Home
Web Hosting
Shared Web Hosting
Tomcat JSP Hosting
WordPress Hosting
Joomla Hosting
E-Commerce Hosting
Windows Hosting
Dedicated Hosting
Reseller Hosting
Reseller Hosting
Master Reseller Hosting
Alpha Master Reseller
DirectAdmin Reseller
Tomcat JSP Cloud Reseller
Compare Reseller ...
VM Server Hosting
Smart VM
VestaCP KVM Slice
Smart VM
ZPanel Reseller
Smart VM
KloxoMR Reseller
VPS
Self Managed VPS
VPS
Fully Managed Series
VPS
Storage VPS Series
Dedicated
Bare Metal Servers
Other Products
SSL Certificates
Business Email Hosting
Domain Reseller
OpenVPN Server
Private Proxy (SQUID)
Managed SEO Service
Company
Company Overview
Contact Us
Our Guarantees
Network Information
Our Blog
Terms of Service
SPECIALS
Quick Navigation
Home
Announcements
Knowledgebase
Network Status
Affiliates
Contact Us
Account
Login
Register
Forgot Password?
Knowledgebase
Client Central
>
Knowledgebase
>
Security Issue
Articles
.htaccess against MySQL injections and other hacks!
MySQL injection attempts are one of the most common hacking attacks against PHP websites. If your...
How to Bypass CentrioHost WordPress Login Security?
CentrioHost servers have wordpress bruteforce protection, so you may see a POPUP Authorization...
How to handle the Google Attack Page?
When you see the dreaded Google attack site warning, you should immediately email : hostmaster...
How to protect Directory Indexing?
Apache web server allow directory browsing by default. It?s always good to disable directory...
How to Protect WHMCS?
Move the attachments, downloads & templates_c folders The three folders "attachments",...
How to submit a DMCA complaint?
Reporting copyright infringement? You must follow these steps before submitting any information.
My account was hacked!
If you are the victim of a hacker you can mail to our support department and our experts will...
My Joomla has been hacked!
A Joomla is usually compromised when it or its components / modules are outdated. Another very...
SQL injection, insertion!
SQL injection is an attack where malicious code is passed to an SQL Server for execution. The...
Using Hotlink Protection
Hotlink Protection prevents other web sites from directly linking to certain files (typically...
What happens to someone abusing system resources?
The offending site will be suspended and the owner will be given an opportunity to fix the...
Copyright © 2008-2019
CentrioHost LLC
- All rights ® reserved