<br />
3) do you want option to emergency reboot to a live environment with vnc access and recover / reinstall from there ?<br />
<br />
4) do you use passwords or key file to login to your vps through ssh ?<br />
<br />
5) what is your current hdd partition scheme ? what would you do differently if you could configure it during install ?<br />
<br />
thanks<br />
<br />
re. I'm working on getting a unified system to fresh install Linux on these VPSs. So your input is very important.<br />
<br />
thanks..]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[SSH restoration and OS reinstallation without control panel]]></title>
			<link>https://post4vps.com/Thread-SSH-restoration-and-OS-reinstallation-without-control-panel</link>
			<pubDate>Thu, 06 Aug 2020 09:56:26 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=461">rudra</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-SSH-restoration-and-OS-reinstallation-without-control-panel</guid>
			<description><![CDATA[HI,<br />
<br />
 P4V has multiple KVM VPSs without control panel. So the VPS owners are forced to contact staff/admin when they lock themselves out of SSH somehow or want a reinstall of OS.<br />
<br />
Now here is what I propose to enable you guys to restore SSH and reinstall OS on your own in all of the scenarios except one [ tell you at the bottom ].<br />
<br />
1) <span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">restore SSH</span> -</span><br />
<br />
setup a github public account and fix a specific file over there that will be used as our flag.<br />
<br />
Now we make a script that periodically checks that flag for some predetermined sign and when it gets that sign, it just uninstalls and reinstalls SSH, restores your sshd settings and makes sure that the designated port is accessible from outside though firewall.<br />
<br />
The sign can be a simple 'yes' or anything you like.<br />
<br />
You can incorporate network checks and reset option in the script too !!<br />
<br />
2) <span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Reinstall OS</span> -</span><br />
<br />
This will be almost similar.. almost<br />
<br />
Here you use a preseed file with basic netboot iso install image that is loaded and run through grub to prepare a basic system automatically [ unattended ] and ssh is enabled which you can use to login to complete the steps.<br />
<br />
Here also we use another script that periodically checks a flag.<br />
<br />
I can help you guys with the preseed file for ubuntu and how to set that up. For other OS, you will have to experiment I guess.<br />
<br />
So we mainly use cron to run a script that checks say every hour for our two flags. So even if we lose access to the system, It can do a sort of reset to let us back in or reinstall OS for us.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff3399;" class="mycode_color">The big plus i see is more freedom for both staff and VPS owners.</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">What do you guys say ?</span><br />
<br />
<br />
NOTE. - If you nuke the system so hard that nothing is working inside and even the cron, base system is corrupted, then I guess you will have to contact the staff. But let me hazard a guess, you guys rarely end up in that kind of scenario. It is mostly wanting to start fresh with an OS. isn't it?<br />
<br />
Edit2: also check<br />
<a href="https://post4vps.com/Thread-default-OS-reinstall-plan-kvm-vps-users?pid=37904#pid37904" target="_blank" rel="noopener" class="mycode_url">https://post4vps.com/Thread-default-OS-r...4#pid37904</a>]]></description>
			<content:encoded><![CDATA[HI,<br />
<br />
 P4V has multiple KVM VPSs without control panel. So the VPS owners are forced to contact staff/admin when they lock themselves out of SSH somehow or want a reinstall of OS.<br />
<br />
Now here is what I propose to enable you guys to restore SSH and reinstall OS on your own in all of the scenarios except one [ tell you at the bottom ].<br />
<br />
1) <span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">restore SSH</span> -</span><br />
<br />
setup a github public account and fix a specific file over there that will be used as our flag.<br />
<br />
Now we make a script that periodically checks that flag for some predetermined sign and when it gets that sign, it just uninstalls and reinstalls SSH, restores your sshd settings and makes sure that the designated port is accessible from outside though firewall.<br />
<br />
The sign can be a simple 'yes' or anything you like.<br />
<br />
You can incorporate network checks and reset option in the script too !!<br />
<br />
2) <span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Reinstall OS</span> -</span><br />
<br />
This will be almost similar.. almost<br />
<br />
Here you use a preseed file with basic netboot iso install image that is loaded and run through grub to prepare a basic system automatically [ unattended ] and ssh is enabled which you can use to login to complete the steps.<br />
<br />
Here also we use another script that periodically checks a flag.<br />
<br />
I can help you guys with the preseed file for ubuntu and how to set that up. For other OS, you will have to experiment I guess.<br />
<br />
So we mainly use cron to run a script that checks say every hour for our two flags. So even if we lose access to the system, It can do a sort of reset to let us back in or reinstall OS for us.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff3399;" class="mycode_color">The big plus i see is more freedom for both staff and VPS owners.</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">What do you guys say ?</span><br />
<br />
<br />
NOTE. - If you nuke the system so hard that nothing is working inside and even the cron, base system is corrupted, then I guess you will have to contact the staff. But let me hazard a guess, you guys rarely end up in that kind of scenario. It is mostly wanting to start fresh with an OS. isn't it?<br />
<br />
Edit2: also check<br />
<a href="https://post4vps.com/Thread-default-OS-reinstall-plan-kvm-vps-users?pid=37904#pid37904" target="_blank" rel="noopener" class="mycode_url">https://post4vps.com/Thread-default-OS-r...4#pid37904</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Domain shadowing - beware!]]></title>
			<link>https://post4vps.com/Thread-Domain-shadowing-beware</link>
			<pubDate>Tue, 10 Mar 2020 02:14:48 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=917">deanhills</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Domain-shadowing-beware</guid>
			<description><![CDATA[One thing that is important when one buys a domain is to make doubly sure you are the only owner of that domain with exclusive access to the domain credentials - direct ownership.  The best way to ensure this exclusive ownership is to do the sale directly with a well known Registrar such as Namecheap or Namesilo instead of using third parties or affiliates.  Don't use a domain reseller whom you don't know and beware when friends of friends of resellers try and sell you cheap deals.  Like if the price looks too good to be true, there is a very good chance it is too good to be true and you may become an unwitting victim of some or other scam.  I'm not saying that is certain it will happen, but in this day and age of specialist hackers, particularly with domains you need to be vigilant and use lots of common sense.<br />
<br />
Domain shadowing is one of the exploits that can happen to you when someone else gets access to your domain registration information. The information can be stolen, but it could also be obtained at the point of sale, like you're not the first owner, but the third party or reseller who sets the domain up for you - makes you into the second owner. Since they then have access to the DNS of your domain they can create sub-domains with it.  They do it with a huge number of victims and through that they have the ability to set up massive lists of subdomains, which they can use in quickly rotating fashion to either redirect victims to attack sites, or to serve as hosts for malicious sites.  Before you know it, your domain and IP get blacklisted and you won't be able to see any signs of hacking or exploits on your VPS as they don't need access to your VPS or server to do their evil deeds.  They do it at the front end of the domain at the Domain Registrar.<br />
