<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Codex &#8211; The Core Hosting</title>
	<atom:link href="https://www.thecorehosting.net/the-codex/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.thecorehosting.net</link>
	<description>The Core of your hosting needs</description>
	<lastBuildDate>Sun, 25 Dec 2022 20:17:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.thecorehosting.net/wp-content/uploads/2022/12/cropped-cropped-The-Core-Hosting-icon-e1460665564679-1024x1024-transparent-32x32.png</url>
	<title>The Codex &#8211; The Core Hosting</title>
	<link>https://www.thecorehosting.net</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to access a hosting account via SSH</title>
		<link>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-access-a-hosting-account-via-ssh/</link>
					<comments>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-access-a-hosting-account-via-ssh/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Sun, 25 Dec 2022 20:17:55 +0000</pubDate>
				<guid isPermaLink="false">https://www.thecorehosting.net/?post_type=docs&#038;p=12276</guid>

					<description><![CDATA[If you wish to access a hosting account via SSH, first of all, follow the steps specified in this guide in order to enable SSH access for your account. There are several ways to access your hosting account via SSH: To access your hosting account via SSH on Windows, you should:1. Make sure that SSH [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>If you wish to access a hosting account via SSH, first of all, follow the steps specified in this guide in order to enable SSH access for your account.</p>



<p>There are several ways to access your <a href="/?page_id=1865">hosting account</a> via SSH:</p>



<ul class="wp-block-list">
<li><strong>Windows (access via PuTTY)</strong></li>



<li><strong>macOS/Linux (access via Terminal)</strong></li>



<li><strong>Terminal menu </strong><strong>i</strong><strong>n cPanel</strong></li>
</ul>



<p>To access your hosting account via SSH on <a><strong>Windows</strong></a>, you should:<br>1. Make sure that SSH access is enabled for your account.</p>



<p>2. Open your SSH client, put your domain name or the IP address of the server into the <strong>Host Name</strong> field, enter 21098 into the <strong>Port</strong> field (22 for a VPS/Dedicated server), choose SSH as your connection type and press the <strong>Open</strong> button:</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/ssh_putty.png" alt="ssh putty | The Core Hosting" title="The Codex 12"></p>



<p>3. You will receive the Putty Security Alert. Press <strong>OK</strong>:</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/security_alert.JPG" alt="security alert | The Core Hosting" title="The Codex 13"></p>



<p>4. When prompted, enter your cPanel username and password (when you enter the password, it is automatically hidden for the security purposes):</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/login_succeed.JPG" alt="login_succeed.JPG" title="The Codex 14"></p>



<p>You can find cPanel login details in the Hosting Welcome email sent right after the package activation. If you face difficulties finding the Welcome email, reach out to our <a href="https://billing.thecorehosting.net/ticket/new" data-type="URL">Support Team</a> for assistance.</p>



<p>If you use <a><strong>macOS</strong></a>, you don’t need to install a third-party client like PuTTY to connect to your hosting account via Secure Shell (SSH). Instead, you can use Terminal &#8211; a command line emulation program.</p>



<p>Instructions for Linux are similar.<br><br>Before you start, make sure SSH access is enabled for your hosting account.</p>



<p>1. Open your Terminal application:</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSH_Mac_terminal_1.png" alt="SSH Mac terminal 1 | The Core Hosting" title="The Codex 15"></p>



<p>You will see a window with a <em>user$</em> sign and a blinking cursor. This is your basic command prompt.<br>From in here, you can establish an SSH connection to your hosting server:</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/macterm2.png" alt="macterm2 | The Core Hosting" title="The Codex 16"></p>



<p>To connect, you need to execute the following command:</p>



<p><em>ssh USER@SERVER -pPORT</em></p>



<p><strong>USER</strong>: user you want to establish the SSH connection for. It can be either root (only for VPS and Dedicated servers) or cPanel username<br><strong>SERVER</strong>: hostname/IP of the server you are connecting to<br><strong>PORT</strong>: connection port &#8211; 21098 for a Shared server, 22 &#8211; for a VPS/Dedicated server</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/macterm3.png" alt="macterm3 | The Core Hosting" title="The Codex 17"></p>



<p>2. Now the computer will attempt to connect to your hosting server.<br>If it is your first time connecting to the server, you will see a message asking you to confirm the connection establishment. Type <strong>yes</strong> and press the Enter key to proceed:</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/macterm4.png" alt="macterm4 | The Core Hosting" title="The Codex 18"></p>



<p>3. You will be asked to input the SSH password (for root or cPanel account). Your cPanel login details (or root password) can be found in the Hosting Welcome email sent to you after the package activation. If you have difficulties finding the Welcome email, contact our <a href="https://billing.thecorehosting.net/ticket/new">Support Team</a> for assistance.Type in the password and press Enter.</p>



<p><strong>NOTE:</strong> The cursor will not be moving when you will be entering your password:</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/macterm5.png" alt="macterm5 | The Core Hosting" title="The Codex 19"></p>



<p>4. If all is good, you will see a line beginning with <em>[user@server ~]$.</em> This will indicate that the SSH connection has been successfully established:</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/macterm6.png" alt="macterm6 | The Core Hosting" title="The Codex 20"></p>



<p>The <a><strong>Terminal</strong></a> interface allows you to access an in-browser SSH application for direct command-line access within a cPanel session. In order to access cPanel <strong>Terminal</strong>, follow the next steps:</p>



<p>1. Make sure that SSH access is enabled for your account.</p>



<p>2. Navigate to <strong>cPanel &gt;&gt;</strong> the <strong>Advanced </strong>section <strong>&gt;&gt;</strong> the <strong>Terminal </strong>menu:<img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cpanel_terminal_menu.png" alt="cpanel terminal menu | The Core Hosting" title="The Codex 21"></p>



<p>3. If you are opening this menu for the first time, the warning notice will be shown. Click on <em>I understand and want to proceed</em>.</p>



<p>This message won&#8217;t appear in future sessions.</p>



<p>4. Now you can run SSH commands using this interface:<img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cpanel_terminal_menu_2.png" alt="cpanel terminal menu 2 | The Core Hosting" title="The Codex 22"><br>That&#8217;s it!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-access-a-hosting-account-via-ssh/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to get an SSH client</title>
		<link>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-get-an-ssh-client/</link>
					<comments>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-get-an-ssh-client/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Sun, 25 Dec 2022 19:48:30 +0000</pubDate>
				<guid isPermaLink="false">https://www.thecorehosting.net/?post_type=docs&#038;p=12269</guid>

					<description><![CDATA[To access your account via SSH, you should download and install one of available SSH clients. You can find the list of free SSH clients in the table below. If you have Windows, we recommend to use PuTTY as your SSH client. SSH Client Operating Systems Supported Download PuTTY Windows and Unix Download PuTTY WinSCP [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>To access your account via SSH, you should download and install one of available SSH clients. You can find the list of free SSH clients in the table below. If you have Windows, we recommend to use <strong>PuTTY</strong> as your SSH client.</p>



