SSL Certificates
How to order an SSL certificate
How Do I Install SSL Certificate?
What is Certificate Signing Request (CSR)?
What is Certificate Authority (CA)?
What does the CA (Certificate Authority) do with the CSR?
How to use www and non-www domains with an SSL certificate
How to install a third-party SSL certificate
What is Let's Encrypt SSL certificate?
Getting Free SSL/TLS Certificate from Let's Encrypt
How does an SSL certificate work?
SSL certificates and Server Name Indication (SNI) support
Adding your own SSL Certificate
Vulnerabilities and Exploits
Meltdown & Spectre Security Vulnerabilities
Securing Windows SMB and NetBios/NetBT Services
Malicious URL Troubleshooting and Guidelines
Linux Kernel Local Privilege Escalation Vulnerability (CVE-2016-5195)
Multiple OpenSSL vulnerabilities (CVE-2016-2107 and CVE-2016-2108)
Critical OpenSSL vulnerabilities - DROWN CVE-2016-0800
Critical Linux vulnerability CVE-2015-7547 in GNU C Library (glibc)
Botnet Troubleshooting and Guidelines
Guide to Microsoft SQL Server Browser Service Access Amplification Issues
Securing your Memcached Server
Protecting Intelligent Platform Management Interface (IPMI) devices
Sinkhole HTTP Referers and what to do about them
Acceptable Usage Guidelines
Reporting malicious URLs, such as phishing, hosted on the KEKhost/KEKhosting network
Understanding USA's Anti-Spam Law (CAN SPAM)
Understanding Canada's Anti-Spam Legislation (CASL)
Complying with IETF standards and managing security incidents on your website and server
Reporting unsolicited emails (spam) from the KEKhost/KEKhosting network
Sending Copyright & Trademark infringement notices to KEKhost/KEKhosting
Acceptable Use Policy Notifications
Determining if a server is blacklisted
Best Practices
Guide to Microsoft Active Directory rootDSE/C-LDAP security issues
Using Spamhaus DNSBL queries on KEKhost/KEKhosting network
Brobot Malware Troubleshooting and Guidelines
Installing and configuring ConfigServer Security & Firewall (CSF)
Guide to Objectionable Content
Detecting Malicious Processes in Linux and Windows
Information on Hosting of Illegal Content
Spam Issue Troubleshooting and Guidelines
Ensuring abuse notifications are received
Verifying CMS versions on multiple websites
Guide to DNS Open Recursion Amplification Issues