<br />
So better be safe than sorry.  Don't go for super cheap deals from domain affilliate resellers, or if and when you do, make dead certain you know whom you are dealing with.  Rather insist in creating the domain directly with the Registrar and make sure to keep all of the information safe and secure so no one can get access to the information.  Also check at your Domain Registrar as the really good Registrars will provide you with tools in your Registrar Dashboard with which you can keep your domain safe.  Such as locking it.]]></description>
			<content:encoded><![CDATA[One thing that is important when one buys a domain is to make doubly sure you are the only owner of that domain with exclusive access to the domain credentials - direct ownership.  The best way to ensure this exclusive ownership is to do the sale directly with a well known Registrar such as Namecheap or Namesilo instead of using third parties or affiliates.  Don't use a domain reseller whom you don't know and beware when friends of friends of resellers try and sell you cheap deals.  Like if the price looks too good to be true, there is a very good chance it is too good to be true and you may become an unwitting victim of some or other scam.  I'm not saying that is certain it will happen, but in this day and age of specialist hackers, particularly with domains you need to be vigilant and use lots of common sense.<br />
<br />
Domain shadowing is one of the exploits that can happen to you when someone else gets access to your domain registration information. The information can be stolen, but it could also be obtained at the point of sale, like you're not the first owner, but the third party or reseller who sets the domain up for you - makes you into the second owner. Since they then have access to the DNS of your domain they can create sub-domains with it.  They do it with a huge number of victims and through that they have the ability to set up massive lists of subdomains, which they can use in quickly rotating fashion to either redirect victims to attack sites, or to serve as hosts for malicious sites.  Before you know it, your domain and IP get blacklisted and you won't be able to see any signs of hacking or exploits on your VPS as they don't need access to your VPS or server to do their evil deeds.  They do it at the front end of the domain at the Domain Registrar.<br />
<br />
So better be safe than sorry.  Don't go for super cheap deals from domain affilliate resellers, or if and when you do, make dead certain you know whom you are dealing with.  Rather insist in creating the domain directly with the Registrar and make sure to keep all of the information safe and secure so no one can get access to the information.  Also check at your Domain Registrar as the really good Registrars will provide you with tools in your Registrar Dashboard with which you can keep your domain safe.  Such as locking it.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Wordfence Plugin Vulnerabilities - avoid Woocommerce plugin]]></title>
			<link>https://post4vps.com/Thread-Wordfence-Plugin-Vulnerabilities-avoid-Woocommerce-plugin</link>
			<pubDate>Thu, 05 Mar 2020 13:23:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=917">deanhills</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Wordfence-Plugin-Vulnerabilities-avoid-Woocommerce-plugin</guid>
			<description><![CDATA[Wordfence is an excellent security plugin that is also available free for those who use Wordpress.  They must be making a lot of money as they have a team of specialists on WordPress doing real time research all of the time.  They also have a treasure trove of up to date blog articles on security events (refer link at bottom of this post).  Whenever a WordPress security event happens, such as the Woocommerce plugin that had to get an emergency patch recently following hackers gaining access to Websites through the Woocommerce plugin, they also check wider than the Woocommerce plugin.  Wordfence then found similar issues as with Woocommerce with the following plugins as well - so if site administrators recognize them, they should take immediate preventive action:<br />
<br />
Async JavaScript<br />
Modern Events Calendar Lite<br />
10Web Map Builder for Google Maps. <br />
<br />
The above plugins exploit XSS vulnerabilities in the plugins that allow hackers to inject malicious Javascript that can create rogue WordPress administrators and install malicious plugins that include backdoors.<br />
<br />
These hackers are just getting better and better at it all of the time.  So it's important for site administrators to check whether they're using these plugins, or similar plugins, in order to avoid their Websites being hacked.<br />
<br />
With regard to Woocommerce plugin.  It has a reputation amongst seasoned WordPress users of being vulnerable and not reliable.  So for new users or WordPress users who are not power WordPress users, although this plugin is very attractive, and can do a long list of attractive looking tasks, it is best to avoid this plugin.<br />
<br />
Here is a link to the WordFence Security Blog Article:<br />
<a href="https://www.wordfence.com/blog/2020/02/site-takeover-campaign-exploits-multiple-zero-day-vulnerabilities/" target="_blank" rel="noopener" class="mycode_url">https://www.wordfence.com/blog/2020/02/s...abilities/</a><br />
<br />
And a more general Wordfence Blog link for other security blog articles that have recently been published by Wordfence.  <br />
<a href="https://www.wordfence.com/blog/category/wordpress-security/" target="_blank" rel="noopener" class="mycode_url">https://www.wordfence.com/blog/category/...-security/</a><br />
The blog articles are eye openers.  Even the famous Duplicator Plugin was compromised recently. For me it sends a clear message to keep WordPress plugins to the bare minimum.  To only use plugins that have a very large following with a demonstrated and recent support and update record by the owner, and vetted by <a href="https://wordpress.org/plugins/" target="_blank" rel="noopener" class="mycode_url">WordPress</a>.]]></description>
			<content:encoded><![CDATA[Wordfence is an excellent security plugin that is also available free for those who use Wordpress.  They must be making a lot of money as they have a team of specialists on WordPress doing real time research all of the time.  They also have a treasure trove of up to date blog articles on security events (refer link at bottom of this post).  Whenever a WordPress security event happens, such as the Woocommerce plugin that had to get an emergency patch recently following hackers gaining access to Websites through the Woocommerce plugin, they also check wider than the Woocommerce plugin.  Wordfence then found similar issues as with Woocommerce with the following plugins as well - so if site administrators recognize them, they should take immediate preventive action:<br />
<br />
Async JavaScript<br />
Modern Events Calendar Lite<br />
10Web Map Builder for Google Maps. <br />
<br />
The above plugins exploit XSS vulnerabilities in the plugins that allow hackers to inject malicious Javascript that can create rogue WordPress administrators and install malicious plugins that include backdoors.<br />
<br />
These hackers are just getting better and better at it all of the time.  So it's important for site administrators to check whether they're using these plugins, or similar plugins, in order to avoid their Websites being hacked.<br />
<br />
With regard to Woocommerce plugin.  It has a reputation amongst seasoned WordPress users of being vulnerable and not reliable.  So for new users or WordPress users who are not power WordPress users, although this plugin is very attractive, and can do a long list of attractive looking tasks, it is best to avoid this plugin.<br />
