Your cart is currently empty!
Category: Phoenix BlackOps Blog
Configuring WordFence for WordPress Security
Configuring WordFence for WordPress Security Configuring WordFence for WordPress Security June 2024 June 25, 2024 WordFence is a long-standing and powerful WordPress security plugin / solution. Protecting over 5 million sites, WordFence’s web-app firewall includes 467 firewall rules and it’s scanner includes 4,929 malware signatures. WordFence also offers 2FA for your WordPress site, numerous security…
Disk vs Application Level Encryption
Disk Vs. Application Level Encryption Phoenix Black Ops Blog Disk vs Application Level Encryption Setup SSH Keys Intro to Cryptography Check a File's Integrity via Checksums Site Backup Policy Disk Vs. Application Level Encryption Disk Encryption Disk encryption protects the data stored on the physical disk. It ensures that if an attacker gains physical access…
Setup SSH Keys
Setup SSH Keys Setup SSH Keys June 8, 2024 SSH keys are an enhanced method of authentication for logging into remote servers via SSH. Replacing passwords, ssh keys are nearly impossible to brute force making your server’s gateway, iron proof. This tutorial goes through how ssh keys work, generating an ssh key pair, saving them…
Intro to Cryptography
Intro to Cryptography Phoenix Ignited Tech Blog Setup SSH Keys Intro to Cryptography GNU Core Utilities Checksum Basics for Linux Backup Your Website Via SCP Create and Backup a MySQL Dump Intro to Cryptography What is Cryptography? In today’s digital age, the term “cryptography” is more relevant than ever. From securing our online communications to…
Check a File’s Integrity via Checksums
Check a File’s Integrity Via Checksums Check a File’s Integrity Via Checksums June 5, 2024 Being able to verify that a file has not been modified since it was created or signed is integral to the modern world, without this technology digital signatures would not exist and verifying the origin and integrity of downloads would…
Site Backup Policy
Site Backup Policy Phoenix Ignited Tech Blog Simple Auto-Backup Via SSH Script Docs Backup Your Website Via SCP Create and Backup a MySQL Dump Backup Directories & Files Via SCP Disable Root Access Site Backup Policy Schedule Regular Backups: Define the frequency of backups (e.g., daily, weekly, monthly). Schedule automated backups using cron jobs or…
Disable Root Access
Disabling Root Access Disabling Root Access Via SSH on a Linux Server April 30, 2024 This post dives deep (well as deep as a few terminal lines gets) into: creating a new user, giving the new user sudo powers, and finally how to disable root access via ssh on your linux server. Currently this tutorial…
Securing A Linux VPS
Cyber Security Blog Intro to Cryptography Disable Root Access Securing A Linux VPS WordPress Site Security VPNs: An Essential Tool for Online Privacy and Security Securing A Linux VPS This post aims to be a more or less start to finish guide onย securing a linux vps. Links throughout the post direct you to detailed…
-
WordPress Site Security
Essential WordPress Security Phoenix BlackOps Blog Intro to Cryptography Disable Root Access Securing A Linux VPS WordPress Site Security VPNs: An Essential Tool for Online Privacy and Security Essential WordPress Security Ensuring the security of your WordPress site is crucial to protect sensitive data, maintain user trust, and prevent malicious attacks. Implementing robust security measures…
-
VPNs: An Essential Tool for Online Privacy and Security
VPN’s: An Essential Tool for Online Privacy & Security VPN’s: An Essential Tool for Online Privacy & Security A Virtual Private Network (VPN) is a crucial tool for enhancing your online privacy and security. By creating a secure, encrypted connection between your device and the internet, VPNs protect your data from eavesdroppers, safeguard your privacy,…