May 2024
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  

Categories

May 2024
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  

SSH Hardening

 

SSH Hardening Top 20 OpenSSH Server Best Security Practices OpenSSH is the implementation of the SSH protocol. OpenSSH is recommended for remote login, making backups, remote file transfer via scp or sftp, and much more. SSH is perfect to keep confidentiality and integrity for data exchanged between two networks and systems. However, the main […]

Linux Server Hardening TIPS

Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system.

#1: Encrypt Data Communication […]

Avoid hackers hacking linux

Avoid hackers hacking linux

Apply Latest OS Patches

All Linux servers running Red Hat are patched at least twice a year.

Configure SSH (server) Settings: Protocol 2 # Default LogLevel INFO # Default PermitRootLogin no HostbasedAuthentication no # Default IgnoreRhosts yes # Default AllowTcpForwarding no PermitTunnel no # Default Banner /etc/issue

Description:

The settings are […]

Configuring TCP Wrappers for Linux Security

Configuring TCP Wrappers

 

The TCP Wrappers package is installed by default on Fedora Linux and provides host-based security separate from that provided by a firewall running on the server itself or elsewhere. The application relies on two main files:

/etc/hosts.allow: Defines the hosts and networks allowed to connect to the server. The TCP Wrappers […]

Prevent Bruteforce attacks with Fail2ban

Prevent Bruteforce attacks with Fail2ban

Vigilant system administrators will notice many failed login attempts on their internet connected servers. While its good to know that you are preventing these logins, they are filling your logs and potentially making it harder to see other problems. Additionally, these failed logins are taking up bandwidth and likely trying […]

Encrypt Files Using GnuPG

Encrypt Files Using GnuPG

HowTo we will discuss to encypt files using GnuPG. Encryption is a method which protect data stored on your computer or sending over the network from compromise. It can be used to ensure and verify data comes from a rightful owner, and also to maintain confidentiality of the data. We will […]

Nmap Command

Nmap Command

User can scan entire network or selected host or single server. Nmap is also useful to test your firewall rules. namp is metwork exploration tool and security / port scanner. According to nmap man page: It is an open source tool for network exploration and security auditing. It was designed to rapidly scan […]

Port scanning with netcat (nc) command

Port scanning with netcat (nc) command

How do I find out which ports are opened on my own server? How do I run port scanning using nc command?

A. It may be useful to know which ports are open and running services on a target machine. You can use nmap command for port scanning.

[…]

LMD (Linux Malware Detect) on centos server

LMD (Linux Malware Detect) on centos server

Homepage: http://www.rfxn.com/projects/linux-malware-detect/ Description: Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used […]