<br />
Here is a link to the WordFence Security Blog Article:<br />
<a href="https://www.wordfence.com/blog/2020/02/site-takeover-campaign-exploits-multiple-zero-day-vulnerabilities/" target="_blank" rel="noopener" class="mycode_url">https://www.wordfence.com/blog/2020/02/s...abilities/</a><br />
<br />
And a more general Wordfence Blog link for other security blog articles that have recently been published by Wordfence.  <br />
<a href="https://www.wordfence.com/blog/category/wordpress-security/" target="_blank" rel="noopener" class="mycode_url">https://www.wordfence.com/blog/category/...-security/</a><br />
The blog articles are eye openers.  Even the famous Duplicator Plugin was compromised recently. For me it sends a clear message to keep WordPress plugins to the bare minimum.  To only use plugins that have a very large following with a demonstrated and recent support and update record by the owner, and vetted by <a href="https://wordpress.org/plugins/" target="_blank" rel="noopener" class="mycode_url">WordPress</a>.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Do users need protection from Firewall "security" scripts?]]></title>
			<link>https://post4vps.com/Thread-Do-users-need-protection-from-Firewall-security-scripts</link>
			<pubDate>Wed, 19 Feb 2020 08:08:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=917">deanhills</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Do-users-need-protection-from-Firewall-security-scripts</guid>
			<description><![CDATA[I've just noted an announcement by Cubedata of more Firewall security.  And that made me think.  How fail safe will the new firewall be?  Like is there a chance it could trigger false positives?  I'm asking as in my experience of having lived in Canada, South Africa and the UAE, I sometimes trigger a firewall, just by the mere fact of being in South Africa or the UAE, vs it unlikely to happen when I'm in Canada. I then need to use a VPN, which is frowned upon of course, but the only way when the IPs from the ISP are dynamic IPs that could be blacklisted IPs or IPs of a different length or character than expected by the Firewall. <br />
<br />
I believe that for security scripts with Firewall there should be a long list of the Pros and Cons - particularly the Cons - and exactly what to expect from a user point of view when the Firewall comes up with a flag.  When this happens - there should be damage legislation in place to exactly describe the abuse in plain English and if found to be a false positive how the problem should be dealt with as a protective measure for BOTH the Data Centre and User. I find the consequences are only one-sided with total lack of regard for the user. Once a flag has gone up and if the host is not particularly savvy, the user is already found guilty without a proper investigation.  Like it's automatically assumed the Data Centre and Security Websites are experts - which is not always the case.<br />
<br />
At post4vps the majority of users live outside North America and Europe.  So are very vulnerable to strict hardware that may trigger false positives easily.  I'm also an Administrator at a shared hosting Forum and we come across this all of the time.  Our host is German with very strict European standard firewalls at their Datacentres.  The majority of our members are from outside Germany.  You can't imagine the hard work to unblock IPs all of the time, and having to do this also for experienced users who obviously know what they are doing.  And I guess in the case of a VPS it may lead to immediate suspension under a non-specific heading like "abuse". And trying to figure out exactly what happened an almost impossibility. Like "abuse of bandwidth"!  Now what does that mean specifically? <br />
<br />
When on top of it all the IP has been flagged by the Data Centre through the security networks, causing the IP to be listed on blacklists everywhere. Like panic immediately starts with the host of the server who has been informed by the Data Centre (equivalent of God who can't do anything wrong as they're specialists).  The host of the server who is most concerned to lose his business would naturally side with the Data Centre, then immediately suspends the user with delays before proving anything.  In the meanwhile with time delays IP gets circulated in the Blacklists.  Sometimes the verdict is very clear, but sometimes not so clear.  And the damage can not be fixed.  The IP and even more importantly the domain associated with the IP gets great damage, and sometimes has to be abandoned.<br />
<br />
Ironically I think it's come to the point where the user needs to be protected from all of these security Firewall scripts.  The best way to be protected is for the user to insist on complete, transparent, and full information of what the firewall security does and what actions to expect from the Datacentre.  If the user is innocent the offending "security" network who caused the IP to be blacklisted should be held fully accountable - not just shrug it off as collateral damage and leave everything for the innocent user to "fix".  The user probably also needs full disclosure of the IP and previous "clean" ownership of the IP BEFORE the user accepts the IP.  Like instead of accepting these security measures like sheep, users, particularly users who have been caught in false positives should speak up and insist on some kind of damage control that should be more widely shared and not only for the user to deal with.  Like the same security network used by Data Centers to blacklist an IP should be made accountable for undoing the blacklisting when a false positive has been found.  With due apology to the user.]]></description>
			<content:encoded><![CDATA[I've just noted an announcement by Cubedata of more Firewall security.  And that made me think.  How fail safe will the new firewall be?  Like is there a chance it could trigger false positives?  I'm asking as in my experience of having lived in Canada, South Africa and the UAE, I sometimes trigger a firewall, just by the mere fact of being in South Africa or the UAE, vs it unlikely to happen when I'm in Canada. I then need to use a VPN, which is frowned upon of course, but the only way when the IPs from the ISP are dynamic IPs that could be blacklisted IPs or IPs of a different length or character than expected by the Firewall. <br />
<br />
I believe that for security scripts with Firewall there should be a long list of the Pros and Cons - particularly the Cons - and exactly what to expect from a user point of view when the Firewall comes up with a flag.  When this happens - there should be damage legislation in place to exactly describe the abuse in plain English and if found to be a false positive how the problem should be dealt with as a protective measure for BOTH the Data Centre and User. I find the consequences are only one-sided with total lack of regard for the user. Once a flag has gone up and if the host is not particularly savvy, the user is already found guilty without a proper investigation.  Like it's automatically assumed the Data Centre and Security Websites are experts - which is not always the case.<br />
<br />
At post4vps the majority of users live outside North America and Europe.  So are very vulnerable to strict hardware that may trigger false positives easily.  I'm also an Administrator at a shared hosting Forum and we come across this all of the time.  Our host is German with very strict European standard firewalls at their Datacentres.  The majority of our members are from outside Germany.  You can't imagine the hard work to unblock IPs all of the time, and having to do this also for experienced users who obviously know what they are doing.  And I guess in the case of a VPS it may lead to immediate suspension under a non-specific heading like "abuse". And trying to figure out exactly what happened an almost impossibility. Like "abuse of bandwidth"!  Now what does that mean specifically? <br />
