Jun 25, 2013
Chase Ewing

If there is one thing as a system administrator that takes up the majority of my time, it is dealing with spam. Spam, unwanted or unsolicited email, has been around as long as email itself, and the manhours spent by countless system and network administrators attempting to mitigate it on their networks has been staggering. […]

Jun 11, 2013
Chase Ewing

In my previous article, I outlined what to do in case you have an abuse complaint lodged against you. A major issue in dealing with complaints is actually locating the source of the abusive activity on your server. If you have subscribed to our Managed General Services package for your server or device, you are […]

Jun 4, 2013
Aaron Hutchens

Previously, we discussed the first three steps on reacting to a successful attack. This week we will finish off with the last two steps of this five step process. Step four: delegation of responsibilities Whoever owns the account is responsible for the code that they have uploaded. This means that due to liabilities it is […]

May 28, 2013
Aaron Hutchens

Some time ago I was called forth to write an article on securing a web hosting server; As web hosting Systems Administrators here at SingleHop this is a topic with which we are all fairly familiar. After enough CSF installs, SSH port changes, and package updates you find that it all becomes muscle memory allowing […]

May 7, 2013
Sam Bowling

As a system administrator, one of my recurring duties is to work on fine-tuning servers our company and client servers. Fine-tuning allows us to squeezing every possible ounce of capability out of each server so they are utilized to their fullest potential. Due to its popularity as an easy to write and implement language, PHP […]

Apr 23, 2013
Andy Pace

Get ready folks! We’re about to go behind the scenes with SingleHop’s Operations team, focusing on what we do (and what we do differently) when deploying a SingleHop location. Some may think that turning up a new location for SingleHop is a daunting task. However with the years of automation we’ve put in place it is actually […]

Apr 19, 2013
Austin Wilson

This is thought to be common knowledge by most, but there are quite a few tech people out there that still do not know what happens when you trace to an IP address. And troubleshooting traceroutes can even be more complicated. We will cover the basics here, and if you are looking to delve into […]

Apr 9, 2013
Aaron Hutchens

So far, you have updated your packages and configured your firewall for statefully packet inspection, now we get to the final step. The last, and by no means the least important, step would be some manner of obfuscating your SSH access.  There are a few great ways to do this, many of which far beyond […]

Apr 2, 2013
Aaron Hutchens

Last time we discussed updating your packages. Now it’s time to setup your firewall. In this step we are going to install a SPI (Stateful Packet Inspection) Firewall program, CSF. It is worth noting that CSF is by no means the only option, however it offers a robust feature set along with some fantastic management […]

Mar 29, 2013
Chase Ewing

It’s 3 am. Your phone goes off. An urgent e-mail from abuse@singlehop.com is claiming that your server is sending large amounts of spam. How did this happen? How do you handle it? What can you do to prevent it? Here is what you can do to ensure that your server stays clean and problem free. Our abuse […]