<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ModulesGarden Blog &#187; scanner</title>
	<atom:link href="https://www.blog.modulesgarden.com/tag/scanner/feed" rel="self" type="application/rss+xml" />
	<link>https://www.blog.modulesgarden.com</link>
	<description>Where Creativity Meets Technology</description>
	<lastBuildDate>Thu, 16 Apr 2026 11:45:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Take Care Of Your WHMCS!</title>
		<link>https://www.blog.modulesgarden.com/whmcs-analyzer</link>
		<comments>https://www.blog.modulesgarden.com/whmcs-analyzer#comments</comments>
		<pubDate>Wed, 24 Feb 2016 19:40:26 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[free]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WHMCS]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=2594</guid>
		<description><![CDATA[You use it every single day. Hundreds of your business undertakings are carried out with the aid of it on a daily basis. The sustained operation of your entire company depends on its seamless performance. So how exactly can you &#8230; <a href="https://www.blog.modulesgarden.com/whmcs-analyzer">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">You use it every single day. Hundreds of your business undertakings are carried out with the aid of it on a daily basis. The sustained operation of your entire company depends on its seamless performance. So how exactly can you protect the health of your WHMCS?<strong><span id="more-2594"></span></strong></p>
<p style="text-align: justify;"><strong style="text-align: justify;">WHMCS Analyzer</strong> has been created to help you monitor the shape of your technical infrastructure in a very detailed fashion. The script has been armed with a wide scope of advanced algorithms to scan your system and server environment from every angle possible. This way, you can easily determine its current status and address any suspicious aspects before they inflict any damage to your business. The examination outcome will also prove useful for assessing to what extend your WHMCS has been modified, i.e. how many custom files it contains.</p>
<p style="text-align: justify;"><a href="https://www.blog.modulesgarden.com/wp-content/uploads/2016/02/ModulesGarden-WHMCS-Analyzer-Server-Environment.png"><img class="alignnone  wp-image-2598" src="https://www.blog.modulesgarden.com/wp-content/uploads/2016/02/ModulesGarden-WHMCS-Analyzer-Server-Environment.png" alt="ModulesGarden WHMCS Analyzer - Server Environment" width="993" height="1068" /></a></p>
<p style="text-align: justify;">Download the script <strong><span style="color: #6198fd;">entirely for FREE</span></strong> to keep a finger on the pulse of your system operation and run your business without any risk of technical failure!</p>
<p style="text-align: justify;"><span style="display: block; text-align: center;"><a style="text-decoration: none; display: inline-block; margin: 28px 0px 28px 0px;" href="http://www.modulesgarden.com/products/whmcs/whmcs_analyzer/features"><span style="-webkit-border-radius: 3px; -moz-border-radius: 3px; border-radius: 3px; background: #6198fd; color: #ffffff; padding: 15px 20px; text-decoration: none;"><strong>Learn More!</strong></span></a></span></p>
<div id="balloon_parent_div_ab" class="kisb" style="visibility: hidden; position: absolute; left: 333px; top: 307px;">
<div class="kl_abmenu">Dodaj do listy blokowanych banerów</div>
</div>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/whmcs-analyzer/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Practical Tips To Defend Against DDoS Attacks</title>
		<link>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks</link>
		<comments>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks#comments</comments>
		<pubDate>Wed, 29 Apr 2015 14:03:27 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tutorial]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1834</guid>
		<description><![CDATA[Imagine your average day at work. Managing orders, monitoring transactions, providing services, just as usual&#8230; but then, out of nowhere, your website has just disappeared and all orders and services have gone down. If something like this happens to you, &#8230; <a href="https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">Imagine your average day at work. Managing orders, monitoring transactions, providing services, just as usual&#8230; but then, out of nowhere, your website has just disappeared and all orders and services have gone down. If something like this happens to you, then there is a strong possibility that you have become yet another victim of  Distributed Denial of Service (DDoS) attack.<strong><span id="more-1834"></span></strong></p>