<br />
When on top of it all the IP has been flagged by the Data Centre through the security networks, causing the IP to be listed on blacklists everywhere. Like panic immediately starts with the host of the server who has been informed by the Data Centre (equivalent of God who can't do anything wrong as they're specialists).  The host of the server who is most concerned to lose his business would naturally side with the Data Centre, then immediately suspends the user with delays before proving anything.  In the meanwhile with time delays IP gets circulated in the Blacklists.  Sometimes the verdict is very clear, but sometimes not so clear.  And the damage can not be fixed.  The IP and even more importantly the domain associated with the IP gets great damage, and sometimes has to be abandoned.<br />
<br />
Ironically I think it's come to the point where the user needs to be protected from all of these security Firewall scripts.  The best way to be protected is for the user to insist on complete, transparent, and full information of what the firewall security does and what actions to expect from the Datacentre.  If the user is innocent the offending "security" network who caused the IP to be blacklisted should be held fully accountable - not just shrug it off as collateral damage and leave everything for the innocent user to "fix".  The user probably also needs full disclosure of the IP and previous "clean" ownership of the IP BEFORE the user accepts the IP.  Like instead of accepting these security measures like sheep, users, particularly users who have been caught in false positives should speak up and insist on some kind of damage control that should be more widely shared and not only for the user to deal with.  Like the same security network used by Data Centers to blacklist an IP should be made accountable for undoing the blacklisting when a false positive has been found.  With due apology to the user.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Windows users advised to uninstall Dropbox]]></title>
			<link>https://post4vps.com/Thread-Windows-users-advised-to-uninstall-Dropbox</link>
			<pubDate>Wed, 25 Dec 2019 15:55:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=266">Honey</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Windows-users-advised-to-uninstall-Dropbox</guid>
			<description><![CDATA[So recently a zero day vulnerability has been found in the dropbox app, though I know this sub is for VPS protection but I figured there might be people who are using their VPS with windows installed as a data uploader, and might have the app installed, this is a fair warning to you guys.<br />
<br />
Here's an excerpt from Forbes article,<br />
<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Security researchers have disclosed a zero-day vulnerability in Dropbox for Windows that can enable an attacker to attain Windows SYSTEM privileges from a starting point of a simple Windows user. <br />
<br />
Two security researchers, Chris and another known as Decoder, first unearthed the vulnerability in September, informing Dropbox on September 18. At that time, they apparently told Dropbox that it would have 90 days to fix the issue before they disclosed it publicly. The 90 days passed without that fix, so here we are.</code></div></div><br />
For further details, please visit here<br />
<br />
<a href="https://www.forbes.com/sites/daveywinder/2019/12/23/windows-10-security-warning-as-dropbox-zero-day-vulnerability-is-confirmed/#526364462089" target="_blank" rel="noopener" class="mycode_url">https://www.forbes.com/sites/daveywinder...6364462089</a>]]></description>
			<content:encoded><![CDATA[So recently a zero day vulnerability has been found in the dropbox app, though I know this sub is for VPS protection but I figured there might be people who are using their VPS with windows installed as a data uploader, and might have the app installed, this is a fair warning to you guys.<br />
<br />
Here's an excerpt from Forbes article,<br />
<br />
<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>Security researchers have disclosed a zero-day vulnerability in Dropbox for Windows that can enable an attacker to attain Windows SYSTEM privileges from a starting point of a simple Windows user. <br />
<br />
Two security researchers, Chris and another known as Decoder, first unearthed the vulnerability in September, informing Dropbox on September 18. At that time, they apparently told Dropbox that it would have 90 days to fix the issue before they disclosed it publicly. The 90 days passed without that fix, so here we are.</code></div></div><br />
For further details, please visit here<br />
<br />
<a href="https://www.forbes.com/sites/daveywinder/2019/12/23/windows-10-security-warning-as-dropbox-zero-day-vulnerability-is-confirmed/#526364462089" target="_blank" rel="noopener" class="mycode_url">https://www.forbes.com/sites/daveywinder...6364462089</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Watchout and Warning:  Malicious WordPress Redirect Campaign Attacking Plugins]]></title>
			<link>https://post4vps.com/Thread-Watchout-and-Warning-Malicious-WordPress-Redirect-Campaign-Attacking-Plugins</link>
			<pubDate>Fri, 23 Aug 2019 22:02:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=917">deanhills</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Watchout-and-Warning-Malicious-WordPress-Redirect-Campaign-Attacking-Plugins</guid>
			<description><![CDATA[I've come across at least two instances of WordPress plugin attacks at another hosting Forum that fortunately were picked up by our server security filters and led to instant suspension of the sites.  Otherwise it may have led to warnings to our Datacentre and possible blacklisting of our IP.  Then today I found a really great blog article from WordFence that explains what must have happened.  WordFence, a WordPress Security Specialist identified and is tracking an active attack campaign targeting a selection of new and old WordPress plugin vulnerabilities.  The one I came across at the other hosting Forum was Contact Form 7 for example.  Those attacks maliciously redirect traffic from the victims' sites to a number of potentially harmful locations.  It's a real sad situation for users who used to be able to run WordPress sites in reasonable safety.  It's no longer safe to have a WordPress site UNLESS you know what you are doing, are completely up to date with every plugin and theme in your site, and have proper security tools such as WordFence as part of your site.<br />
<br />
You can read more about the WordFence blog article at the URL below:<br />
<a href="https://www.wordfence.com/blog/2019/08/malicious-wordpress-redirect-campaign-attacking-several-plugins/" target="_blank" rel="noopener" class="mycode_url">https://www.wordfence.com/blog/2019/08/m...l-plugins/</a><br />
<br />
Interesting part of the article is the behaviour analysis of the exploits.  The attackers rotate their domains with frequency with new domains appearing every few days, and attacks involving older domains taper off.  The examples given in the article are just the examples WordFence has been tracking.  I could probably provide WordFence with more examples.  Although I'm a bit too exhausted to do that.  For me however the sophistication with which WordPress is being manipulated is so complex and threatening, I'm definitely going to think of new ways to publish blogs.  I still have to start with this.  OR one should only use VERY reliable plugins that are regularly updated and tested, and as few as possible.  And of course have WordFence as a plugin as well.<br />
<br />
Another interesting fact that came out for me during an experience with Contabo was that these guys are masters at manipulating IPs from different servers.  Like with the old IP I had at Contabo, even with me being the owner, there were four other active domains registered with my IP number as active Websites - Namecheap was the Registrar.  So basically if they had been used as part of the attack, then blacklisting systems would have immediately connected them up with the Contabo IP and those domains being situated on the VPS, which they had not been, and I don't have a real idea how that came about.  <br />
