Background Process Killer
According cPanel in WHM...
Home /System Health /Background Process Killer
You can configure WHM to kill any of the following processes and send you an email when it finds one of them. Malicious users may run an IRC bouncer on their shell accounts even though this may be against your policy. WHM detects these processes correctly even if the bouncer is renamed (e.g. to something that appears non-malicious like “pine”, to give the impression that the user is just reading email).
Please check the names of any programs you do not want running on your server;
we recommend that you check them all since letting users run IRC bots and servers usually leads to denial-of-service attacks.
Processes
(v) BitchX
(v) bnc
(v) eggdrop
(v) generic-sniffers
(v) guardservices
(v) ircd
(v) psyBNC
(v) ptlink
(v) services
Keep Trusted users (optional)* with blank text...
And Click the Save Button.
Apache mod_userdir Tweak
Home /Security Center /Apache mod_userdir Tweak
Apache httpd’s mod_userdir makes URLs like “
http://example.com/~fred” resolve to the indicated user’s (for example, the user “fred”’s) primary web virtual host.
In the above scenario, the transferred data counts against the bandwidth limit for the user that owns “example.com”, not against “fred”’s bandwidth limit. This is often an undesirable behavior.
WHM’s mod_userdir Protection feature addresses this problem by restricting mod_userdir to URLs whose users own the URL’s domains.
Thick mark --> Enable mod_userdir Protection
Untick mark/blank all of the host for:
Exclude Protection option --> blank,
additional user --> blank.
And Click the Save Button.