We support any Dedicated Server, Cloud Server, or VPS running any Linux OS (CentOS, RedHat, CloudLinux, Fedora) and CPanel.      CHKRootKit - a simple program that detects hacker software and notifies you if any has been detected via email     RootKit Hunter - scanning tool to ensure your system does not have any backdoors or exploits     Securing and Upgrading of SSH Server - increases security during ssh connections     CSF or APF Firewall - most commonly used policy based iptables firewall     Anti-DoS configuration - helps mitigate denial of service type attacks     Brute Force Detection - notifies you of numerous login authentication failures and automatically blocks the attackers ip in the firewall     AntiSpam detection and prevention - software to help prevent incoming and outgoing spam from the server.     Log Analysis Software Installation - Emails are dispatched daily, the amount of detail in the emails can be changed on request     System Integrity Monitor - 24x7 Internal Monitor that checks all services and restarts them if they are down     SPRI - changes the priority of different processes in accordance to level of importance, hence increasing server performance     Secure and Optimize Apache (HTTP) - tweaks apache to perform better, and prevent unnecessary information from being easily seen     MySQL optimization - increases performance of MySQL     host.conf hardenening - prevent dns lookup poisoning & spoofing protection     nsswitch.conf modification - secure and optimize DNS lookups     sysctl.conf hardening - helps prevent TCP/IP stack from syn-flood attacks and other network abuses     FTP Hardening - upgrade and secure your ftp software     Removal of unused software - prevents exploits and wasted resources     Removal of old logs - regain wasted space by deleting old archived logs     Shell Fork Bomb/Memory Hog Protection - prevents a use