<br />
Maybe it's as simple as that when a Registrar allows a person to add name servers to a domain, there is no real authentication to make sure that the name servers point to a legitimate site.  It can really point anywhere, including the victim's site that they have managed to infiltrate.  So maybe some of this is the fault of Domain Registrars?  They have domains listed with IPs that aren't really associated with the domains.  Possibly there should be a new system created where if one adds one's name servers, there needs to be a verification of exactly what IP is associated with the name server to make sure it's not being used by rogue malicious attackers.]]></description>
			<content:encoded><![CDATA[I've come across at least two instances of WordPress plugin attacks at another hosting Forum that fortunately were picked up by our server security filters and led to instant suspension of the sites.  Otherwise it may have led to warnings to our Datacentre and possible blacklisting of our IP.  Then today I found a really great blog article from WordFence that explains what must have happened.  WordFence, a WordPress Security Specialist identified and is tracking an active attack campaign targeting a selection of new and old WordPress plugin vulnerabilities.  The one I came across at the other hosting Forum was Contact Form 7 for example.  Those attacks maliciously redirect traffic from the victims' sites to a number of potentially harmful locations.  It's a real sad situation for users who used to be able to run WordPress sites in reasonable safety.  It's no longer safe to have a WordPress site UNLESS you know what you are doing, are completely up to date with every plugin and theme in your site, and have proper security tools such as WordFence as part of your site.<br />
<br />
You can read more about the WordFence blog article at the URL below:<br />
<a href="https://www.wordfence.com/blog/2019/08/malicious-wordpress-redirect-campaign-attacking-several-plugins/" target="_blank" rel="noopener" class="mycode_url">https://www.wordfence.com/blog/2019/08/m...l-plugins/</a><br />
<br />
Interesting part of the article is the behaviour analysis of the exploits.  The attackers rotate their domains with frequency with new domains appearing every few days, and attacks involving older domains taper off.  The examples given in the article are just the examples WordFence has been tracking.  I could probably provide WordFence with more examples.  Although I'm a bit too exhausted to do that.  For me however the sophistication with which WordPress is being manipulated is so complex and threatening, I'm definitely going to think of new ways to publish blogs.  I still have to start with this.  OR one should only use VERY reliable plugins that are regularly updated and tested, and as few as possible.  And of course have WordFence as a plugin as well.<br />
<br />
Another interesting fact that came out for me during an experience with Contabo was that these guys are masters at manipulating IPs from different servers.  Like with the old IP I had at Contabo, even with me being the owner, there were four other active domains registered with my IP number as active Websites - Namecheap was the Registrar.  So basically if they had been used as part of the attack, then blacklisting systems would have immediately connected them up with the Contabo IP and those domains being situated on the VPS, which they had not been, and I don't have a real idea how that came about.  <br />
<br />
Maybe it's as simple as that when a Registrar allows a person to add name servers to a domain, there is no real authentication to make sure that the name servers point to a legitimate site.  It can really point anywhere, including the victim's site that they have managed to infiltrate.  So maybe some of this is the fault of Domain Registrars?  They have domains listed with IPs that aren't really associated with the domains.  Possibly there should be a new system created where if one adds one's name servers, there needs to be a verification of exactly what IP is associated with the name server to make sure it's not being used by rogue malicious attackers.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[What does "spamvertised website" mean and has this happened to any one else before?]]></title>
			<link>https://post4vps.com/Thread-What-does-spamvertised-website-mean-and-has-this-happened-to-any-one-else-before</link>
			<pubDate>Tue, 30 Jul 2019 04:56:26 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=917">deanhills</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-What-does-spamvertised-website-mean-and-has-this-happened-to-any-one-else-before</guid>
			<description><![CDATA[I've just checked up with Google and this is what a "spamvertized website" means:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>A site being “spamvertized” means that the site is being included as a link in spam emails. The most common reason your site appears in spam emails when you’re not the spammer is because your site has been hacked by someone.<br />
<br />
The hacker places a small piece of code somewhere on your site that redirects a user to a different site. They do this because including their own website in emails they send will immediately flag spam detectors. Their site is already a known-bad-site. So they’d rather spamvertize your site to try and get more emails through spam filters.<br />
<br />
This works for a while until your website is also associated with spam and they have to move on to another “clean” website that they can spamvertize and that will redirect to their own site.</blockquote>
<a href="https://www.wordfence.com/blog/2014/05/why-is-your-site-being-spamvertized-and-what-to-do-about-it/" target="_blank" rel="noopener" class="mycode_url">https://www.wordfence.com/blog/2014/05/w...-about-it/</a><br />
<br />
So an awesome irony occurred. On the very same day when I posted a <a href="https://post4vps.com/Thread-Contabo-Review" target="_blank" rel="noopener" class="mycode_url">review of Contabo</a> Contabo received a complaint about my VPS IP being complicit in a spamvertised website.  Since I hadn't looked at my e-mails in my VPS Account for a while, I only learned about the problem yesterday morning.  Contabo received a complaint about a "spamvertized website" linked to my VPS IP on 10 July.  When I didn't respond within 36 hours they suspended my VPS with a notification that re-connection would cost me US&#36;30.  So of course I complained heavily to Contabo yesterday.  I then wrote to them and asked whether they'd checked my VPS for any abnormalities before they suspended the VPS and they said "yes" they had, but now there was nothing on the VPS - I must have fixed it or had software on the VPS that took care of the problem.  So how could I have fixed it if the VPS was suspended?  Anyway, I was grateful I didn't have to pay the 30 US&#36;, they unsuspended the VPS, but since the blog doesn't really mean anything to me, I reinstalled the OS immediately, and powered down the VPS as I'd like to get a better understanding of what had happened first.  <br />
<br />
I personally think it was a false positive, but it would be great to hear if this has happened to any other member at post4vps before?  At the time of this happening I had only one very small static blog on the VPS.  With no users connected with it, no comments enabled, no e-mails, no traffic.  A very small blog with my own personal experiences about Contabo. I have WordFence Security Plugin on it - and I'm sure WordPress users know how fast WordFence is with picking up on irregularities.  There had been no notifications from WordFence. There is also no e-mail server on the VPS. No automatic scripts running.  <br />
