Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

160 total results found

SSH Configuration

SSH & Authentication

What is SSH? SSH, or Secure Shell, is a cryptographic network protocol used for secure communication over an unsecured network. It is widely used to manage and access remote servers securely. SSH provides strong authentication and encrypted data communication...

SELinux (Security Enhanced)

Vulnerabilities, Patching, and Security

==================================================================================== What is SELinux? SELinux is a kernel-level access control system. SELinux acts like a gatekeeper, enforcing rules about what users, programs, and services can access on a sy...

AppArmor

Vulnerabilities, Patching, and Security

==================================================================================== AppArmor is a high-level security system, primarily designed for use on Debian-based systems. AppArmor itself is installed on most new Debian systems, however, to customise ...

Security options, headers, ciphers, and TLS settings.

Server Software NGINX

==================================================================================== Security Options and Headers ------------------------------------------------------------------------------------------------------------------------------------------------...

Self Signed & Free Certificates

Vulnerabilities, Patching, and Security SSL

==================================================================================== What are self-signed certificates (OpenSSL)? Generated using OpenSSL: You can generate these certificates yourself without any cost. Not Trusted by Browsers: Browsers and...

LDAP (Lightweight Directory Access Protocol)

SSH & Authentication

LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory services over a network. It is designed to provide a standard way to store and retrieve hierarchical data structures, which can include information about users, grou...

UFW(Uncomplicated Firewall)

Vulnerabilities, Patching, and Security Firewalls & IPS (Intrusion Prevention S...

UFW is just a wrapper for iptables. UFW Service Check UFW status ufw status Enable UFW ufw enable Disable UFW ufw disable Enable/Disable Logging ufw logging on/off UFW preset rule options UFW may have preset rulesets that can be used for applica...

fstab & cryptab

Hardware Configuration & Performance Disks

fstab (File Systems Table) The fstab (file systems table) is a system configuration file (/etc/fstab) used to define how disk partitions, filesystems, and other storage devices should be mounted and integrated into the filesystem at boot time. Purpose of f...

Linux+
Linux +

Single User Mode

Boot, Kernel, Recovery, and Tunables

Boot the server into 'single user mode' B. Once in single user mode, we can look to initiate the fsck We will first need to check the filesystem type being used: get the device name: root@test:~# df Filesystem 1K-blocks Used Av...

remoteIP

cPanel

cPanel install the mod_remoteip Apache module via EasyApache in WHM Create the following file on the server: 1 vim /etc/apache2/conf.modules.d/370_mod_remoteip.conf In here, we need to enter the addresses for proxying, in t...

mod_remoteip

Server Software Apache

(SUCURI NOT CLOUDFLARE) Apache 2.4 and above usually comes with mod_remoteip installed, you just need to enable it. If you are using cPanel/WHM, mod_remoteip can be installed with "yum -y install ea-apache24-mod_remoteip". or via EA4 in WHM. Once mod_remote...

Binary Logging

Server Software MySQL

==================================================================================== Binary Logging ==================================================================================== What is Binary Logging? Binary logging in MySQL is a crucial feature fo...

Database Monitoring (New Relic)

Server Software MySQL

==================================================================================== What is New Relic? In the context of MySQL, New Relic provides monitoring and performance management capabilities through its Application Performance Monitoring (APM) and In...

CVE Vulnerabilities

Vulnerabilities, Patching, and Security Vulnerability Patching

Common Vulnerabilities and Exposures (CVE) is a system that provides a reference-method for publicly known information-security vulnerabilities and exposures. A CVE-ID follows the format "CVE-YYYY-NNNN", where "YYYY" is the year the CVE-ID was assigned or pub...

Rootkit Scans

Vulnerabilities, Patching, and Security Malware & Virus Scans

A rootkit is a collection of software tools that enable an attacker to gain root or administrative-level access to a computer or network and maintain this access covertly. ==================================================================================== c...

Malware Scans

Vulnerabilities, Patching, and Security Malware & Virus Scans

==================================================================================== ClamAV ClamAV is a widely used open-source antivirus engine designed for detecting viruses, malware, and other threats on Linux systems. ClamAV Usage Update the clamscan m...

MySQL Encryption

Server Software MySQL

Encryption Types in MySQL Data-at-Rest Encryption: Tablespace Encryption: Encrypts the entire tablespace, including the InnoDB tables. Column-Level Encryption: Encrypts specific columns in a table. Data-in-Transit Encryption: SSL/TLS Encrypt...

MySQL Remote Access

Server Software MySQL

==================================================================================== To configure remote access for MySQL, you need to ensure that MySQL is configured to accept remote connections and that your firewall and MySQL user permissions are set up co...

MTA & MDA

Mail

Mail Transfer Agent (MTA): This is responsible for sending and receiving emails between different mail servers. MTAs handle SMTP (Simple Mail Transfer Protocol) for sending emails and can also manage incoming email delivery. Examples of MTA: Postfix Exim ...

vSFTPd

File Transfers, Synchronisation & Share...

vsftpd (Very Secure FTP Daemon) is a popular FTP server for Linux systems. To use vSFTPd, you'll need to install the vsftpd package. ------------------------------------------------------------------------------------------------------------------------------...