<p style="text-align: justify;">DDoS attacks have become one of the most common disastrous attacks on the Internet. The number of attacks along with their size and intensity has increased substantially: in the space of just last year 57% rise in total DDoS attacks have been reported. That is why we want to share with you some of practical tips to defend against DDoS attacks and actions worth taking while experiencing the attack to minimize losses:</p>
<p style="text-align: justify;"><strong>1.</strong> One of the well-known approaches to handling DDoS attacks is over-provisioning. In order to scotch the attack and reduce its impact on your clients you need to provision for far more traffic than you usually expect to receive. How much should be enough? Estimate the largest amount of traffic that you have ever had, multiply it by ten and adapt your hardware infrastructure to cope with this level of traffic. It will make much more difficult for an attacker to generate enough traffic to bring down your company&#8217;s network.</p>
<p style="text-align: center;"><img class="size-full wp-image-1835 aligncenter" src="https://www.blog.modulesgarden.com/wp-content/uploads/2015/03/DDoS-Attacks-In-Q4-2014-Per-Country.png" alt="DDoS Attacks In Q4 2014 Per Country" width="534" height="480" /></p>
<p style="text-align: justify;"><strong>2.</strong> If you are experiencing DDoS attack you need to consider disconnect<span style="font-size: medium;">ing</span><span style="font-size: medium;"> from a network. It will result in </span><span style="font-size: medium;">taking your business off-line and </span><span style="font-size: medium;">cutting off access to all your products and services but at the same time it will prevent from further utilizing network resources.</span></p>
<p style="text-align: justify;"><strong>3.</strong> Additionally, you can perform DNS redirection by changing an &#8220;A&#8221; record which provides servers with the IP address of your domain. Keep in mind that you have to notify your clients about it so they can enter new IP address in order to keep using services of current network provider. This method is as effective as quickly DNS propagation is proceeded. It may take even a few hours and often requires a direct contact with a hosting service provider.</p>
<p style="text-align: justify;"><strong>4.</strong> IP addresses are cached by servers around the world for a specific period of time (measured in seconds) which is known as &#8220;Time to live&#8221; (TTL). Usually, default TTL value is 86400 seconds (24 hours), which may be far too long if you are under DDoS attack. You can reduce losses by controlling TTL value: the shorter TTL value, the quicker you will be able to redirect all web site requests to a new IP address. You need to, however, bear in mind that shorter TTL value means more frequent requests which, in turn, increases the load on your DNS host.</p>
<p style="text-align: justify;"><strong>5.</strong> Changing DNS or even migrating to another server may be not sufficient to completely resolve the problem. If an attacker finds out what your intentions are, the attack will be redirected to a new target and everything may start all over again. Therefore, it is also worth giving some thought to cloud-based traffic scrubbing services which are able to quickly filter out malicious software from data stream. Data cleansing service providers are the first line of defence against high-volume DDoS attacks &#8211; they have sufficient bandwidth and proper tools to filter network traffic which stems DDoS packets within the cloud and pass normal traffic to the company network.</p>
<p style="text-align: center;"><img class=" wp-image-1836 aligncenter" title="DDoS Attacks In Q4 2014 Per Industry" src="https://www.blog.modulesgarden.com/wp-content/uploads/2015/03/DDoS-Attacks-In-Q4-2014-Per-Industry.png" alt="" width="533" height="532" /></p>
<p style="text-align: justify;"><strong>6.</strong> You may also take into consideration some additional services, such as CloudFlare. They monitor network traffic and collect data that are used as a basis to assess the risk of possible attacks. Thanks to this, each attack attempt is thwarted before it does any damage. What is more, in case of a serious attack, they are able to restore a webpage and revert back any negative changes using previously made backup files. This way, users may not even notice the malfunction.</p>
<p style="text-align: justify;">Destructive power of DDoS attacks cannot be disregarded. <span style="font-size: medium;">Every company needs to ensure its</span> sustained operation <span style="font-size: medium;">and resource availability by remaining vigilant and taking all possible measures </span><span style="font-size: medium;">to mitigate the risk of </span><span style="font-size: medium;">being hit before it happens.</span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
