At Rad Web Hosting, we're making concerted efforts in getting to know our clients on a more personal level (with their explicit consent, of course). Now, we'd like to take things a little further and discuss…
This article provides a guide for how to install and run Rootkit Hunter on AlmaLinux VPS. What is Rootkit Hunter? Rootkit Hunter (often abbreviated rkhunter) is a free, open-source security tool for Unix/Linux systems. It’s designed…
This article illustrates how to deploy a dedicated Outline VPN server on Ubuntu VPS with step-by-step instructions. Are you looking for a fast, secure, and private way to browse the internet, bypass censorship, or protect your…
This article provides information on new anti-phishing security setting now available in client area. 🔒 New Anti-Phishing Security Setting Now Available in Client Area Rad Web Hosting is proud to introduce a new Anti-Phishing Security Setting—a…
This article outlines the top 5 security features every hosting provider should offer (especially for small businesses and WordPress users). Running a small business means juggling a dozen priorities. Your website should be the one thing…
This article provides an in-depth analysis of our cPanel Shared Hosting server specs and features powering the 100%-SSD cPanel Hosting services. cPanel Shared Hosting Server Specs The following features are included with all cPanel Shared Hosting…
Below is a comprehensive, step-by-step guide to deploying the 389 Directory Server on Rocky Linux VPS instances, and configuring a separate Rocky Linux machine as an LDAP client. It covers everything from package installation and initial…
This article provides a guide for how to configure additional firewall rules on Rocky Linux VPS for improved security of your system. How to Configure Additional Firewall Rules on Rocky Linux VPS This tutorial will guide…
This article provides a guide to install Authentik IdP on Debian VPS. What is Authentik? Authentik is an open-source Identity Provider (IdP) designed to handle authentication and authorization for applications and users. It offers centralized identity…
This article provides a guide discussing how to protect your VPS against SQL injection. What is SQL Injection? SQL Injection is a type of cyber attack where an attacker inserts or “injects” malicious SQL code into…