High Availability
Daniel Mecsei

High Availability

In computer science, the term of availability is used to describe the period of time when a service is available. High availability is a quality of a system that assures high-level performance for a given period of time. The main goal of high availability is to eliminate the Single Point of Failures (SPoF) in your infrastructure. To eliminate SPoF, each layer of your stack must be prepared for redundancy. Be aware, redundancy alone cannot guarantee high availability. A mechanism must detect the failures and take action when one of your components of the stack becomes unavailable....
Read more
IP spoofing: don’t let hackers deceive you
Nikolett Hegedüs

IP spoofing: don’t let hackers deceive you

IP address spoofing is a technique used by hackers to disguise their IP address as another IP and gain access to sensitive information or access private services on authorized networks. In some special cases, they can create IP packets that contain a false source IP address and this way hide their original address or impersonate another computing system.This is possible when they have access to the router for the local network. The Internet Protocol states that all IP packets must have a header section. This section contains the IP address of the packet’s sender - and other information too,...
Read more
The most common CMS attack types
Daniel Mecsei

The most common CMS attack types

Nowadays, the Internet plays a huge part in our lives. It gets bigger and bigger every day, now it has more than one billion websites. Most of these sites are built with CMS which stands for Content Management System. It is a tool that provides an easy-to-use method for users without any programming skills in creating websites. The most common CMSs are written in PHP because most shared-hosting providers only provide this way to share/operate your website with the community. According to the statistics, WordPress has the largest market share with 52%, followed by Joomla with only 6%. The...
Read more
Cloudifying your legacy applications
Nikolett Hegedüs

Cloudifying your legacy applications

Nikolett Hegedüs
In this article we will be dealing with OpenShift and Kubernetes technology. You can find some explanations about the terms used at the end of the article. If you want to take the neccessary steps to upgrade your own application, the first thing to do will be turning your pile of code into a container image.   The first step: containerization The Source-to-Image (s2i) method: Source-to-Image is an OpenShift tool for building reproducible Docker images by injecting source code into a Docker image. The new image will include the base (builder) image and the injec...
Read more
Configure your Railgun server to see proper logs
Nikoletta Szabo

Configure your Railgun server to see proper logs

Nikoletta Szabo
Many of our customers who use Cloudflare have recently notified us that they are not able to see the proper visitor IPs in the logs only the railgun server IPs. It is caused due to the fact that the requests are not directly coming from Cloudflare, so mod_cloudflare will not restore the IP’s of the visitor. That is why we would like to ask you to configure the mod_cloudflare. What is a Railgun server? How do I fix this? Open your Apache configuration ( if you do not know where to find it, ask your hosting provider for assitance ) At the very end add:CloudFlareRemoteIPTrustedP...
Read more

Our port Honeypot module is out of Beta

Nikoletta Szabo
We are happy to announce that our developers officially released the port honeypot module. The port honeypot is a perfect way to fight against zero-day attacks and many of our customers are satisfied with it because the module catches and entraps hackers who attempt to break into or scan their servers making them aware of the incoming malicious traffic. The module sets up 100 honeypots chosen randomly from the 1000 most commonly used ports and is able to detect malicious port scanning conducted by hackers.For example, it gets installed on a port where usually there should not be in...
Read more