Port Knocking Server and Securing SSH connection for CentOS 7
In this guide, you'll learn how to use Port Knocking Daemon "knockd" to secure SSH Connection and Hardening you server.
View ArticleFree SSL Certificate
Let’s Encrypt, and StartSSL will give you SSL Domain Validation ( Known as Class 1 Validation ) certificates for free
View ArticleHow to Centos Mitmproxy Installation and Configuration
Introduction Mitmproxy is an interactive man-in-the-middle proxy for HTTP and HTTPS with a console interface. Features Intercept HTTP & HTTPS requests and responses and modify them on the fly Save...
View ArticleOptimizing nginx reverse proxy
nginx nginx is a small and fast webserver which generally outperforms most of the alternatives out of the box, however there is always room for improvement. In addition to operating as a web-server...
View ArticleSCP Command line tool
scp scp is the command-line tool included with the OpenSSH suite of tools, it is designed to securely transfer files to and from remote hosts. Compression If you add the following to ~/.ssh/config your...
View ArticleApache way to prevent bad bots from stealing your bandwidth
Introduction If you are amongst those Website owners who never look into access_log still notice that your Website is slow then there is serious rethinking to do. Internet is flooded with variety of...
View ArticleApache Virtual Hosts permissions
One thing that can cause concern and configuration headaches is virtual hosts permissions. Reminder A quick reminder of the layout used in these articles: All the vhosts directories are place in the...
View ArticleUmask and unusual file permissions and types
In this last entry in our series on Linux file permissions we look at the umask and some more advanced file permissions. We also throw in some discussion of other file types you may see in a directory...
View ArticleCapturing Packets with Tcpdump
Tcpdump is a powerful network debugging tool which can be used for intercepting and displaying packets on a network interface. Moreover, only interested packets can be displayed by using its filtering...
View ArticleSecurity Checks During Possible Compromise – Part 1
We are not living in a perfect world, and it is possible for a VPS/Servers to get hacked. However, we can find the culprit and make sure it won't happen again. In this article we will learn some...
View ArticleScanning for rootkits with chkrootkit
Up-to-date and secure installations, firewalls, limited ssh access and strong passwords are all basic and essential aspects of security. But what about the content of your VPS/Server? One method of...
View ArticleScanning for rootkits with rkhunter
Continuing with the scanning for rootkits articles, we now concentrate on installing and configuring rkhunter. Rkhunter works in the same manner as chkrootkit (see this article) but rkhunter also scans...
View ArticleSecurity Checks During Possible Compromise – Part 2
Continuing on checking your VPS/Server for possible security compromises.
View ArticleFail2ban
In this article you will learn how to install and configure fail2ban, a security tool that can help protecting your VPS/Server from brute force attacks.
View ArticlePutty SSH – SOCKS Proxy
When browsing the Internet or sending mail when away from your home computer, there is no real way of ensuring it is secure.
View ArticlePutty SSH – Password-less & timeouts
This article will take you through generating RSA keys using PuTTYgen on Windows for secure SSH connection, settings Putty password-less SSH login,and settings timeouts for connection session.
View ArticleFinding Php Shell Scripts In Your Website
PHP vulnerabilities are the norm, there is not much that can be done to prevent uploads of malicious files on a PHP site when there are world writable directories especially when your website is using...
View ArticleApache Secure Website With Writable 777 Directories
Content management, forum and other website software often require directories that are writable in order to function properly.
View ArticleBuilding SoftEther VPN L2TP/IPSec PPTP Docker Container
Initialize Ubuntu Host Device and Set Up a Basic Firewall Working on Ubuntu 16.04 sever. (login as root). # apt-get update # apt-get install ufw Enable ufw IPv6 make sure IPV6=yes into the file...
View ArticleHow to disable PING response in Linux
At some server hardening situation, we may need to disable the PING response, and we can do it as the following.
View Article