: Function WP_Styles::add was called incorrectly. The style with the handle "hello-elementor-child-style" was enqueued with dependencies that are not registered: hello-elementor-theme-style. Please see Debugging in WordPress for more information. (This message was added in version 6.9.1.) in /home/csrkub/domains/cube-vps.com/public_html/wp-includes/functions.php on line 6131
Notice: Function WP_Scripts::add was called incorrectly. The script with the handle "gpress-custom-js" was enqueued with dependencies that are not registered: gpress-siema. Please see Debugging in WordPress for more information. (This message was added in version 6.9.1.) in /home/csrkub/domains/cube-vps.com/public_html/wp-includes/functions.php on line 6131
*Cube-Host– full cloud services!!
One of the simplest yet most effective ways to improve server security is to change the default port for remote access protocols. Protocols such as SSH and RDP use well-known ports by default (22 and 3389, respectively). This makes them vulnerable to automated attacks and scanning. Changing these ports to non-standard ones can reduce the number of hacking attempts.
Please note: changing the port is not a means of protection against an experienced attacker, but a preventive measure.
By default, SSH runs on port 22. To change it:
Connect to the server via SSH:
ssh root@your_server_ip
Open the file /etc/ssh/sshd_config using a text editor, such as nano:
nano /etc/ssh/sshd_config
Find the line:
#Port 22
Remove the # symbol and replace the port number:
Port 2222
Replace 2222 with any other available port (for example, between 1025 and 65535).
Open the selected port in firewalld or iptables. Example for firewalld:
firewall-cmd --permanent --add-port=2222/tcp
firewall-cmd --reload
systemctl restart sshd
Perform a test connection with the new port:
ssh -p 2222 user@your_server_ip
Important! Do not close the current connection until you are sure that the new one is working.
By default, the RDP protocol uses port 3389. To change it, you will need to edit the registry.
Open regedit → go to:
HKEY_LOCAL_MACHINESystemCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp
Find the PortNumber parameter and open it. Select the Decimal representation type, then specify the new port number (for example, 3390).
Open access to the new port:
netsh advfirewall firewall add rule name="RDP Custom Port" protocol=TCP dir=in localport=3390 action=allow
You will need to restart your computer for the changes to take effect.
In the Remote Desktop Connection client, specify the port manually:
your_server_ip:3390
Changing to a non-standard port is a simple but effective security measure. It’s not a panacea, but it’s an excellent first step toward protecting your server from attacks. By properly configuring your SSH and RDP ports, you reduce the likelihood of automated hacking attempts and show that you care about the security of your environment.
Use this solution in conjunction with other security measures, and your server will be well protected.