<br />
Only thing that did happen on 9th of July (the day before the complaint) that could have caused something to happen was I updated the following themes and plugins of WordPress.  And on the 10th of July I did a Benchmark test of the VPS using <dvz_me_placeholder id="0" /> Benchmark Script.  Here is a record of the script, plugins and themes that were updated.  Note they are all very straight up and down strictly WordPress products - and they were not actively used - only Wordfence and WP Classic Editor - the other plugins were "inherited" when I copied the Website:<br />
<br />
1. The WordPress Script to 5.2.2<br />
2. Plugin:  WP Classic Editor<br />
3. Plugin: Contact Form 7<br />
4. Plugin: Duplicator<br />
5. Plugin: Limit Login Attempts Reloaded<br />
6. Plugin: Responsive WordPress Slider (note it's not being used with the WordPress blog)<br />
7. Plugin: WordFence Security<br />
8. Themes: Twenty Thirteen, Fifteen, Sixteen, Seventeen, Nineteen<br />
<br />
The following themes and plugins were actively used in the blog:<br />
<br />
1. WordPress Script 5.2.2<br />
2. WEN-Associate Theme<br />
3. All-in-one WP Migration Plugin<br />
4. All-in-one WP Migration Extension Plugin<br />
5. WordFence<br />
6. Limit Login Attempts Reloaded<br />
7. WordPress Classic Editor<br />
<br />
I had VestaCP loaded on the VPS without FTP or E-mail Server.<br />
<br />
I had changed the Port Number in April.  When I first took occupation of the VPS in April I noticed a very abnormal number of failed login attempts, like larger than I'd ever experienced before.  It completely stopped when I changed the port number.]]></description>
			<content:encoded><![CDATA[I've just checked up with Google and this is what a "spamvertized website" means:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>A site being “spamvertized” means that the site is being included as a link in spam emails. The most common reason your site appears in spam emails when you’re not the spammer is because your site has been hacked by someone.<br />
<br />
The hacker places a small piece of code somewhere on your site that redirects a user to a different site. They do this because including their own website in emails they send will immediately flag spam detectors. Their site is already a known-bad-site. So they’d rather spamvertize your site to try and get more emails through spam filters.<br />
<br />
This works for a while until your website is also associated with spam and they have to move on to another “clean” website that they can spamvertize and that will redirect to their own site.</blockquote>
<a href="https://www.wordfence.com/blog/2014/05/why-is-your-site-being-spamvertized-and-what-to-do-about-it/" target="_blank" rel="noopener" class="mycode_url">https://www.wordfence.com/blog/2014/05/w...-about-it/</a><br />
<br />
So an awesome irony occurred. On the very same day when I posted a <a href="https://post4vps.com/Thread-Contabo-Review" target="_blank" rel="noopener" class="mycode_url">review of Contabo</a> Contabo received a complaint about my VPS IP being complicit in a spamvertised website.  Since I hadn't looked at my e-mails in my VPS Account for a while, I only learned about the problem yesterday morning.  Contabo received a complaint about a "spamvertized website" linked to my VPS IP on 10 July.  When I didn't respond within 36 hours they suspended my VPS with a notification that re-connection would cost me US&#36;30.  So of course I complained heavily to Contabo yesterday.  I then wrote to them and asked whether they'd checked my VPS for any abnormalities before they suspended the VPS and they said "yes" they had, but now there was nothing on the VPS - I must have fixed it or had software on the VPS that took care of the problem.  So how could I have fixed it if the VPS was suspended?  Anyway, I was grateful I didn't have to pay the 30 US&#36;, they unsuspended the VPS, but since the blog doesn't really mean anything to me, I reinstalled the OS immediately, and powered down the VPS as I'd like to get a better understanding of what had happened first.  <br />
<br />
I personally think it was a false positive, but it would be great to hear if this has happened to any other member at post4vps before?  At the time of this happening I had only one very small static blog on the VPS.  With no users connected with it, no comments enabled, no e-mails, no traffic.  A very small blog with my own personal experiences about Contabo. I have WordFence Security Plugin on it - and I'm sure WordPress users know how fast WordFence is with picking up on irregularities.  There had been no notifications from WordFence. There is also no e-mail server on the VPS. No automatic scripts running.  <br />
<br />
Only thing that did happen on 9th of July (the day before the complaint) that could have caused something to happen was I updated the following themes and plugins of WordPress.  And on the 10th of July I did a Benchmark test of the VPS using <dvz_me_placeholder id="0" /> Benchmark Script.  Here is a record of the script, plugins and themes that were updated.  Note they are all very straight up and down strictly WordPress products - and they were not actively used - only Wordfence and WP Classic Editor - the other plugins were "inherited" when I copied the Website:<br />
<br />
1. The WordPress Script to 5.2.2<br />
2. Plugin:  WP Classic Editor<br />
3. Plugin: Contact Form 7<br />
4. Plugin: Duplicator<br />
5. Plugin: Limit Login Attempts Reloaded<br />
6. Plugin: Responsive WordPress Slider (note it's not being used with the WordPress blog)<br />
7. Plugin: WordFence Security<br />
8. Themes: Twenty Thirteen, Fifteen, Sixteen, Seventeen, Nineteen<br />
<br />
The following themes and plugins were actively used in the blog:<br />
<br />
1. WordPress Script 5.2.2<br />
2. WEN-Associate Theme<br />
3. All-in-one WP Migration Plugin<br />
4. All-in-one WP Migration Extension Plugin<br />
5. WordFence<br />
6. Limit Login Attempts Reloaded<br />
7. WordPress Classic Editor<br />
<br />
I had VestaCP loaded on the VPS without FTP or E-mail Server.<br />
<br />
I had changed the Port Number in April.  When I first took occupation of the VPS in April I noticed a very abnormal number of failed login attempts, like larger than I'd ever experienced before.  It completely stopped when I changed the port number.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Security Issue / Problem]]></title>
			<link>https://post4vps.com/Thread-Security-Issue-Problem</link>
			<pubDate>Fri, 05 Apr 2019 11:37:15 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=708">chanalku91</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Security-Issue-Problem</guid>
			<description><![CDATA[A few days ago I received a message from SkyLake-X7 that filled the message<br />
RSA security will not be enough to make your server safe!<br />
So Use Port Knocking!<br />
<br />
I Ask What Is Port Knocking?<br />
And how does it work? What are the benefits after I install it?<br />
<br />
For You =&gt; I'm not satisfied if I haven't got a definite answer!]]></description>
			<content:encoded><![CDATA[A few days ago I received a message from SkyLake-X7 that filled the message<br />
RSA security will not be enough to make your server safe!<br />
So Use Port Knocking!<br />
<br />
I Ask What Is Port Knocking?<br />
And how does it work? What are the benefits after I install it?<br />
<br />
For You =&gt; I'm not satisfied if I haven't got a definite answer!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Basic secure Firewall setup with iptables]]></title>
			<link>https://post4vps.com/Thread-Basic-secure-Firewall-setup-with-iptables</link>
			<pubDate>Sat, 12 Jan 2019 12:47:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=26">Mashiro</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Basic-secure-Firewall-setup-with-iptables</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><span style="color: royalblue;" class="mycode_color">Basic secure Firewall setup with iptables</span></span></span></div>
