Nexcess Logo

Nexcess Knowledge Base

Knowledge Base Home
|
Category : other-best-practices
September 11, 2019

How to activate two-factor authentication in SiteWorx

How Nexcess clients on physical (non-cloud) servers can activate two-factor authentication for their SiteWorx account.
September 11, 2019

How can I prevent my site from being compromised?

If your site was recently compromised and the cause has yet to be identified, start with evaluating the list of possible root causes in this article before proceeding to the study of more exotic exploits.
September 11, 2019

How to change email account passwords in SiteWorx

How Nexcess clients on physical (non-cloud) servers can use SiteWorx change the password for email accounts on their domain.
September 11, 2019

How to install OpenVPN

Learn how to install OpenVPN, which is available as an add-on for all Nexcess clients on non-cloud dedicated or cluster plans.
September 11, 2019

How to password-protect web pages with .htpasswd

How Nexcess clients can use FTP and SSH to restrict access to web pages to one or more users.
September 11, 2019

How to create a secure password

Attackers use specialized software designed to crack passwords by making millions of guesses per second. A secure password is your best protection, and often the most overlooked.
September 10, 2019

How to block IPs with .htaccess

How to block IPs specific to various countries from accessing your site.
September 10, 2019

How to allow or block hostnames and IP addresses

How Nexcess clients on physical (non-Cloud) servers can allow or block specific hostnames and IP addresses while managing permissions for a site or domain directory.
September 10, 2019

How to manage firewall whitelists in SiteWorx

Learn how Nexcess clients on physical (non-cloud) clients can use SiteWorx to whitelist an IP address.
September 10, 2019

What is a web application firewall?

A Web Application Firewall (WAF) blocks all web traffic that does not meet the firewall's configured rules. WAFs detect intrusions that are known to occur and new unknown types of attacks.
We use cookies to understand how you interact with our site, to personalize and streamline your experience, and to tailor advertising. By continuing to use our site, you accept our use of cookies and accept our Privacy Policy.