Subscribe to our RSS Feeds

Top 9 Web Security Tips To Prevent Your Website From Getting Hacked

No Comments »

Stealing data is not the only reason that hackers today would be interested in accessing your website. Hackers also use legitimate websites to relay spam mail and undetected illegal files. Even if you think your website has no reason to be hacked into, you need your website and data safe to avoid being a pawn in the hacking game by using these tested security practices.

1. Run regular system updates

An obvious but highly effective method is to run system updates on a regular basis. Update all systems used to keep your website running optimally such as software and operating systems. When using hosting companies or independent software programs for your website, check that security updates have been applied dutifully.

Click here to read more.. »

Internet Security features – Anti-Virus, Anti-Spyware and Firewall

No Comments »

The Internet becomes a more and more important part of our lives. This is a true fact for almost everybody and this is why Internet security should be a major concern for everybody too. Unfortunately, many people fail to realize the importance of Internet security and they leave things the way they are out of convenience. No matter what you use the Internet for, you should definitely try to increase the Internet security degree.

There are many malware types besides the well known viruses. There are adware, spyware and other threats you should be protected against. This is why many times only one Internet security program is not enough. Having at least an antivirus is important but it will not suffice many times in your fight against cyber criminals.

Click here to read more.. »

PHP Security fixes for your site

No Comments »

Has your php site been exploited or hacked? What can you do to make sure this does not happen again?

I recently went through these points that I judge extremely useful to keep your website safe.

  1. Set register_globals to OFF
  2. Turn off Display Error/Warning Messages. Set display_error to ZERO.
  3. Never run unescaped queries
  4. Validate all user inputs. Items on Forms, in URLs and so on
  5. Move config.php and files containing Passwords to MySQL to a secure directory outside of the public_html folder
  6. Change permissions on any configuration files containing private information such as database passwords or email accounts to 440 so they cannot be written to and so there is no world permissions. If you need to edit them at a later time you will need to change it back to 640.
  7. Access Control: You don’t want the user to have access to any Admin function or Clean up scripts
  8. The .htaccess file is your friend. Use it to deny access to your site or files. (We also have an easy IP Deny Manager tool in the cpanel)
  9. PHP can parse any valid script, whether it is called foo.php, very_long_name.php.php.php, or even deleteme.bat.
    • Using the default extension of “.php” means that before your hackers start you have already told them you are using PHP.
    • As mentioned, you can use any filename for your scripts – if you are using PHP for every script on your server, consider using the “.html” extension for your scripts and making PHP parse HTML files.
    • You can change your file extension by adding this line to the .htaccess or turn it on via the Apache Handlers in the cPanel (AddHandler application/x-httpd-php5 .html)
    • To protect against SQL injection attacks Sometimes hackers will try to screw up your database by inserting SQL code into your form input fields. They can for example, insert code that could delete all the data in your database!
    • To protect against this, you need to use this PHP function:
    • mysql_real_escape_string()
    • This function escapes (makes safe) any special characters in a string (programmers call text a ‘string’) for MySQL.
  10. Example: $name = $_REQUEST[‘name’]; $safe_name = mysql_real_escape_string($name); Now you know the variable $safe_name, is safe to use with your SQL code.
  11. Keep the PHP code to yourself. If anyone can see it they can exploit vulnerabilities.
    • You should take care to store your PHP files and the necessary passwords to access your MySQL databases in protected files or folders.
    • The easy way to do this is to put the database access passwords in a file with a .inc.php extension (such as config.inc.php), and then place this file in a directory which is above the server’s document root (and thus not accessible to surfers of your site).
    • Then, refer to the file in your PHP code with a require_once command.
    • By doing things this way, your PHP code can read the included file easily but hackers will find it almost impossible to hack your site.

You can find more information about hardening your PHP scripts at: PHPsec.org

Also, for security purposes, you can refer to these two websites:

PHPIDS – Web Application Security 2.0 – Index

BlogSecurity