Resource Center

Stop WordPress Admin Panel Abuse on Shared Hosting Environments

Introduction WordPress is one of the most popular content management systems (CMS), which also makes it one of the most targeted platforms for cyberattacks. In shared hosting environments, where multiple websites reside on the same server, safeguarding the /wp-admin/ panel …

Read More

How to Build a Custom Bot Blocklist Using Apache Rewrite Rules

Teach how to build, maintain, and deploy a .htaccess bot blocklist with regex-based rules. Teach how to build, maintain, and deploy a .htaccess bot blocklist with regex-based rules. Teach how to build, maintain, and deploy a .htaccess bot blocklist with regex-based rules. …

Read More

Setting Up Real-Time Log Monitoring for Suspicious Traffic on Plesk Servers

Covers tools like fail2ban, goaccess, and custom bash scripts to watch logs and act on anomalies Covers tools like fail2ban, goaccess, and custom bash scripts to watch logs and act on anomalies. Covers tools like fail2ban, goaccess, and custom bash scripts to watch logs and act on anomalies …

Read More

Apache mod_security vs. NGINX ngx_http_limit_req_module: Rate Limiting Explained

A comparison guide explaining how to implement rate-limiting in Apache (with mod_security) and in NGINX using limit_req. A comparison guide explaining how to implement rate-limiting in Apache (with mod_security) and in NGINX using limit_req.A comparison guide explaining how to implement rate-limiting in Apache (with mod_security) and in NGINX using limit_req …

Read More

How to Audit and Harden Plesk Against Automated Vulnerability Scanners

Explains how to detect scanners like Nikto, OpenVAS, and skipfish, and configure rate limits, WAF, and access control to mitigate them. This guide focuses on auditing and hardening a Plesk server against such automated scanners using logging analysis, rate limiting, Web Application Firewall (WAF) configuration, and access control mechanisms—all tailored for Linux-based environments. …

Read More

Detecting and Blocking Bad Bots in cPanel Without Third-Party Tools

A hands-on guide to detecting bad bots via logs and blocking them using Apache's .htaccess, ModSecurity, and server-level firewall rules—without relying on third-party tools. Bad bots can wreak havoc on your website in many ways, from scraping your content to launching brute-force attacks. …

Read More