Best Paid cPanel Alternatives

Best PAID cPanel Alternatives

With the recent changes to cPanel pricing structure, both providers and individuals are scrambling to look for alternative solutions to cPanel. Here are some of the better paid alternatives to cPanel that are affordable with reasonable pricing structure.

Direct Admin

DirectAdmin is touted as the closest comparable panel to cPanel. Although it is still lacking in some areas as compared to cPanel, such as in available plugins, it is probably the next best panel after cPanel. With the changes in the cPanel pricing structure, you can expect that many providers to be flooding over to DirectAdmin. Eventually, that means that development for DirectAdmin will be sped up in many ways.

The pricing for DirectAdmin is as shown below

DirectAdmin pricing structure
DirectAdmin pricing structure

Centos Web Panel (CWP)
Centos Web Panel is a relatively new panel as compared to other panels. It offers a free version, as well as a paid version CWP Pro. Its paid version, compared to other panels, is much more affordable. It has all the basic features a web panel needs and more, and is definitely great if you are an individual looking for a cPanel alternative. However, if you are a provider, it may not be the best solution for you.

The pricing for CWP Pro is as shown below

CWP pricing structure

Interworx

Interworx is an alternative solution to cPanel that works for providers. However, it is known to be quite buggy in the past, and I am not sure how this has changed. Nonetheless, it should have hopefully improved over the years.

The pricing structure for Interworx is as follow

Interworx pricing structure
Interworx pricing structure

 

If you are looking for free alternatives to cPanel, you may look here

 

Enjoyed the content ? Share it with your friends !

Analysis on VestaCP exploit

Analysis on VestaCP exploit

The first report of exploit was on April 07, 2018 2:56 pm on VestaCP’s official forum. The hackers seems to have gotten access to the server 2-3 weeks before and let their malware – which was a XorDDos variant, stay dormant till April 7. The hackers used the compromised systems to launch a Ddos attack to the ip below :

111.231.132.129 – ISP : Beijing Faster Internet Technology Co.,Ltd

It is crucial that you take down any servers that have VestaCP running immediately and do the following

– Check for the presence of malware

 Go to your /etc/cron.hourly folder and check for a file called gcc.sh

– Run an antivirus scan (clamav can pick this malware up)
– Reinstall if necessary

From the looks of it, nobody knows how the actual attackers compromised the systems and what expoit they have used to gain entry. Although the VestaCP team has patched a few security loopholes, it can’t be confirmed that those were the same entrypoint used by the hackers. Hence, it still poses a huge risk to continue using VestaCP.  It is recommended that if you need to manage your web server again, you should
1. Lockdown your server to specific ip address
2. Look to other control panels, if possible, commercial ones like CPanel as they have dedicated security review and response team.

Also, follow these threads to get updates on the current status of VestaCP

https://forum.vestacp.com/viewtopic.php?t=16556
https://www.digitalocean.com/community/questions/how-do-i-determine-the-impact-of-vestacp-vulnerability-from-april-8th-2018

Enjoyed the content ? Share it with your friends !