<figure class="wp-block-table"><table><tbody><tr><th><strong>SSH Client</strong></th><th><strong>Operating Systems Supported</strong></th><th><strong>Download</strong><br></th></tr><tr><td>PuTTY</td><td>Windows and Unix</td><td><a href="http://www.chiark.greenend.org.uk/%7Esgtatham/putty/download.html" target="_blank" rel="noopener">Download PuTTY</a></td></tr><tr><td>WinSCP</td><td>Windows (SCP and SFTP, no SSH)</td><td><a href="http://sourceforge.net/projects/winscp/files/WinSCP/4.2.9/winscp429setup.exe/download" target="_blank" rel="noopener">Download WinSCP</a></td></tr><tr><td>Fugu</td><td>Macintosh</td><td><a href="https://fugu.en.softonic.com/mac" target="_blank" rel="noopener">Download Fugu</a></td></tr></tbody></table></figure>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-get-an-ssh-client/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to secure your SSH login</title>
		<link>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-secure-your-ssh-login/</link>
					<comments>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-secure-your-ssh-login/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Sun, 25 Dec 2022 07:40:30 +0000</pubDate>
				<guid isPermaLink="false">https://www.thecorehosting.net/?post_type=docs&#038;p=12254</guid>

					<description><![CDATA[When dealing with a VPS or a Dedicated server, you will use Secure Shell to access the server to manage everyday tasks. If you access your server remotely (using SSH), it&#8217;s a good idea to protect yourself against attacks. Here are some recommendations on how to secure your SSH login: Disabling root logins Since the [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>When dealing with a VPS or a Dedicated server, you will use Secure Shell to access the server to manage everyday tasks. If you access your server remotely (using SSH), it&#8217;s a good idea to protect yourself against attacks. Here are some recommendations on how to secure your SSH login:</p>



<h2 class="wp-block-heading">Disabling root logins</h2>



<p>Since the root user is granted all the privileges on the server, and exposing the root login possess a threat to your entire system, it may be a wise decision to disable root logins.<br>Here is how to do it.</p>



<p><strong>Preparation stage</strong>: Make sure to create a user with <strong>Superuser</strong> AKA: <em>sudo</em> rights to perform all the necessary administrative actions. Once you are logged in to the server, follow these steps:<br><br>1. To create a new user, run the following command:</p>



<p><em>useradd -m -s /bin/bash -c &#8220;Admin&#8221;&nbsp; techuser</em></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure.png" alt="SSHsecure | The Core Hosting" title="The Codex 26"></figure>



<p>Where:</p>



<p><strong>Useradd</strong> is an actual command to create a user<br><strong>-m</strong> &#8211; an argument which creates a user with a default home directory in the format /home/user (in this case home/techuser).</p>



<p>If you would like to use a different argument than the default directory, use <strong>-d</strong> argument instead of <strong>-m</strong>, and specify the desired directory e.g. <em>/example/home/user</em>)</p>



<p><strong>-s</strong>&nbsp; &#8211; allows specifying the shell for the user (in this case the shell is /bin/bash)<br><strong>-c</strong> &#8211; comment addition. The actual comment here is ‘Admin’<br><strong>techuser</strong> &#8211; an example username. Instead of <em>techuser</em> you can use any username you like, just be sure to modify all the commands above accordingly).</p>



<p>Set a password for the newly created user (make sure you set <a href="https://www.namecheap.com/support/knowledgebase/article.aspx/9517/45/what-is-a-secure-password-and-why-is-it-important-to-have-one" target="_blank" rel="noopener">a strong, secure password</a>).</p>



<p><strong>NOTE</strong>: While typing the new password you won’t see any symbols appear, as hidden fields don’t show anything at all. If you hesitate about your password you can press <strong>Ctrl + U</strong> to empty the field and then start from scratch.</p>



<p><em>passwd techuser</em></p>



<p>Once you entered the password, you should receive the following output:</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure3.png" alt="SSHsecure3 | The Core Hosting" title="The Codex 27"></figure>



<p>Now you need to assign sudo (Superuser) rights to your user. This process varies depending on the Linux distribution you are using.</p>



<p>Debian (also Ubuntu):</p>



<p><em>usermod -aG sudo techuser</em></p>



<p>CentOS (also CloudLinux):</p>



<p><em>usermod -aG wheel techuser</em></p>



<p>Now you can <span class='tooltipsall tooltipsincontent classtoolTips0'>Test</span> if your newly created user has sudo rights:<br>Switch to the new user you&#8217;ve created:</p>



<p><em>su &#8211; techuser</em></p>



<p>Prepend commands that require Superuser access with sudo:<br>For instance: <em>sudo ls -la /root</em></p>



<p>You will be prompted to enter a password for your user which will be used to log in to the system and confirm sudo actions whenever they are required by the system.<br>If you did everything correctly, it will give you the file output:<br></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure7.png" alt="SSHsecure7 | The Core Hosting" title="The Codex 28"></figure>



<p>However, If you are using WHM/cPanel, you can assign sudo rights to any cPanel user.&nbsp; It is preferable to using the <em>useradd</em> command. To do so, once a cPanel account is created, you can go to your <strong>WHM</strong> &gt;&gt; <strong>Security Center</strong> &gt;&gt; <strong>Manage wheel group</strong> &gt;&gt;&nbsp; <strong>Add a user to the wheel group</strong>.</p>



<p>Choose your cPanel username from the list, and click <strong>Add to Group</strong>.<br></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure8.png" alt="SSHsecure8 | The Core Hosting" title="The Codex 29"></figure>



<p>2. Disable SSH login option for root:</p>



<p>Now open <em>/etc/ssh/sshd_config</em>. You can use nano text editor for this:</p>



<p><em>sudo nano /etc/ssh/sshd_config</em></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure9.png" alt="SSHsecure9 | The Core Hosting" title="The Codex 30"></figure>



<p>Then find (either with or without “#” in the beginning of the line):</p>



<p><em>#PermitRootLogin yes</em></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure10.png" alt="SSHsecure10 | The Core Hosting" title="The Codex 31"></figure>



<p>Instead set it to this:</p>



<p><em>PermitRootLogin no</em></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure11.png" alt="SSHsecure11 | The Core Hosting" title="The Codex 32"></figure>



<p>Make sure the edited line doesn&#8217;t begin with <strong>#</strong>, as it will be considered just as a comment and will not take any effect.</p>



<p>You can edit your default SSH port in this file as well. See how to make these changes below.</p>



<h2 class="wp-block-heading">Changing default SSH port</h2>



<p>By default, the SSH port is set to 22.<br>Locate the following line in the same file <em>/etc/ssh/sshd_config</em>:</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure12.png" alt="SSHsecure12 | The Core Hosting" title="The Codex 33"></figure>



