Category: Security & Privacy

Keeping safe

911 emergency services go down across the US after CenturyLink outage

911 emergency services in several states across the U.S. remain down after a massive outage at a CenturyLink data center. The outage began after 12pm ET on Thursday, according to CenturyLink’s status page, and continues to cause disruption across 911 call...

/ 29/12/2018

How to Configure and Use PAM in Linux

Linux-PAM (short for Pluggable Authentication Modules which evolved from the Unix-PAM architecture) is a powerful suite of shared libraries used to dynamically authenticate a user to applications (or services) in a Linux system. It integrates multiple low-level authentication modules into...

/ 11/12/2018

How to Enforce Secure Passwords on Your WordPress Website

We’re willing to bet that you probably know all about using secure passwords for your WordPress admin account. However, you can’t take for granted that other users will do the same. To make sure your site remains safe, you’ll want...

/ 11/12/2018

How to Access a Remote Server Using a Jump Host

A jump host (also known as a jump server) is an intermediary host or an SSH gateway to a remote network, through which a connection can be made to another host in a dissimilar security zone, for example a demilitarized...

/ 29/11/2018

How to Install, Configure and Use Firewalld in CentOS and Ubuntu

Firewalld (firewall daemon) is an alternative to the iptables service, for dynamically managing a system’s firewall with support for network (or firewall) zones and provides a D-Bus interface for managing configurations. It’s easy to use and configure, and it’s now...

/ 22/11/2018

Announcing the vSphere 6.7 Update 1 Security Configuration Guide

Back in March I released the vSphere 6.5 Update 1 Security Configuration Guide (a.k.a “The SCG”). At that time, I went in to detail on more than just the guide. I covered the topic of why some guidelines are removed...

/ 02/11/2018

How to Use Fail2ban to Secure Your Linux Server

Improving your server security should be one of your top priorities, when it comes to managing a linux server. By reviewing your server logs, you may often find different attempts for brute force login, web floods, exploit seeking and many...

/ 09/10/2018

Install and Configure ConfigServer Security & Firewall (CSF) in Linux

If you look at IT-related job postings anywhere, you will notice a steady demand for security pros. This does not only mean that cybersecurity is an interesting field of study, but also a very lucrative one. With that in mind,...

/ 07/09/2018

5 Tools to Scan a Linux Server for Malware and Rootkits

There are constant level of high attacks and port scans on Linux servers all the time, while a properly configured firewall and regular security system updates adds a extra layer to keep the system safe, but you should also frequently...

/ 09/08/2018

Cryptmount – A Utility to Create Encrypted Filesystems in Linux

Cryptmount is a powerful utility which allows any user to access encrypted filesystems on-demand under GNU/Linux systems without requiring root privileges. It requires Linux 2.6 or higher. It handles both encrypted partitions as well as encrypted files. It makes it...

/ 19/02/2018

How to Change FTP Port in Linux

FTP or File Transfer Protocol is one of the oldest network protocol used today as standard file transfers over computer networks. FTP protocol uses the standard port 21/TCP as command port. Although, there are a lot of implementations of FTP...

/ 27/01/2018

How to Block Ping ICMP Requests to Linux Systems

Some system administrators often block ICMP messages to their servers in order to hide the Linux boxes to outside world on rough networks or to prevent some kind of IP flooding and denial of service attacks. The most simple method...

/ 24/01/2018

How to Check and Patch Meltdown CPU Vulnerability in Linux

Meltdown is a chip-level security vulnerability that breaks the most fundamental isolation between user programs and the operating system. It allows a program to access the operating system kernel’s and other programs’ private memory areas, and possibly steal sensitive data,...

/ 17/01/2018

How to Check Integrity of File and Directory Using “AIDE” in Linux

In our mega guide to hardening and securing CentOS 7, under the section “protect system internally”, one of the useful security tools we listed for internal system protection against viruses, rootkits, malware, and detection of unauthorized activities is AIDE. AIDE...

/ 30/11/2017