Advanced Search
Search Results
160 total results found
SSH Configuration
What is SSH? SSH, or Secure Shell, is a cryptographic network protocol used for secure communication over an unsecured network. It is widely used to manage and access remote servers securely. SSH provides strong authentication and encrypted data communication...
SELinux (Security Enhanced)
==================================================================================== What is SELinux? SELinux is a kernel-level access control system. SELinux acts like a gatekeeper, enforcing rules about what users, programs, and services can access on a sy...
AppArmor
==================================================================================== AppArmor is a high-level security system, primarily designed for use on Debian-based systems. AppArmor itself is installed on most new Debian systems, however, to customise ...
Security options, headers, ciphers, and TLS settings.
==================================================================================== Security Options and Headers ------------------------------------------------------------------------------------------------------------------------------------------------...
Self Signed & Free Certificates
==================================================================================== What are self-signed certificates (OpenSSL)? Generated using OpenSSL: You can generate these certificates yourself without any cost. Not Trusted by Browsers: Browsers and...
LDAP (Lightweight Directory Access Protocol)
LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory services over a network. It is designed to provide a standard way to store and retrieve hierarchical data structures, which can include information about users, grou...
UFW(Uncomplicated Firewall)
UFW is just a wrapper for iptables. UFW Service Check UFW status ufw status Enable UFW ufw enable Disable UFW ufw disable Enable/Disable Logging ufw logging on/off UFW preset rule options UFW may have preset rulesets that can be used for applica...
fstab & cryptab
fstab (File Systems Table) The fstab (file systems table) is a system configuration file (/etc/fstab) used to define how disk partitions, filesystems, and other storage devices should be mounted and integrated into the filesystem at boot time. Purpose of f...
Single User Mode
Boot the server into 'single user mode' B. Once in single user mode, we can look to initiate the fsck We will first need to check the filesystem type being used: get the device name: root@test:~# df Filesystem 1K-blocks Used Av...
remoteIP
cPanel install the mod_remoteip Apache module via EasyApache in WHM Create the following file on the server: 1 vim /etc/apache2/conf.modules.d/370_mod_remoteip.conf In here, we need to enter the addresses for proxying, in t...
mod_remoteip
(SUCURI NOT CLOUDFLARE) Apache 2.4 and above usually comes with mod_remoteip installed, you just need to enable it. If you are using cPanel/WHM, mod_remoteip can be installed with "yum -y install ea-apache24-mod_remoteip". or via EA4 in WHM. Once mod_remote...
Binary Logging
==================================================================================== Binary Logging ==================================================================================== What is Binary Logging? Binary logging in MySQL is a crucial feature fo...
Database Monitoring (New Relic)
==================================================================================== What is New Relic? In the context of MySQL, New Relic provides monitoring and performance management capabilities through its Application Performance Monitoring (APM) and In...
CVE Vulnerabilities
Common Vulnerabilities and Exposures (CVE) is a system that provides a reference-method for publicly known information-security vulnerabilities and exposures. A CVE-ID follows the format "CVE-YYYY-NNNN", where "YYYY" is the year the CVE-ID was assigned or pub...
Rootkit Scans
A rootkit is a collection of software tools that enable an attacker to gain root or administrative-level access to a computer or network and maintain this access covertly. ==================================================================================== c...
Malware Scans
==================================================================================== ClamAV ClamAV is a widely used open-source antivirus engine designed for detecting viruses, malware, and other threats on Linux systems. ClamAV Usage Update the clamscan m...
MySQL Encryption
Encryption Types in MySQL Data-at-Rest Encryption: Tablespace Encryption: Encrypts the entire tablespace, including the InnoDB tables. Column-Level Encryption: Encrypts specific columns in a table. Data-in-Transit Encryption: SSL/TLS Encrypt...
MySQL Remote Access
==================================================================================== To configure remote access for MySQL, you need to ensure that MySQL is configured to accept remote connections and that your firewall and MySQL user permissions are set up co...
MTA & MDA
Mail Transfer Agent (MTA): This is responsible for sending and receiving emails between different mail servers. MTAs handle SMTP (Simple Mail Transfer Protocol) for sending emails and can also manage incoming email delivery. Examples of MTA: Postfix Exim ...
vSFTPd
vsftpd (Very Secure FTP Daemon) is a popular FTP server for Linux systems. To use vSFTPd, you'll need to install the vsftpd package. ------------------------------------------------------------------------------------------------------------------------------...