<p>Remove <strong>#</strong> and change<strong> 22</strong> to your desired port number. Though make sure you do not use the ports which are used by other systems ( i.e. 465,993 which are mail ports etc).</p>



<p>E.g:</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure13.png" alt="SSHsecure13 | The Core Hosting" title="The Codex 34"></figure>



<p>In order to keep the custom port, make sure that the new port you set up is working. For the majority of firewalls, the ports up to 1000 are open by default. If you will be using higher numbers, make sure to open them manually, adding a corresponding rule to the firewall settings.<br><br>In order to <span class='tooltipsall tooltipsincontent classtoolTips0'>Test</span> the settings you should leave 2 ports opened:<br><strong>Port 22</strong><br><strong>Port 22345</strong><br>Once you log out and log in again using your custom port, and have made sure it is allowing you to connect, you may comment ( putting <strong>#</strong> at the beginning of the line) or delete the string with Port 22.</p>



<p>Save the changes and close the file. Press <strong>Ctrl + O</strong> to save. Type <strong>Ctrl + X</strong> to exit.</p>



<p>To apply the settings, the SSH service needs to be restarted. If you are logged in as a techuser (or your custom created one to replace root), you will need to use the sudo command to perform this action.</p>



<p>Depending on your distro and its version, the required command may be different, as well as the name of SSH service (sshd for Centos and CloudLinux and ssh for Ubuntu).<br>In the example below we use sudo systemctl restart sshd as we run CentOS 7.</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure14.png" alt="SSHsecure14 | The Core Hosting" title="The Codex 35"></figure>



<p>Other variants if you run some other distro or version (e.g. Centos 6, Ubuntu 14.04 and older versions):<br><em>sudo /etc/init.d/sshd restart<br>sudo service sshd restart<br>sudo restart ssh</em></p>



<p>If you have turned off root login on previous stages, you will still be able to log in to your control panel with root details.<br>If you use a cPanel license for your server, you can disable password authentication using the SSH Password Authorization Tweak menu in the WHM panel.</p>



<p><strong>NOTE</strong>: Once you press <strong>Disable Password Auth</strong>, all cPanel users will be able to access SSH only via SSH Keys.</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure15.png" alt="SSHsecure15 | The Core Hosting" title="The Codex 36"></p>



<h2 class="wp-block-heading">Generate SSH keys</h2>



<p>On your local machine, you need to have a pair of SSH keys (one public and one private).<br>Generate SSH keys on your local machine (applicable for Linux and MacOS):</p>



<p><em>ssh-keygen -t rsa</em></p>



<p>You will see this message:<br>&gt; <em>Generating public/private rsa key pair</em>.</p>



<p>When you&#8217;re prompted to <em>Enter file in which to save the key</em>, press <strong>Enter</strong>. This accepts the default file location and name. Just be sure not to overwrite your existing SSH keys. You can find them using the command (you can cancel the creation of SSH keys by using <strong>Ctrl + C</strong> shortcut and then run the command below to see if you have any keys already):</p>



<p><em>ls -la ~/.ssh/</em><br>&gt; <em>Enter file in which to save the key</em> (/home/you/.ssh/id_rsa): Press <strong>Enter</strong>.</p>



<p>At the prompt, type a secure passphrase. For more information, see <a href="https://help.github.com/en/github/authenticating-to-github/working-with-ssh-key-passphrases" target="_blank" rel="noopener">Working with SSH key passphrases</a>.<br><strong><br>Enter passphrase</strong> (empty for no passphrase): Type a passphrase<br><strong>Enter same passphrase again</strong>: Type passphrase again</p>



<p>The passphrase is used to protect your key. You will be asked for it when you connect via SSH. Generating SSH keys with no passphrase is not recommended for security reasons.<br>You can check the process of generating ssh keys below:</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure16.png" alt="SSHsecure16 | The Core Hosting" title="The Codex 37"></figure>



<p>Once you have generated your SSH key, you will be provided with two keys. You can check them in your home folder in a directory called .ssh:</p>



<p><em>ls -la ~/.ssh/<br>id_rsa&nbsp; id_rsa.pub</em></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure17.png" alt="SSHsecure17 | The Core Hosting" title="The Codex 38"></figure>



<p>For Windows there are various pieces of software which enable you to generate SSH keys:</p>



<p>WSL (Windows 10) provides an experience similar to your regular Linux distro, you just need to activate WSL, install the distro software you like from Windows Store, and run it using these instructions. Once you install and run it, you can create SSH key pair in the same way you can on Linux (as shown in previous steps).</p>



<p>MobaXterm, ConEmu, and similar also allow you to simulate Linux Shell so that you can use SSH programs in the same way you do it on Linux (and WSL).</p>



<p>PuTTY is an SSH client that allows you to connect remotely to SSH servers, but it doesn’t simulate shell environment, so generating SSH keypair here is a different process. For this, you will need PuTTYgen that is installed along with PuTTY:</p>



<p>1. Go to Windows <strong>Start</strong> menu &gt;&gt; <strong>All Programs </strong>&gt;&gt; <strong>PuTTY</strong> &gt;&gt; <strong>PuTTYgen</strong>.<br></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure18.png" alt="SSHsecure18 | The Core Hosting" title="The Codex 39"></figure>



<p>2. Click on <strong>Generate</strong> and start moving the mouse randomly within the PuTTYgen window.<br>3. Optional: enter a key comment, which will identify the key (useful when you use several SSH keys).<br>4. Type in the passphrase and confirm it. The passphrase is used to protect your key. You will be asked for it when you connect via SSH.<br>5. Click <strong>Save private key</strong> and <strong>Save public key</strong> to save your keys accordingly.</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure19.png" alt="SSHsecure19 | The Core Hosting" title="The Codex 40"></figure>



<p>You can copy a public key to your remote SSH server right from the PuTTYgen window as shown in the screenshot.</p>



<p><strong>Copying public key to your SSH server</strong><br>You need to copy your public key to the server to a file called <em>authorized_keys</em> located in the same .ssh folder of your remote user on the server. There is a command in Linux and MacOS you can use to do this automatically:</p>



<p><em>ssh-copy-id -p your_custom_port_number techuser@yourserverIP</em></p>



<p>Or you can manually copy contents of <em>id_rsa.pub</em> (it’s important to copy contents of your public key, NOT the private one):<img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure20.png" alt="SSHsecure20 | The Core Hosting" title="The Codex 41"></p>



<p>And then paste it in the authorized_keys file on your server (each new key begins on a new line, in case you need to add multiple keys in the future).<br>To edit the authorized_keys file on your remote server you can use this command once you are connected back to the server:</p>