<br />
<br />
<div style="text-align: justify;" class="mycode_align">Hi!<br />
<br />
This brief tutorial will teach you how to peform a basic secure Firewall setup on any Linux based server (any type of server: dedicated server, VPS, etc...) with the iptables Firewall software.<br />
<br />
At the end of this guide you will be able to establish basic guidelines in terms of Firewall security and you will be able to control access in and out of your server. This will help to minimize attack vectors and reduce the risk level of getting your server hacked.<br />
<br />
I will be covering the IPv4 setup only! IPv6 is a little different and the same rules for IPv4 will absolutely not work with IPv6. In fact the IPv4 iptables rule set for IPv6 will break IPv6 inside your server entirely. This is kind of a personal experience from the past  <img src="https://post4vps.com/images/emoji/eh.png" alt="Eh" title="Eh" class="smilie smilie_15" /> .</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Step One</span><br />
<br />
Flush (delete) all current iptables rules with the two commands below:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -F<br />
iptables -X</code></div></div><hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step Two</span><br />
<br />
Setup the main iptables policies to block everything incoming/forwarded by default and allow outgoing traffic to the Internet by default with the commands below:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -P FORWARD DROP<br />
iptables -P INPUT DROP<br />
iptables -P OUTPUT ACCEPT</code></div></div><br />
Incoming traffic is blocked by default unless allowed through additional rules.<br />
Forward traffic is blocked by default unless allowed through additional rules.<br />
Outgoing traffic is allowed by default unless blocked through additional rules.<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step Three</span><br />
<br />
Allow incoming responses to outgoing Internet traffic on already established connections with the command below:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT</code></div></div><br />
This is very important. It will allow to receive replies for connections that you initiated. For example you initiate a download via wget. If you don't set this rule up you won't be able to download anything because your server blocks the download of the file. Or initiating a PING will lead to not receiving replies from the host you pinged.<br />
<br />
Don't miss this rule or any kind of communication with the Internet will totally break.<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step Four</span><br />
<br />
Allow local traffic on the loopback network with the command below:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -s 127.0.0.0/8 -d 127.0.0.0/8 -i lo -j ACCEPT</code></div></div><br />
With this rule you enable local traffic within the server (remember the default incoming policy is set to block unless allowed through additional rules). This rule is also important to have a working internal network on the VPS. It allows access to locally hosted services like MySQL on 127.0.0.1/localhost and etc.<br />
<br />
Don't miss this rule either as it also is very important.<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step Five</span><br />
<br />
Allow incoming traffic to services hosted on your server like SSH, webserver and etc (following command is an example for a server with SSH and a webserver only):<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -p tcp --dport 22 -m state --state NEW -j ACCEPT<br />
iptables -A INPUT -p tcp --dport 80 -m state --state NEW -j ACCEPT<br />
iptables -A INPUT -p tcp --dport 443 -m state --state NEW -j ACCEPT</code></div></div><br />
<br />
Other services can be allowed through this same rules. Just adjust the port and protocol if needed.<br />
<br />
Another example for FTP (TCP Port 21):<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -p tcp --dport 21 -m state --state NEW -j ACCEPT</code></div></div><br />
A example for DNS (UDP Port 53):<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -p udp --dport 53 -m state --state NEW -j ACCEPT</code></div></div><br />
<br />
You can also allow incoming traffic for certain IP addresses only with the command below (remember to adjust the IP, protocol and port for the corresponding service):<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -s 187.123.100.231 -p tcp --dport 3128 -m state --state NEW -j ACCEPT</code></div></div><br />
This will allow connections to port 3128 TCP (SQUID PROXY) only for the IP address 187.123.100.231. Such restrictive rules are great to secure SSH for your own IP address (if you have a static IP address). So no on else other than you can connect to the service/server on that port.<br />
<br />
<br />
You can also allow IP address ranges:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -s 123.231.67.0/24 -p tcp --dport 22 -m state --state NEW -j ACCEPT</code></div></div><br />
This rule would allow connections to SSH from the IP address range 123.231.67.1 to 123.231.67.254. This can be useful if you want to allow a specific IP ranges to access your server (if you have a dynamic IP address that is always in the same range). It is important to use the right netmask when working with subnets and ranges!<br />
<hr class="mycode_hr" />
<br />
<br />
As iptables rules are not persistent across reboots you can simply paste all the rules into a shell script and let this script run at boot to apply the rules when you start or reboot the server.<br />
<br />
Simply open a new empty file called "firewall.sh" with nano or another text editor. Paste all the commands into that file and save it. Apply the right permissions so it can be executed with chmod +x firewall.sh. Use crontab or /etc/rc.local to add the script to startup. If you don't know how to do it exactly feel free to ask and I will explain it in an additional post.<br />
<br />
Alternatively you can install the package iptables-persistent. This will allow you to change iptables rules and they will survive across reboots. Always remember to save rules when changing them! Same applies for the method with the shell script. When you change rules or add new rules make sure you add them to the firewall.sh file and save it.<br />
<br />
<br />
That's about it. You have setup the basic policies to block everything other than outgoing traffic. Then you have created rules to allow specific services to be accessed. You created rules to allow local traffic inside the server and also created a rule to allow automatic unblocking of replies to connections you have initiated. <br />
<br />
You can use the same rules to extend your setup for future services and projects. Feel free to ask any questions.]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size"><span style="color: royalblue;" class="mycode_color">Basic secure Firewall setup with iptables</span></span></span></div>
<br />
<br />
<div style="text-align: justify;" class="mycode_align">Hi!<br />
<br />
This brief tutorial will teach you how to peform a basic secure Firewall setup on any Linux based server (any type of server: dedicated server, VPS, etc...) with the iptables Firewall software.<br />
<br />
At the end of this guide you will be able to establish basic guidelines in terms of Firewall security and you will be able to control access in and out of your server. This will help to minimize attack vectors and reduce the risk level of getting your server hacked.<br />
<br />
I will be covering the IPv4 setup only! IPv6 is a little different and the same rules for IPv4 will absolutely not work with IPv6. In fact the IPv4 iptables rule set for IPv6 will break IPv6 inside your server entirely. This is kind of a personal experience from the past  <img src="https://post4vps.com/images/emoji/eh.png" alt="Eh" title="Eh" class="smilie smilie_15" /> .</div>
<hr class="mycode_hr" />
<br />
<span style="font-weight: bold;" class="mycode_b">Step One</span><br />
