WINNERvps provides 3 (three) account types:
- CLIENT AREA account (using an e-mail address as the username)
- WINDOWS VPS ADMINISTRATOR account (using Administrator as the username)
- VPS Control Panel account (using the format winnerxxx = numbers as the username)
These 3 (three) accounts will be sent to you by e-mail by the time of the VPS activation (can be also obtained at the CLIENT AREA -> MY E-MAIL).
In order to secure a VPS, besides the above-mentioned parameters, there are also 4 (four) other things which have to be considered, they are:
- Windows Administrator Password (same as the No. 2 mentioned above)
- VNC Password
- RDP Port (default: 3389)
- File encryption
A). Changing the Windows Administrator Password
Windows Administrator Password, easy and often seen (or probably often replaced).
B). Changing VNC Password
VNC Password, perhaps for some, may heard VNC for the first time.
In short: VNC is the Linux version of VPS access. Since the Windows VPS we developed is running “on top of” Linux, a VNC password is absolutely has to be considered (may be changed as well).
Usually, a VNC password can be located in the VPS Control Panel menu. Contact your VPS provider to find out about the link to access the VPS Control Panel, since each VPS provider is generally different one to another. Examples of VPS Control Panel: HyperVM, VMware, SolusVM, vePortal etc
.
Make sure to alter these two parameters regularly (password for Windows Administrator and VNC), with an adequate level of difficulty. And please take note, if the password has been changed without any intervention (and/or confirmation) by you, then it means that there’s a possibility that the ‘the admin’ has altered it for certain purposes or the VPS has been compromised. Please visit https://cp.winnervps.com (WINNERvps VPS Control Panel).
C). Changing RDP Port (for advanced users only!)
One important thing, which is usually being forgotten, is that if someone knows an IP address of another person’s VPS, that “person” would have the ability to establish a connection to the specific VPS, even though the person (the potential intruder) may
not know the Windows Administrator password yet, it doesn’t mean that he/she can’t obtain one, since it is not that difficult to break a Windows Administrator password (don’t believe it?)
Another trick to protect a VPS from this case is by changing the default connection port which is usually being used by the RDP (Remote Desktop Program) to connect to the VPS (the default RDP port is 3389), with another port of your own choice (in this example, being changed to port 3398 dari 3389), which is as follow:
1.Edit Registry
• Run regedit (Start >> Run >> regedit
• Browse and Find HKEY_LOCAL_MACHINE >> System >> CurrentControlSet >> Control >> TerminalServer >> WinStations >> RDP-Tcp >> Port Number
•Change it with your own choice (try to replace the port with the same 4 digit port number). Please note that the numbering format is Decimal (not Hex)
•Replace “0000D3D” (3389) with the desired port number (use the following converter >> http://www.binaryhexconverter.com/decimal-to-hex-converter) to change, for example, port 1234 becomes hex = “000004D2”.
2.Changing the Firewall according to the RDP PortDon’t forget to activate the Firewall to open the particular port (for yourself to be able to connect to the VPS)
•Click Network Connection (Start > Network Connection)
•Right-click LAN and choose PROPERTIES.
• Then, choose the ADVANCED Tab and click SETTINGS.
• Next, on the following screen, choose the EXCEPTION Tab and click ADD PORT.
• Enter the Name (of your own choice), and Port Number (representing the new port number, according to the one that we replaced earlier)
3.Restart VPS
• Connect to the VPS, using the specific port, by adding a semicolon symbol and the number of the port itself (example: xxx.164.73.132:3398)
File Encryption
One of the ways to secure data from being accessed by irresponsible parties, especially those are commonly being named as hackers and crackers, besides changing RDP port (from the default: 3389, as being described previously on this tutorial), is utilizing the file encryption technology.
Surely, before we discuss more further on what and why we do file encryption, it’s good that we firstly become familiar on some threat techniques and tricks (hacking and cracking) which come along with the use of a VPS, so by knowing the thesis, at least, we will become more aware knowing the anti-thesis, which is:
- Brute force attack. Commonly used to gain access to a VPS. The attackers would run a string of possible password combination, randomly within a period of time, continuously and constantly. This brute force attack is not only being done to the Windows itself, instead, it is also being executed to the programs installed within the Windows.
- Portscan and Cross-site port attack.
- Backdoor. To gain access, usually hackers are using hidden codes which are installed in a VPS. Or, could be also in the Windows system file that has been infiltrated. This type of access is commonly called by the name of backdooring.
- Injection (remote or local file processing attack). Similar to backdooring.
- Exploit (vulnerability insertion)
What is Encryption?
Encryption is the process of files/data encoding (scrambling) in such way, where afterwards they are not directly accessible.
The purpose of file encryption:
Protection of illegal access of some data in a hard drive or in some sort of media storage.