Resources for

Sysadmin

Stop WordPress Admin Panel Abuse on Shared Hosting Environments

This article outlines practical steps to secure the WordPress admin area from brute-force attacks and bot scanning through deny rules, Fail2Ban, and rate limiting. …

Setting Up Real-Time Log Monitoring for Suspicious Traffic on Plesk Servers

This guide walks through how to set up real-time log monitoring on a Plesk server using Fail2Ban, GoAccess, and custom Bash scripts. These tools help you stay alert, visualize traffic, and act immediately on anomalies. …

How to Build a Custom Bot Blocklist Using Apache Rewrite Rules

Blocking bot traffic is an essential task for maintaining the security, performance, and reliability of websites hosted on Apache-powered servers.In this article, we will guide you through the process of building, maintaining, and deploying a custom bot blocklist using Apache’s .htaccess file and regex-based rules. …

How to Audit and Harden Plesk Against Automated Vulnerability Scanners

This guide focuses on auditing and hardening a Plesk server against such automated scanners using logging analysis, rate limiting, Web Application Firewall (WAF) configuration, and access control mechanisms—all tailored for Linux-based environments …

Detecting and Blocking Bad Bots in cPanel Without Third-Party Tools

This guide demonstrates how to detect and block bad bots on cPanel-managed servers using built-in tools like Apache’s .htaccess, ModSecurity, and server-level firewall configurations. …