<br />
Flush (delete) all current iptables rules with the two commands below:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -F<br />
iptables -X</code></div></div><hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step Two</span><br />
<br />
Setup the main iptables policies to block everything incoming/forwarded by default and allow outgoing traffic to the Internet by default with the commands below:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -P FORWARD DROP<br />
iptables -P INPUT DROP<br />
iptables -P OUTPUT ACCEPT</code></div></div><br />
Incoming traffic is blocked by default unless allowed through additional rules.<br />
Forward traffic is blocked by default unless allowed through additional rules.<br />
Outgoing traffic is allowed by default unless blocked through additional rules.<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step Three</span><br />
<br />
Allow incoming responses to outgoing Internet traffic on already established connections with the command below:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT</code></div></div><br />
This is very important. It will allow to receive replies for connections that you initiated. For example you initiate a download via wget. If you don't set this rule up you won't be able to download anything because your server blocks the download of the file. Or initiating a PING will lead to not receiving replies from the host you pinged.<br />
<br />
Don't miss this rule or any kind of communication with the Internet will totally break.<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step Four</span><br />
<br />
Allow local traffic on the loopback network with the command below:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -s 127.0.0.0/8 -d 127.0.0.0/8 -i lo -j ACCEPT</code></div></div><br />
With this rule you enable local traffic within the server (remember the default incoming policy is set to block unless allowed through additional rules). This rule is also important to have a working internal network on the VPS. It allows access to locally hosted services like MySQL on 127.0.0.1/localhost and etc.<br />
<br />
Don't miss this rule either as it also is very important.<br />
<hr class="mycode_hr" />
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Step Five</span><br />
<br />
Allow incoming traffic to services hosted on your server like SSH, webserver and etc (following command is an example for a server with SSH and a webserver only):<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -p tcp --dport 22 -m state --state NEW -j ACCEPT<br />
iptables -A INPUT -p tcp --dport 80 -m state --state NEW -j ACCEPT<br />
iptables -A INPUT -p tcp --dport 443 -m state --state NEW -j ACCEPT</code></div></div><br />
<br />
Other services can be allowed through this same rules. Just adjust the port and protocol if needed.<br />
<br />
Another example for FTP (TCP Port 21):<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -p tcp --dport 21 -m state --state NEW -j ACCEPT</code></div></div><br />
A example for DNS (UDP Port 53):<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -p udp --dport 53 -m state --state NEW -j ACCEPT</code></div></div><br />
<br />
You can also allow incoming traffic for certain IP addresses only with the command below (remember to adjust the IP, protocol and port for the corresponding service):<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -s 187.123.100.231 -p tcp --dport 3128 -m state --state NEW -j ACCEPT</code></div></div><br />
This will allow connections to port 3128 TCP (SQUID PROXY) only for the IP address 187.123.100.231. Such restrictive rules are great to secure SSH for your own IP address (if you have a static IP address). So no on else other than you can connect to the service/server on that port.<br />
<br />
<br />
You can also allow IP address ranges:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>iptables -A INPUT -s 123.231.67.0/24 -p tcp --dport 22 -m state --state NEW -j ACCEPT</code></div></div><br />
This rule would allow connections to SSH from the IP address range 123.231.67.1 to 123.231.67.254. This can be useful if you want to allow a specific IP ranges to access your server (if you have a dynamic IP address that is always in the same range). It is important to use the right netmask when working with subnets and ranges!<br />
<hr class="mycode_hr" />
<br />
<br />
As iptables rules are not persistent across reboots you can simply paste all the rules into a shell script and let this script run at boot to apply the rules when you start or reboot the server.<br />
<br />
Simply open a new empty file called "firewall.sh" with nano or another text editor. Paste all the commands into that file and save it. Apply the right permissions so it can be executed with chmod +x firewall.sh. Use crontab or /etc/rc.local to add the script to startup. If you don't know how to do it exactly feel free to ask and I will explain it in an additional post.<br />
<br />
Alternatively you can install the package iptables-persistent. This will allow you to change iptables rules and they will survive across reboots. Always remember to save rules when changing them! Same applies for the method with the shell script. When you change rules or add new rules make sure you add them to the firewall.sh file and save it.<br />
<br />
<br />
That's about it. You have setup the basic policies to block everything other than outgoing traffic. Then you have created rules to allow specific services to be accessed. You created rules to allow local traffic inside the server and also created a rule to allow automatic unblocking of replies to connections you have initiated. <br />
<br />
You can use the same rules to extend your setup for future services and projects. Feel free to ask any questions.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to keep our VPS save from Chinese Botnets?]]></title>
			<link>https://post4vps.com/Thread-How-to-keep-our-VPS-save-from-Chinese-Botnets</link>
			<pubDate>Sun, 09 Sep 2018 07:13:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=1079">mzmznasipadang</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-How-to-keep-our-VPS-save-from-Chinese-Botnets</guid>
			<description><![CDATA[Hey guys, I've one vps that I used for hosting my own vpn. The problem is its getting a lot of botnets. So how do I to keep my own VPS save from Botnets? Thank You!]]></description>
			<content:encoded><![CDATA[Hey guys, I've one vps that I used for hosting my own vpn. The problem is its getting a lot of botnets. So how do I to keep my own VPS save from Botnets? Thank You!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[DDoS protection]]></title>
			<link>https://post4vps.com/Thread-DDoS-protection</link>
			<pubDate>Sat, 30 Jun 2018 01:52:35 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=708">chanalku91</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-DDoS-protection</guid>
			<description><![CDATA[My problem is because I want to run game server but, with reliable protection.<br />
I am running the Pocketmine-MP Program. In VPS1 as test I have installed A program called NIDS. Which has more functionality in Server security. And Test vulnerabilities on the server. Result I Did DDoS attack with UDP protocol! But nil for PORT is not opened by Pocketmine-MP. But DDoS runs Current In Port Yang opened by Pocketmine-MP. Here I think I will ask the world experts to get a reliable security.]]></description>
			<content:encoded><![CDATA[My problem is because I want to run game server but, with reliable protection.<br />
I am running the Pocketmine-MP Program. In VPS1 as test I have installed A program called NIDS. Which has more functionality in Server security. And Test vulnerabilities on the server. Result I Did DDoS attack with UDP protocol! But nil for PORT is not opened by Pocketmine-MP. But DDoS runs Current In Port Yang opened by Pocketmine-MP. Here I think I will ask the world experts to get a reliable security.]]></content:encoded>
		</item>
	</channel>
</rss>