Just Host Web Hosting Help

Basic Site Security Checklist

Summary

By design our servers are secure. The security level of your site depends on the code that is uploaded to Just Host's Servers.

The following check list is a good collection of security tips offered for review to ensure your web site is as secure as possible.




Remove malicious files and/or folders you are not familiar with.

While many PHP applications generate files you may not be familiar with, it is important to watch for files or directories that may sound suspicious such as 'wellsfargo' or 'abbybank'.

Update all scripts/applications to the newest versions available.

Old security holes are updated and remedied in new versions of software, so updating to the newest versions available ensures that you are running the most secure option available. If you installed these applications using MOJO Marketplace, automatic updates are available by clicking the 'Upgrade' button. For installations done with Fantastico, the main Fantastico screen will show a link on the right-hand side of the screen with the available versions you can upgrade to. In addition, go to the script's official site and subscribe to their updates list or security announcements list/feed.

Update all plugins to the newest versions available.

Just because your applications have been updated doesn't mean the plugins you use have been also. Popular plugins for Wordpress, Joomla, Drupal, etc are created for specific application versions. When updating your applications, make sure the plugins you're using are also certified to work with the newest version of your software. In addition, go to each plugin's official site and subscribe to their updates list or security announcements list/feed.

Change passwords on accounts or delete unused ones.

In case a hacker got one of your passwords, change them all.

  • In your cPanel, click Update Password to change your cPanel password.
  • Update the password(s) for your FTP Accounts. In FTP Accounts click "Change Password" if you still use the account or "Delete" if the account is no longer being used.
  • If your website has an administrative section or pages change it's password(s) also.

Delete any databases/applications from your account that are no longer in use.

Each databases/application you have installed on your account is another possible point of entry for attackers. By removing applications/databases that are no longer used, you will be eliminating the potential for those outdated scripts to be exploited.

Fix dangerously writeable permissions.

Most website files should be set at 644, and folders should be set to 755. This can be adjusted in an FTP client or by manually changing it in the Control Panel File Manager by selecting the file, and clicking on the icon at the top of the screen that says, 'Change Permissions'.

Hide your configuration files.

Moving your config.php and other files containing passwords to a secure directory outside of the 'public_html' folder will make them inaccessible to general web surfing.

Tweak your php.ini file.

The 'php.ini' file on your account is file that adjusts how PHP behaves on your account. By adjusting the properties of this file, you can greatly increase aspects of your security. This file is generally located in your 'public_html' directory. If you're unable to see this file, you may need to manually generate one. You can manually generate one by logging into your Control Panel and clicking the 'PHP Config' icon located in the section called 'Software/Services'. You'd then click the button that says, 'Install Master PHP.ini File'. This will install a file in your 'public_html' directory called 'php.ini.default'. To make this file active, you will then need to rename it to 'php.ini'.

  • Tweak 1 - Set 'register_globals' to Off.
  • Tweak 2 - Set 'display_error' to Off.

Connect to your account using a secure network.

If you're connecting to the internet using a wireless connection, make sure the wireless network is using a method of security such as WPA or WEP encryption.

Make sure your local computer is secure.

One of the biggest security holes in Internet site security is accessing your site from an insecure computer. Viruses, malware and keyloggers can be installed on your computer covertly and can be used to obtain your username/password credentials or to infect your website files themselves. Practice good at-home computer security by regularly running a reliable anti-virus/spyware scanner.

Connect to your email securely

If you use an email application, like Outlook or Mac Mail, be sure to use SSL when connecting to the email server. This will help prevent theft of sensitive information from your email as it travels from your computer to the email server. You should be able to view and adjust the connection settings inside your email application.

Anti-Virus Applications

Here are a few high-quality, free applications that can help you maintain a safe, healthy computer.

Windows

Mac

Linux Based



Was this resource helpful?

Did this resolve your issue?


Please add any other comments or suggestions about this content:





Recommended Help Content

How to Transfer hosted files from old host to Justhost.com via ssh. Your old host must have SSH access to perform this move. Using SSH to transfer files to Just Host
Knowledgebase Article 131,333 views tags: file host site transfer transferring

How to remove the "This site may harm your computer" warning in Google search results.
Knowledgebase Article 209,561 views tags: block blocking google malware

This article will explain why you see "Your WordPress site appears to be infected with malware. Please update to remedy this problem."
Knowledgebase Article 69,941 views tags: malware wordpress wordpresstools

Related Help Content

How can I host only a sub-domain on my hosting service provided by Just Host?
Knowledgebase Article 208,089 views tags: host subdomain

Two-factor authentication is ideal for anyone looking to increase their account security.
Knowledgebase Article 22,403 views tags: account password security

Changing PHP versions, load custom Apache mods, and other Apache/PHP customizations
Knowledgebase Article 35,470 views tags: easyapache php vps whm

How do I change the PHP environment for my site with php.ini?
Knowledgebase Article 531,001 views tags: configuration php server

How do I increase my file size limit in my PHP application?
Knowledgebase Article 405,339 views tags: optimize php upload uploads

PHP vs PHP single php.ini vs PHP with FastCGI
Knowledgebase Article 210,627 views tags: configuration php server

This article will explain how to add a PHP handler to your .htaccess files. This is useful if you want to customize the version of PHP that runs your PHP files.
Knowledgebase Article 65,198 views tags: htaccess php

How to install the php.ini file and then increase the PHP Memory limit.
Video "How-to" Tutorial 233,372 views tags: limit troubleshooting wordpress