KNOWNHOST KNOWLEDGE BASE

Hosting Question? Find the Solution - Browse our Guides, Articles, and How-To's

How to enable Two-Factor Authentication (2FA) for KnownHost?

Category: My KnownHost
Tags: # # #

You can enable and configure the Two-Factor Authentication on KnownHost’s Billing portal, just the same way we earlier saw for the cPanel control panel. There are many authentication apps that you can use to set up the 2FA, but for this article, we are using an authentication application. For Android: play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&hl=en For IOS: itunes.apple.com/us/app/google-authenticator/id388497605?mt=8 1. First, login […]

Log4j vulnerability and does it affect you?

A security bulletin was shared regarding a 0-day vulnerability for the Apache java logging library ‘log4j’ version 2+. What was shared was a discovery that this library could be severely exploited through Remote Code Execution (RCE) by handling a specific string within the library. This vulnerability has been considered critical, obtaining a 10/10 on the […]

Two-Factor Authentication: How to enable in cPanel?

Two-factor authentication provides extra layer security to your cPanel account. It offers two security levels; once you enter the password for cPanel, you need to enter the security code generated on the application. Failure of entering the code results in failure of the login attempt. We recommend using Google Authenticator as it is available for […]

There are hundreds of WordPress security plugins to choose from, with some trying to do one thing only and others trying to do it all. Given the fact that security plugins will often make fundamental changes to folder locations, database prefixes, user ID’s and enumeration obfuscate file locations and restrict login access, it’s always prudent […]

There are two types of denial of service events. You have your denial of service(DoS) event and then your distributed denial of service event(DDoS). The difference between these two is how many connections are utilized during the attack. A DoS will use a single connection to hit a website, an example being “Slow Loris”. DDoS […]