<p><em>nano ~/.ssh/authorized_keys</em></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure21.png" alt="SSHsecure21 | The Core Hosting" title="The Codex 42"></figure>



<p>Once changes are done, press <strong>Ctrl + O</strong> to save. Type <strong>Ctrl + X</strong> to exit<br>You will probably see all the pasted text in a single line, so it may appear differently on your screen.</p>



<p>If you have a cPanel license, it is possible to set up SSH Keys using WHM or cPanel.</p>



<p>WHM</p>



<p>1.Log into your WHM panel as root.<br>2. Go to <strong>Security Center</strong> &gt;&gt; <strong>Manage root’s SSH Keys</strong> &gt;&gt; <strong>Generate a New Key</strong>:</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure22.png" alt="SSHsecure22 | The Core Hosting" title="The Codex 43"></figure>



<p>3.Specify the key settings:</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure23.png" alt="SSHsecure23 | The Core Hosting" title="The Codex 44"></figure>



<p><strong>Key Name</strong>: enter your unique key (in this example we used ncstest)<br><strong>Key password</strong>: either enter or hit Generate Key<br><strong>Password again: re-enter the password<br>Choose the type</strong>: RSA (slower to generate but faster to validate) or DSA (faster to generate but slower to validate)<br><strong>Key Size</strong>: choose the Key size (the higher the number, the more security, but slower authentication speed)<br>And press <strong>Generate Key</strong>.</p>



<p>Once it is done, a pair of public and private keys are generated.<br>In order to use it for a login you need to Authorize the public key. To do so, please <strong>Return to SSH manager</strong> &gt;&gt; <strong>public_keys</strong> &gt;&gt; find out your keys and go to <strong>Manage Authorization</strong>.</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure24.png" alt="SSHsecure24 | The Core Hosting" title="The Codex 45"></figure>



<p>On the prompted window, press <strong>Authorize</strong>.<br></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure25.png" alt="SSHsecure25 | The Core Hosting" title="The Codex 46"></figure>



<p>Then, press <strong>Return to SSH Manager</strong> find the private key you have just created and copy it.<br></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure26.png" alt="SSHsecure26 | The Core Hosting" title="The Codex 47"></figure>



<p>If you will be using PUTTY, you will need to convert it to PPK format. In order to do so, enter the password for your user and press convert.</p>



<p>To import existing keys, you can go back to SSH manager, and find the<strong> Import Key</strong> option.<img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure27.png" alt="SSHsecure27 | The Core Hosting" title="The Codex 48"> Import Key will redirect you to the following window. Please choose a name for this key and paste a desired (private or public) key you to import. It will also be possible to import a PPK key. If you don’t use one, you may leave this field empty.</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/SSHsecure28.png" alt="SSHsecure28 | The Core Hosting" title="The Codex 49"></figure>
<script type="text/javascript"> toolTips('.classtoolTips0','Test'); </script>]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-secure-your-ssh-login/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Using CXS scan via SSH</title>
		<link>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/using-cxs-scan-via-ssh/</link>
					<comments>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/using-cxs-scan-via-ssh/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Sun, 25 Dec 2022 07:20:21 +0000</pubDate>
				<guid isPermaLink="false">https://www.thecorehosting.net/?post_type=docs&#038;p=12249</guid>

					<description><![CDATA[ConfigServer Exploit Scanner (CXS) is a server antivirus system that can be purchased and installed on VPS and Dedicated Servers to detect and mitigate various types of malware. This is done by cxswatch daemon for all files uploaded to the respective server, but you can also use it to actively scan files in real time. [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>ConfigServer Exploit Scanner (CXS)</strong> is a server antivirus system that can be purchased and installed on <a href="/?p=181" data-type="services" data-id="181">VPS</a> and <a href="/?p=2732" data-type="services" data-id="2732">Dedicated Servers</a> to detect and mitigate various types of malware. This is done by cxswatch daemon for all files uploaded to the respective server, but you can also use it to actively scan files in real time.</p>



<p>CXS is installed by default on all our Shared servers, and VPS/Dedicated servers with Full Management. In other cases, you will need to <a href="/?p=12250">purchase the license</a> to use it. Aside from that, running the scan requires <strong>root access</strong>, so if you need to run ad-hoc scan on a Shared server or VPS/Dedicated server with Complete management, please <a href="hhttps://billing.thecorehosting.net/tickets/new/">contact us</a>.</p>



<ul class="wp-block-list">
<li></li>
</ul>



<p>While reading this guide, please keep in mind the following:</p>



<ul class="wp-block-list">
<li>CXS is designed as a command-line utility. Most of its functionality is available via the WHM plugin, but we will keep the focus only on the Command Line Interface (CLI) usage.</li>



<li>All text that appears in <strong>bold </strong>should be replaced with your own data.</li>



<li>The purpose of CXS is to stop unprivileged user-level threats and viruses. It is not a rootkit scanner and it will not detect or combat malware that was able to gain root access to the system.</li>



<li>Scanning system folders, beyond your home folder, is not recommended as it can result in false-positive results. Doing so with options like <em><strong>&#8211;quarantine</strong></em> may put the system into an unrecoverable state.</li>



<li>The constantly-evolving nature of malware makes it impossible to give specific steps on how to evaluate whether or not a file is malicious. Before making any final judgements, make sure to do all the necessary research on your own.</li>
</ul>



<h2 class="wp-block-heading">Important locations and configurations</h2>



<p>Configured and quarantined files are stored in the specified locations below:</p>



<figure class="wp-block-table"><table><tbody><tr><th>Location</th><th>Explanation</th></tr><tr><td><em>/etc/cxs</em></td><td>Main directory; most files to work with are located here.</td></tr><tr><td><em>/etc/cxs/cxs.fp</em></td><td>Fingerprint database.</td></tr><tr><td><em>/etc/cxs/cxs.db</em></td><td>Report and counter storage.</td></tr><tr><td><em>/etc/cxs/default</em></td><td>Examples of configuration files/crons.</td></tr><tr><td><em>/etc/cxs/cxs.ignore*</em></td><td>Ignore lists for different types of scans.</td></tr><tr><td><em>/etc/cxs/cxscgi.sh</em><br><em>/etc/cxs/cxsdaily.sh</em><br><em>/etc/cxs/cxsftp.sh</em></td><td>Sets of options used for corresponding scans.</td></tr><tr><td><em>/opt/cxs/quarantine</em></td><td>CXS quarantine.</td></tr><tr><td><em>/var/log/cxswatch.log</em></td><td>Main log of the <em>cxswatch </em>system daemon.</td></tr><tr><td>/etc/cxs/cxswatch.sh<br></td><td>File launched by cxswatch daemon. With options provided in it CXS runs in mode that scans files uploaded to the server.<br>If you supply &#8211;mail option here, it will send reports of all cxswatch scans to that mailbox.<br></td></tr></tbody></table></figure>



