Leech Protection

The Leech Protection feature in cPanel allows you to detect unusual levels of activity in password-restricted directories on your website

After you set the maximum number of logins within a two-hour period, the system redirects or suspends users who exceed that maximum.

 

 

Enable leech protection

To enable Leech Protect for a directory, perform the following steps:

1)The Leech Protect window will appear. Select which of the four main directories you wish to view in the file window:

• Home Directory /home/user

• Web Root /public_html/www

• Public FTP Root /public_ftp

• Document Root /public_html

2) Select the directory that you wish to protect.

• Click the appropriate folder icon () to navigate to a different folder

• Click the desired folder's name to select it

3) Enter the maximum number of logins that you wish to allow each user within a two-hour period.

4) To redirect users who exceed the maximum number of logins within a two-hour period, enter a URL to which you wish to redirect them.

5) To configure the system to send an email alert when Leech Protect activates, select the Send Email Alert To checkbox and enter the email address to alert.

6) To disable an account that exceeds the maximum number of logins within a two-hour period, select the Disable Compromised Accounts checkbox.

7) Click Enable.

Disable leech protection

To disable leech protection, perform the following steps:

1)The Leech Protect window will appear. Select which of the four main directories you wish to view in the file window:

• Home Directory /home/user

• Web Root /public_html/www

• Public FTP Root /public_ftp

• Document Root /public_html

2) Select the directory that you wish to protect.

3) Click the appropriate folder icon () to navigate to a different folder.

4) Click the desired folder's name to select it.

5) Click Disable.

Manage users

To add, edit, and delete users, click Manage Users to navigate to cPanel's Password Protect Directories interface
Home >> Security >> Password Protect Directories

  • 0 A felhasználók hasznosnak találták ezt
Hasznosnak találta ezt a választ?

Kapcsolódó cikkek

SSH Access

The SSH Access feature provides information about how to connect to another web server via the...

IP Blocker

The IP Blocker feature allows you to block access to your hosting account for one or more IP...

SSL/TLS

The SSL/TLS feature will allow you to generate and manage SSL certificates, signing requests, and...

Manage API Tokens

The API Tokens feature in cPanel lets you create, list, update, and revoke API Tokens. This...

Hotlink Protection

Hotlinking occurs when someone embeds content from your site in another site and uses your...