The Firewall System is an advanced Paid2Stream security system that you can use to protect your Paid2Stream website and apps from intrusions and hacker attacks. It has everything you need to easily maintain a secure protected platform for your members.

Features

  • Backend Password - Add an extra layer of security by typing in a password before logging in the administration!
  • Blacklist - Easily Block unwanted IP addresses.
  • Whitelist - Easily whitelist ip's of trusted users
  • Automagically stop brute-force login attempts
  • Automagically record a list of login attempts (as well as incorrect passwords).
  • Malware database - Automatically detects obfuscated and encoded attacks as well as potentially dangerous files (eg. base64encode, eval, gzinflate, pregreplace /e)
  • Automatically drop dangerous files when they're uploaded - such as .php, .js, .exe, .com, .bat, .cmd
  • Easily Disable the creation of new Administrators
  • Protect selected Administrators from any changes - including password change!
  • Log all security events and send messages to specified email address(es) to notify administrators
  • Disable protections based on User Agent, URL or System (regular expressions allowed).
  • Database Check - Optimize & repair your database tables.
  • Display CAPTCHA in the administration section after a predefined number of failed login attempts

Active Protections

  • Country blocking - Allows you to select which countries have access to your Paid2Stream website and apps (also blocks anonymous proxies). Based on GeoIP Lite Country database.
  • Local file inclusion (LFI)
  • Remote file inclusion (RFI)
  • SQL injection (SQLi)
  • HTML, Javascript and CSS filtering (XSS)
  • Denial of Service (DoS) - Block unwanted User Agents
  • Automatically blacklist bad ips
  • Actively scans POST and GET variables.
  • Keeps an eye on sensitive Paid2Stream files and alerts you if they are changed.

System Check

  • Provides suggestions on how to tighten your PHP & Paid2Stream configuration.
  • Scan Paid2Stream core files for integrity.
  • Scan files and folders for common permission errors.
  • Scan files for common malware.

Search

Latest Comments