<h2 class="wp-block-heading">CXS SSH one-line commands</h2>



<p>One-line commands below can be used to scan single locations or home folders of a particular user. To make it easier for you to interact with the commands, some additional parameters were added.</p>



<figure class="wp-block-table"><table><tbody><tr><th>Command</th><th>Explanation</th></tr><tr><td><em>cxs &#8211;user <strong>user</strong></em><br>or<br><em>cxs /<strong>path_to_file_or_folder</strong></em></td><td>Location to scan. It can be a user&#8217;s home folder, a file or a folder and all its recursive contents.</td></tr><tr><td><em>cxs &#8211;user <strong>user </strong>&#8211;dbreport &#8211;report /home/<strong>user</strong>/cxs_scan-$(date +%b_%d_%Y_%Hh%Mm)</em></td><td>Scan the user&#8217;s home folder with plain text and create a database report.</td></tr><tr><td><em>cxs &#8211;user <strong>user </strong>&#8211;report &#8220;/home/<strong>user</strong>/report-$(date +%b_%d_%Y_%Hh%Mm).txt&#8221; -B &#8211;mail <strong>email@domain.com</strong></em></td><td>Run a full scan of one cPanel account in the background, save the report to the user’s home folder, and send email to the specified mailbox.</td></tr><tr><td><em>cxs &#8211;force /<strong>path_to_system_folder</strong></em></td><td>Scan file in system folders (use with caution).</td></tr></tbody></table></figure>



<p>The full list of the common additional CXS parameters can be found below:</p>



<figure class="wp-block-table"><table><tbody><tr><th>Command</th><th>Explanation</th></tr><tr><td><em>&#8211;report <strong>/path_to_cxs_report</strong></em></td><td>Save a detailed scan report to the provided location.</td></tr><tr><td><em>-B, &#8211;background</em></td><td>Launch the scan in the background. Best used together with the <em><strong>&#8211;report</strong></em> option.</td></tr><tr><td><em>&#8211;mail <strong>admin@example.com</strong></em></td><td>Send report to email once the scan is over.</td></tr><tr><td><em>-T, &#8211;throttle <strong>[num]</strong></em></td><td>Put scan in sleep mode if the server load is greater than <em><strong>[num]</strong></em>.</td></tr><tr><td><em>&#8211;force</em></td><td>Scan the file(s) in system folders (<em>/usr /var /bin /lib /lib64 /boot /etc /proc /sys /opt</em>).</td></tr><tr><td><em>&#8211;deep</em></td><td>A deep scan that searches for all known exploits in all scanned files. It takes significantly longer than a normal scan but can be helpful when basic scans are not able to locate viruses/pattern matches.</td></tr><tr><td><em>&#8211;quarantine <strong>/path_to_quarantine</strong></em></td><td>Put all files that trigger any matches during the scans to quarantine. Use with caution as it may break production websites.</td></tr><tr><td><em>&#8211;qview <strong>/path/to/quarantine/</strong>cxsuser<strong>/user/file</strong></em></td><td>View quarantined file.</td></tr><tr><td><em>&#8211;qrestore <strong>/path/to/quarantine/</strong>cxsuser<strong>/user/file</strong></em></td><td>Restore quarantined file.</td></tr><tr><td><em>&#8211;filemax <strong>[num]</strong></em></td><td>Maximum amount of files to scan per directory. The default is 10,000. Useful when scanning massive mail folders.</td></tr></tbody></table></figure>



<p>CXS supports many other parameters that can be checked by running the following commands:</p>



<pre class="wp-block-preformatted">cxs --help</pre>



<p>Or</p>



<pre class="wp-block-preformatted">cxs --help | less -R</pre>



<p>They provide a full list of possible options as well as a detailed description of each.</p>



<h2 class="wp-block-heading">Scanning the whole server</h2>



<p>Before starting the scan for the whole server, first adjust the CXS ignore list, since there are some standard cPanel files located in <em>/home</em> folder that will trigger false-positive results. To do this, run the following command:</p>



<pre class="wp-block-preformatted">cat &gt; ~/ignorelist &lt;&lt;EOF<br>/home/virtfs<br>/home/.cpcpan<br>/home/cPanelInstall<br>/home/.cpan<br>/home/.cpanm<br>/home/cpeasyapache<br>/home/latest<br>EOF
</pre>



<p>Now you can start the scan.</p>



<p>In order to run it in the background, save the report to the<em> /root//full_server_scan</em> file and send as an email to yourself once it’s over, use the following command:</p>



<pre class="wp-block-preformatted">cxs /home -B --report /root/<strong>full_server_scan</strong> --ignore ~/ignorelist --mail <strong>email@domain.com</strong></pre>



<h2 class="wp-block-heading">Storing scan reports in the database</h2>



<p>You can run scans with the <em>&#8211;dbreport </em>option to store the results in the database located at <em>/etc/cxs/cxs.db</em>. It has its downsides, like the way timestamps are handled and the more rarified format of the database (SQLite), but it still might come in handy.</p>



<p>The detailed instructions on how to use it can be found below.</p>



<p>1. Find the timestamp (epoch format) of the scan start:<br><br><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_1.png" alt="| The Core Hosting" title="The Codex 62"></p>



<pre class="wp-block-preformatted">date -d '<strong>your timestamp</strong>' +%s</pre>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_2.png" alt="| The Core Hosting" title="The Codex 63"></p>



<p>2. Check the scan time in the summary and add to it to the start moment:</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_3.png" alt="| The Core Hosting" title="The Codex 64"></p>



<pre class="wp-block-preformatted">echo $((<strong>timestamp </strong>+ <strong>scan_time</strong>))</pre>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_4.png" alt="| The Core Hosting" title="The Codex 65"></p>



<p>3. Enter the database:</p>



<pre class="wp-block-preformatted">sqlite3 /etc/cxs/cxs.db</pre>



<p>4. Locate the report:</p>



<pre class="wp-block-preformatted">SELECT * FROM reports WHERE timestamp = '<strong>timestamp</strong>';</pre>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_5.png" alt="| The Core Hosting" title="The Codex 66"></p>



<p>Sometimes, the timestamp of the scan is off by a second depending on the exact start time of the scan. You can locate it by checking the closest timestamp available:</p>



<pre class="wp-block-preformatted">SELECT timestamp FROM reports;</pre>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_6.png" alt="| The Core Hosting" title="The Codex 67"></figure>



<h2 class="wp-block-heading">Working with quarantined files and false-positive results</h2>



<p>After performing a scan, you may notice that the CXS quarantined files are not malicious. In this case, it’s necessary to closely examine the files’ contents and decide whether or not you should modify, whitelist, or keep them quarantined.</p>



<h3 class="wp-block-heading">Viewing quarant<a><strong>ined files</strong></a></h3>



