Set folder to readonly mode in Linux
Very often, when website is hacked – we do clean it for customer, because we do not want to have hacked content on our servers. […]
Continue reading »Notes from the Expert
Very often, when website is hacked – we do clean it for customer, because we do not want to have hacked content on our servers. […]
Continue reading »Finding files, uploaded and left by hackers, as well as files, which they have modified, is a complex event. It might be enough with one […]
Continue reading »Sometimes, e.g. when your partition gets full during update or other server hangs during update your RPM database might get corrupted and updates with yum […]
Continue reading »