BuycPanel Blog

BuycPanel Blog

Latest news and updates

How to Use the ‘Leech Protection’ Interface in cPanel.

Posted by Allura on 12 01 2018.

cPanel was developed by John Nick Koston and was released in the year 1996. It is a web hosting control panel. This Linux based consolidated platform provides an automation of tools and graphical interface to its user that makes the web hosting process easier. It creates a user-friendly atmosphere so that using a standard web browser the various features of the website and the administration of server can be done easily. The cPanel uses a framework that is 3 tier which helps the administrators, resellers, and end-user website owners to work efficiently and manage their website better.
What is ‘Leech Protection’ in cPanel?
The leech Protection in cPanel is a special feature that offers protection within the cPanel. It protects the website by restricting an unknown user to enter and  cause any unwanted activities there. The leech protection can also be used for domains too. It basically provides privacy to the website.…

cPanel was developed by John Nick Koston and was released in the year 1996. It is a web hosting control panel. This Linux based consolidated platform provides an automation of tools and graphical interface to its user that makes the web hosting process easier. It creates a user-friendly atmosphere so that using a standard web browser the various features of the website and the administration of server can be done easily. The cPanel uses a framework that is 3 tier which helps the administrators, resellers, and end-user website owners to work efficiently and manage their website better.

What is ‘Leech Protection’ in cPanel?

The leech Protection in cPanel is a special feature that offers protection within the cPanel. It protects the website by restricting an unknown user to enter and  cause any unwanted activities there. The leech protection can also be used for domains too. It basically provides privacy to the website. The software also restricts a user to enter any account using multiple passwords within a short span of time. The maximum default time set in the Leech protection is 2 hours. The unknown user can also be redirected to some other URL if they go over the maximum number of login attempts.

How to use the ‘Leech Protection’

There are a few steps that should be followed for enabling the Leech Protection software on the website. They are as follows:

  • Step 1

As the page opens, a list of web hosting HTML directory will appear. Click on the folder icon beside the name of the directory that you wants to protect.

  • Step 2

Click on the name of the directory which you want to protect.

  • Step 3

Thereafter in the “Number of login Per Username Allowed in a 2 hour period”, enter the exact number of times that you want a user to login using wrong passwords before it gets locked.

  • Step 4

The URL must be entered in the text box where “URL to Redirect Leech Users” will show.

  • Step 5

Thereafter if the owner wants to receive notification if anyone tries to enter the leech protected area, he must click on the “Send Email alert To” checkbox.

  • Step 6

In case the owner wants to deactivate the accounts that have already tried to access the areas that are  Leech protected, click on “Disable Compromised Accounts”.

  • Step 7

Eventually, enable the “Leech Protection” by clicking on the Enable option.

Conclusion

This is how the Leech Protection interface can be used in the cPanel. It also helps the users to add or remove users from the directory that are already password protected. If the owner wants to remove or deactivate the ” Leech Protection” then he has to follow the same steps and instead of clicking on Enable he has to click on “Disable Protection” button.