<p>Standard text viewing/editing tools (cat, less/more, etc.) allows you to view/edit contents of the file, but in order to safely view a quarantined file, we recommend using the following command:</p>



<pre class="wp-block-preformatted">cxs --qview <strong>/path/to/quarantine/</strong>cxsuser<strong>/user/malicious_file</strong></pre>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_7.png" alt="| The Core Hosting" title="The Codex 68"></p>



<p>If the file is located in a system folder (e.g.,<em> /opt</em>, <em>/etc</em>, etc.), you will need to use <strong><em>&#8211;force</em></strong> option to be able to scan it:</p>



<pre class="wp-block-preformatted">cxs --force <strong>/path/to/quarantine/</strong>cxsuser<strong>/user/malicious_file</strong></pre>



<p>As a result, you will see the output that looks as follows:</p>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_8.png" alt="| The Core Hosting" title="The Codex 69"></p>



<h3 class="wp-block-heading">Considering whether or not the file is dangerous</h3>



<p>In our example, it’s easy to detect the malicious code; it stood out from the normal PHP code and we had access to the clean master version (since the file is a part of popular WordPress plugin).</p>



<p>Generally-speaking, however, this is the hardest part as malicious code is often obfuscated, encoded or otherwise not readable by humans. Due to the diverse nature of these exploits, it’s impossible to cover all. Therefore, we can only advise you to:</p>



<ul class="wp-block-list">
<li>Never restore/whitelist files if you are not sure what harm they can do.</li>



<li>Whitelist only <a href="https://en.wikipedia.org/wiki/MD5" target="_blank" rel="noreferrer noopener">md5 checksums</a>, not files or folders. This way only one specific state of the file will be whitelisted and further modifications will trigger CXS checks one more time. Otherwise, users will be able to put something that affects the whole server in that location, either by mistake or intentionally, and antivirus will ignore it completely.</li>
</ul>



<h3 class="wp-block-heading">File restoration and whitelist management</h3>



<p>If you have detected and removed the malware part of the file, you must proceed with the required steps:</p>



<p>1. Run an extra scan to make sure that file is now safe:</p>



<pre class="wp-block-preformatted">cxs --force <strong>/path/to/quarantine/</strong>cxsuser/user<strong>/malicious_file</strong></pre>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_9.png" alt="| The Core Hosting" title="The Codex 70"></p>



<p>2. Restore it:</p>



<pre class="wp-block-preformatted">cxs --qrestore <strong>/path/to/quarantine/</strong>cxsuser<strong>/user/malicious_file</strong></pre>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_10.png" alt="| The Core Hosting" title="The Codex 71"></p>



<p>If it’s not possible to determine why the CXS treated the file as malicious, but you are sure that it is safe to use it, follow the next steps:</p>



<p>1. Find out MD5 sum of the file.</p>



<pre class="wp-block-preformatted">md5sum <strong>/path/to/quarantine/</strong>cxsuser<strong>/user/malicious_file</strong></pre>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_11.png" alt="| The Core Hosting" title="The Codex 72"></p>



<p>2. Add md5sum to whitelist:</p>



<pre class="wp-block-preformatted">echo “md5sum:<strong>md5sum_from_previous_command</strong>” &gt;&gt; /etc/cxs/cxs.ignore.user</pre>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_12.png" alt="| The Core Hosting" title="The Codex 73"></p>



<p>3. Restore the file:</p>



<pre class="wp-block-preformatted">cxs --qrestore <strong>/path/to/quarantine/</strong>cxsuser<strong>/user/malicious_file</strong></pre>



<p>4. Restart CXS:</p>



<pre class="wp-block-preformatted">service cxswatch restart</pre>



<p>or</p>



<pre class="wp-block-preformatted">systemctl restart cxswatch.service</pre>



<p><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/cxs_via_ssh_13.png" alt="| The Core Hosting" title="The Codex 74"></p>



<p>Congrats! Now you know how powerful the ConfigServer Exploit Scanner (CXS) tool can be, helping you to effectively secure your server.</p>
<script type="text/javascript"> toolTips('.classtoolTips0','Test'); </script>]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/using-cxs-scan-via-ssh/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is a CXS License?</title>
		<link>https://www.thecorehosting.net/the-codex/accounts-and-billing/billing-faq/what-is-a-cxs-license/</link>
					<comments>https://www.thecorehosting.net/the-codex/accounts-and-billing/billing-faq/what-is-a-cxs-license/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Sun, 25 Dec 2022 07:15:01 +0000</pubDate>
				<guid isPermaLink="false">https://www.thecorehosting.net/?post_type=docs&#038;p=12250</guid>

					<description><![CDATA[A CXS, or ConfigServer eXploit Scanner, is a tool that performs active scanning of files as they are uploaded to the server. It can detect suspicious files found on the server, as well as prevent most (but not all) exploits from being uploaded or run on the server. Active file scanning performed by CXS prevents [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>A CXS, or ConfigServer eXploit Scanner, is a tool that performs active scanning of files as they are uploaded to the server. It can detect suspicious files found on the server, as well as prevent most (but not all) exploits from being uploaded or run on the server.</p>



<p>Active file scanning performed by CXS prevents malware exploitation of an account by deleting or moving suspicious files to quarantine before they become active. It can also prevent the uploading of PHP and perl shell scripts, which are commonly used to launch more malicious attacks and for sending spam.</p>



<p>Additionally, CXS allows you to perform on-demand scanning of files, directories, and user accounts to detect suspicious exploits, viruses, and resources (files, directories, symlinks, sockets, etc.). You can run scans of existing user data to find exploits that have been uploaded in the past, or using methods not included with active scanning.</p>



<p>Included with the CXS Command Line Interface (CLI) is a web-based User Interface (UI) which can help you:</p>



<ul class="wp-block-list">
<li>Run scans</li>



<li>Schedule and edit scans via CRON</li>



<li>Compose CLI scan commands</li>



<li>View, delete, and restore files from quarantine</li>



<li>View documentation</li>



<li>Set and edit default values for scans</li>



<li>Edit commonly used CXS files</li>
</ul>



<p>CXS license orders have the following system requirements:</p>



<p><strong>Control Panel</strong>: cPanel/WHM</p>



<p><strong>Operating System</strong>: CentOS 7, CloudLinux 7/8, AlmaLinux 8</p>



<p>CXS is a commercial product that is sold and licensed strictly on a one-time per server basis, with updates provided for the life of the product. To order a CXS license ($60), please submit a ticket to our <a href="https://billing.thecorehosting.net/tickets/new/" target="_blank" rel="noreferrer noopener">Billing/Sales department</a>.</p>



<p>CXS license is installed for <strong>free</strong> for All VPS And Dedicated Servers with Managment on them</p>



