Advanced Search
Search Results
133 total results found
Hostname
Show current server hostname: hostname Show current server hostname, and other useful info: hostnamectl status example output: root@test:~# hostnamectl status Static hostname: test Icon name: computer-vm Chassis: vm Machine ID: ...
Partitions and Filesystems
==================================================================================== Partitions ------------------------------------------------------------------------------------------------------------------------------------------------ What is a partit...
Disk Performance
==================================================================================== I/O Schedulers In Linux, the I/O scheduler is responsible for determining the order in which block I/O operations are submitted to storage devices. The scheduler affects the...
rSync
==================================================================================== What is rSync? rSync is a file transfer command that can be used for both local and remote transfers. Remember to be careful with rSync - it's a synchronisation command and...
SSH Configuration
==================================================================================== What is SSH? SSH, or Secure Shell, is a cryptographic network protocol used for secure communication over an unsecured network. It is widely used to manage and access remote...
SELinux (Security Enhanced)
==================================================================================== What is SELinux? SELinux is a kernel-level access control system. SELinux acts like a gatekeeper, enforcing rules about what users, programs, and services can access on a sy...
AppArmor
==================================================================================== AppArmor is a high-level security system, primarily designed for use on Debian-based systems. AppArmor itself is installed on most new Debian systems, however, to customise ...
Security options, headers, ciphers, and TLS settings.
==================================================================================== Security Options and Headers ------------------------------------------------------------------------------------------------------------------------------------------------...
Self Signed & Free Certificates
==================================================================================== What are self-signed certificates (OpenSSL)? Generated using OpenSSL: You can generate these certificates yourself without any cost. Not Trusted by Browsers: Browsers and...
LDAP (Lightweight Directory Access Protocol)
LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory services over a network. It is designed to provide a standard way to store and retrieve hierarchical data structures, which can include information about users, grou...
UFW
UFW (Uncomplicated Firewall) UFW is just a front for IPTables. ------------------------------------------------------------------------------------------------------------------------------------------------ Check UFW status ufw status Enable UFW ufw ena...
New Page
fstab
==================================================================================== fstab (File Systems Table) The fstab (file systems table) is a system configuration file (/etc/fstab) used to define how disk partitions, filesystems, and other storage devi...
Single User Mode
Boot the server into 'single user mode' B. Once in single user mode, we can look to initiate the fsck We will first need to check the filesystem type being used: get the device name: root@test:~# df Filesystem 1K-blocks Used Av...
remoteIP
cPanel install the mod_remoteip Apache module via EasyApache in WHM Create the following file on the server: 1 vim /etc/apache2/conf.modules.d/370_mod_remoteip.conf In here, we need to enter the addresses for proxying, in t...
mod_remoteip
(SUCURI NOT CLOUDFLARE) Apache 2.4 and above usually comes with mod_remoteip installed, you just need to enable it. If you are using cPanel/WHM, mod_remoteip can be installed with "yum -y install ea-apache24-mod_remoteip". or via EA4 in WHM. Once mod_remote...
Binary Logging
==================================================================================== Binary Logging ==================================================================================== What is Binary Logging? Binary logging in MySQL is a crucial feature fo...
Database Monitoring (New Relic)
==================================================================================== What is New Relic? In the context of MySQL, New Relic provides monitoring and performance management capabilities through its Application Performance Monitoring (APM) and In...
CVE Vulnerabilities
Common Vulnerabilities and Exposures (CVE) is a system that provides a reference-method for publicly known information-security vulnerabilities and exposures. A CVE-ID follows the format "CVE-YYYY-NNNN", where "YYYY" is the year the CVE-ID was assigned or pub...
Rootkit Scans
A rootkit is a collection of software tools that enable an attacker to gain root or administrative-level access to a computer or network and maintain this access covertly. ==================================================================================== c...