Writing

Thoughts on technology, business, and the gap between them.

Block SSH Brute Force Attacks with IPTables

Protect your server from SSH brute force attacks using IPTables rate-limiting rules. This simple solution blocks excessive connection attempts without additional software, maintaining service availability while deterring automated password-guessing bots effectively.

Rise in SSH Brute Force Attacks

SSH brute force attacks are surging, causing service outages and security risks. Popular blocking methods have vulnerabilities, so we're testing a PAM module that automatically blacklists abusive hosts without relying on exploitable log-based detection.

How To Adhere to the CAN SPAM Act

Learn essential CAN-SPAM Act requirements to avoid fines up to $16,000 per email. Must-have compliance elements include opt-out methods, physical addresses, honest headers, and prompt unsubscribe processing for bulk email senders.

Phishers Targeting Webmasters using cPanel

Scammers are targeting cPanel users with phishing emails that spoof hosting provider login pages to steal FTP credentials. Once compromised, these accounts are used to build botnets and inject malicious code into websites, potentially triggering Google security warnings.

Our Clients are not Linux Geeks

Most small business owners don't care about technical jargon—they just want their IT to work so they can focus on running their business, not managing servers and Linux systems.

Plurk Layouts selects rackAID for Managed Hosting

Plurk Layouts partners with rackAID for managed hosting after experiencing constant downtime and poor support. The move enables the startup to focus on business growth while accessing reliable, scalable IT infrastructure and expert server management.

rackAID clients don’t have to worry about hosting

rackAID's client survey reveals high satisfaction in managed hosting services. Clients appreciate freed-up time, expert support, and worry-free server management. rackAID monitors updates hourly, applies 20-50 monthly patches, and is launching enhanced email and server security solutions.

Services and Tools We Use

Discover the essential tools and services powering rackAID's operations, from hosted PBX systems and wireless solutions to printing services and invoicing software. Learn what works for a hosting business.

How to Remove Google Site May Harm You Warning

Learn how to remove Google's "This site may harm your computer" warning by cleaning malware from your site, identifying security vulnerabilities, and requesting a review through Google Webmaster Tools.

TMP Directory Hardening Increasingly Ineffective

TMP directory hardening, once effective against attackers executing code from world-writable directories, now offers minimal protection. Attackers easily bypass noexec restrictions using interpreters like Perl or PHP, while modern XSS exploits render this hardening technique largely obsolete.

Let's talk about what you need.

Tell me about your situation. If there's a fit, we'll schedule a call.

Start a Conversation