<p>If the license is installed on the server, you can scan your account via the CXS scanner, feel free to follow <a href="/?p=12249">these steps</a>.<br><strong>NOTE</strong>: Interaction with the CXS license requires root access. Since root access is not provided on complete managed servers, all the uploaded files are scanned automatically while all the inquiries related to ad-hoc scan, quarantine, and interpreting the results can be addressed to our technical support.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/accounts-and-billing/billing-faq/what-is-a-cxs-license/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to find information about commands</title>
		<link>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-find-information-about-commands/</link>
					<comments>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-find-information-about-commands/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Sun, 25 Dec 2022 07:09:18 +0000</pubDate>
				<guid isPermaLink="false">https://www.thecorehosting.net/?post_type=docs&#038;p=12246</guid>

					<description><![CDATA[NOTE: These commands can be run only on a VPS or a Dedicated server. man &#8211; format and display the on-line manual pagesSYNOPSIS &#160;&#160;&#160;&#160;&#160;&#160;&#160;&#160; man [-acdfFhkKtwW] [&#8211;path] [-m system] [-p string] [-C config_file] [-M pathlist]&#160;&#160;&#160;&#160;&#160;&#160; [-P pager] [-B browser] [-H htmlpager] [-S section_list] [section] name &#8230; DESCRIPTION man formats and displays the on-line manual pages. [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>NOTE</strong>: These commands can be run only on a <a href="/?p=181" data-type="services" data-id="181">VPS</a> or a <a href="/?p=2732" data-type="services" data-id="2732">Dedicated server</a>.</p>



<p><strong>man </strong>&#8211; format and display the on-line manual pages<br><strong>SYNOPSIS</strong><br><br><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; man </strong>[-<strong>acdfFhkKtwW</strong>] [<strong>&#8211;path</strong>] [<strong>-m</strong> system] [<strong>-p</strong> string] [<strong>-C</strong> config_file] [<strong>-M</strong> pathlist]<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; [<strong>-P</strong> pager] [<strong>-B</strong> browser] [<strong>-H</strong> htmlpager] [<strong>-S</strong> section_list] [section] name &#8230;</p>



<p><strong>DESCRIPTION</strong></p>



<p><strong>man </strong>formats and displays the on-line manual pages. If you specify section, <strong>man </strong>only looks in that section of the manual. <strong>name </strong>is normally the name of the manual page, which is typically the name of a command, function, or file.</p>



<p>The output of <strong>man ls</strong> command:</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/man_ls.JPG" alt="man_ls.JPG" title="The Codex 75"></figure>



<p>The <strong>apropos </strong>command can be used before <strong>man </strong>in order to find all the man pages for commands which contain a certain word.</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/apropos.JPG" alt="apropos.JPG" title="The Codex 76"></figure>



<p>The same purpose has <strong>whatis </strong>command. <strong>whatis </strong>– searches the whatis database for complete words. Example of using <strong>whatis </strong>command:</p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/whatis.JPG" alt="whatis.JPG" title="The Codex 77"></figure>



<p>To review all man pages related to the command use <strong>-a</strong> option. For example: <strong>man nano -a<br></strong></p>



<figure class="wp-block-image"><img decoding="async" src="https://Namecheap.simplekb.com/SiteContents/2-7C22D5236A4543EB827F3BD8936E153E/media/man_nano.JPG" alt="man_nano.JPG" title="The Codex 78"></figure>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/hosting-services/general-information/hosting-questions/how-to-find-information-about-commands/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Whois?</title>
		<link>https://www.thecorehosting.net/the-codex/hosting-services/general-information/domains/what-is-whois/</link>
					<comments>https://www.thecorehosting.net/the-codex/hosting-services/general-information/domains/what-is-whois/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Sun, 25 Dec 2022 06:23:43 +0000</pubDate>
				<guid isPermaLink="false">https://www.thecorehosting.net/?post_type=docs&#038;p=12214</guid>

					<description><![CDATA[Whois is a service that provides basic information about a registered domain, such as domain owner contact information, domain availability status and the company with which the domain is registered (also called the Registrar). Whois also provides registration and expiration dates of a domain as well as the nameservers the domain is using. ICANN regulations [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Whois is a service that provides basic information about a registered domain, such as domain owner contact information, domain availability status and the company with which the domain is registered (also called the Registrar). Whois also provides registration and expiration dates of a domain as well as the nameservers the domain is using. <a href="https://www.icann.org/" target="_blank" rel="noreferrer noopener">ICANN</a> regulations require all domain Registrants to keep their contact details valid and up-to-date to help prevent fraud and identity theft. You can find more information about Whois on <a href="https://www.namecheap.com/domains/how-does-whois-work/" target="_blank" rel="noreferrer noopener">this page</a>.</p>



<p>We offer <a href="https://www.namecheap.com/domains/whois/" target="_blank" rel="noreferrer noopener">Whois Lookup</a> option to check details associated with a domain. Information contained within the lookup depends on the Registry to some extent.</p>



<p>However, for most gTLDs/new gTLDs you&#8217;ll see details like who a domain is registered to, when it was registered, when it expires, and where the DNS is hosted. For the majority of ccTLDs, you will have to go to the Registry&#8217;s website to get more information.</p>



<p>The amount of information available in a record will depend on the type of TLD, and the Registrar of the domain.<br>Domain Registrars usually allow their customers to change their domain contact information directly from their accounts (without needing to contact the Registrar&#8217;s customer support). Updates to Whois information may take up to 24 hours.</p>



<p>Some domain Registries allow domain owners to hide certain details in their public Whois records. They do this by replacing the Registrant&#8217;s data with the one of the Registrar or hosting company.</p>



<p>This feature is called Domain Privacy Protection, or domain privacy. For example, in a user&#8217;s public Whois record with domain protection, their personal email is substituted with a string that looks like<em> a7b594eb9f5d43c123123c82484363f81.protect@withheldforprivacy.com</em><br>Anyone wishing to contact the user would send email to this address, which would be privately redirected to the user&#8217;s personal email.</p>



<p><strong>Did you know?</strong></p>



<p>The Core Hosting offers the privacy protection tool provided by the Withheldforprivacy.com company. We offer this service <strong>free of charge</strong> for the registration, renewal, transfer, and reactivation <a href="https://www.namecheap.com/support/knowledgebase/article.aspx/775/37/do-you-provide-free-whoisguard-subscriptions-with-every-newly-registered-domain" target="_blank" rel="noreferrer noopener">for domain names that support it</a>.</p>



<p>That&#8217;s it!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/hosting-services/general-information/domains/what-is-whois/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TCP/IP</title>
		<link>https://www.thecorehosting.net/the-codex/hosting-services/general-information/dns-questions/tcp-ip/</link>
					<comments>https://www.thecorehosting.net/the-codex/hosting-services/general-information/dns-questions/tcp-ip/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Sun, 25 Dec 2022 05:56:57 +0000</pubDate>
				<guid isPermaLink="false">https://www.thecorehosting.net/?post_type=docs&#038;p=12209</guid>

					<description><![CDATA[TCP/IP &#8211; Transmission Control Protocol/Internet Protocol (currently in revision 4, known as IPv4, and sometimes called 4bone) &#8211; is a communication language that is used for transmitting data over networks. It is the main protocol for the Internet. TCP/IP is a set of instructions that describes how packets of information are sent across multiple networks. [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong><em>TCP/IP</em></strong> &#8211; Transmission Control Protocol/Internet Protocol (currently in revision 4, known as IPv4, and sometimes called 4bone) &#8211; is a communication language that is used for transmitting data over networks. It is the main protocol for the Internet. TCP/IP is a set of instructions that describes how packets of information are sent across multiple networks. The TCP part deals with the verifying delivery of the packets. The IP part refers to the moving of data packets between nodes.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/hosting-services/general-information/dns-questions/tcp-ip/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IP address</title>
		<link>https://www.thecorehosting.net/the-codex/hosting-services/general-information/dns-questions/ip-address/</link>
					<comments>https://www.thecorehosting.net/the-codex/hosting-services/general-information/dns-questions/ip-address/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Sun, 25 Dec 2022 05:25:22 +0000</pubDate>
				<guid isPermaLink="false">https://www.thecorehosting.net/?post_type=docs&#038;p=12200</guid>

					<description><![CDATA[IP address &#160;&#8211; Internet Protocol Address – also known as an “IP number” or simply an “IP” is a numeric code that generally uniquely identifies a particular computer on the Internet. The format of an IP address is a 32-bit numeric address shown as 4 8-bit octets of numbers each and separated by dots. Each [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong><em>IP address </em>&nbsp;</strong>&#8211; Internet Protocol Address – also known as an “IP number” or simply an “IP” is a numeric code that generally uniquely identifies a particular computer on the Internet. The format of an IP address is a 32-bit numeric address shown as 4 8-bit octets of numbers each and separated by dots. Each 8-bit octet is a number between 0 and 255. The first group is a number between 1 and 255 and the other groups are&nbsp;numbers between 0 and 255. IP addresses are combined into subnetworks (subnets). Subnets consist of 4-number IP addresses and can be of several classes that identify how many IP addresses are in one subnet. The smallest subnet is classless and has less then 255 IP addresses. The others can be of the following classes: C, B and A classes. Class C &#8211; first 3 octets are the same:</p>



<p>For example the following IP addresses are in the same C class subnet:</p>



<p>4.4.3.5 and 4.4.3.118</p>



<p>Class B &#8211; first 2 octets are the same:</p>



<p>4.4.3.5 and 4.4.7.45</p>



<p>Class A &#8211; first octet is the same:</p>



<p>4.2.4.6 and 4.87.97.110</p>



<p>Also there are classless subnets that are used to isolate subnets that are out of A, B and C classes. There are several subnets provided for private usage and has no route on the internet, so called private networks. They are 192.168.0.0/16; 172.16.0.0/15 and 10.0.0.0/8 &#8211; for use on a local area network (LAN) &#8211; or others (public) &#8211; for use on the Internet or other wide area network (WAN); static (also known as a permanent IP allocation; it is always the same and is associated as a characteristic of the local IP module) or dynamic (temporary IP address, which changes every time you connect to your ISP; usually it&#8217;s dialup or DSL networks). Formally we&#8217;ve described current IP standard called IPv4 (based on number of octets) and new IP v6 standard are already in use/implementation. This newer IPv6 standard is planned to replace it and starting to be deployed. There are several organizations &#8211; regional Internet registries that assign Internet addresses for these 3 classes: ARIN, RIPE NCC, LACNIC and APNIC.</p>



<p>For more information regarding IP standardization and requirements, please, visit the following links:</p>



<p><a href="http://tools.ietf.org/html/rfc950" target="_blank" rel="noopener">http://tools.ietf.org/html/rfc950</a></p>



<p><a href="http://tools.ietf.org/html/rfc1812" target="_blank" rel="noopener">http://tools.ietf.org/html/rfc1812</a></p>



<p><a href="http://tools.ietf.org/html/rfc917" target="_blank" rel="noopener">http://tools.ietf.org/html/rfc917</a></p>



<p><a href="http://tools.ietf.org/html/rfc1101" target="_blank" rel="noopener">http://tools.ietf.org/html/rfc1101</a></p>



<p><a href="http://tools.ietf.org/html/rfc1878" target="_blank" rel="noopener">http://tools.ietf.org/html/rfc1878</a></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/hosting-services/general-information/dns-questions/ip-address/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Managed WordPress?</title>
		<link>https://www.thecorehosting.net/the-codex/hosting-services/wordpress/what-is-managed-wordpress/</link>
					<comments>https://www.thecorehosting.net/the-codex/hosting-services/wordpress/what-is-managed-wordpress/#respond</comments>
		
		<dc:creator><![CDATA[Jacob B]]></dc:creator>
		<pubDate>Mon, 19 Dec 2022 04:24:56 +0000</pubDate>
				<guid isPermaLink="false">https://thecorehosting.net/?post_type=docs&#038;p=9602</guid>

					<description><![CDATA[Managed WordPress is our streamlined, optimized hosting platform for building and managing WordPress sites. The entire hosting environment is built around making your WordPress site run faster and more securely. For WordPress, managed means we handle some basic administrative tasks, such as installing WordPress, automated daily backups, WordPress core updates, and server-level caching. Here are [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>Managed WordPress is our streamlined, optimized hosting platform for building and managing WordPress sites. The entire hosting environment is built around making your WordPress site run faster and more securely.</p>



<p>For WordPress, <em>managed</em> means we handle some basic administrative tasks, such as installing WordPress, automated daily backups, WordPress core updates, and server-level caching.</p>



<p>Here are some key features Managed WordPress offers:</p>



<ul class="wp-block-list">
<li>The latest version of WordPress is automatically installed.</li>



<li>Automatic WordPress core updates.</li>



<li>Performance-enhancing caching.</li>



<li>Enhanced security through restricted file access.</li>



<li>Secure access to your files and database with sFTP and phpMyAdmin.</li>



<li>Automatic, daily backups (last 30 days).</li>



<li>Integrated SSL is included for the life of your hosting account.</li>



<li>One-click migration tool.</li>
</ul>



<p>Because of these optimizations, there are also some limitations you should know:</p>



<ul class="wp-block-list">
<li>Managed WordPress does not support WordPress multisite networks.</li>
</ul>
<script type="text/javascript"> toolTips('.classtoolTips0','Test'); </script>]]></content:encoded>
					
					<wfw:commentRss>https://www.thecorehosting.net/the-codex/hosting-services/wordpress/what-is-managed-wordpress/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
