Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

175 total results found

SSH Configuration

Linux SSH & Authentication

==================================================================================== What is SSH? SSH, or Secure Shell, is a cryptographic network protocol used for secure communication over an unsecured network. It is widely used to manage and access remote...

SELinux (Security Enhanced)

Linux Vulnerabilities, Patching, and Security

==================================================================================== What is SELinux? SELinux is a kernel-level access control system. SELinux acts like a gatekeeper, enforcing rules about what users, programs, and services can access on a sy...

AppArmor

Linux Vulnerabilities, Patching, and Security

==================================================================================== AppArmor is a high-level security system, primarily designed for use on Debian-based systems. AppArmor itself is installed on most new Debian systems, however, to customise ...

Security options, headers, ciphers, and TLS settings.

Linux NGINX

==================================================================================== Security Options and Headers ------------------------------------------------------------------------------------------------------------------------------------------------...

Self Signed & Free Certificates

Linux SSL

==================================================================================== What are self-signed certificates (OpenSSL)? Generated using OpenSSL: You can generate these certificates yourself without any cost. Not Trusted by Browsers: Browsers and...

LDAP (Lightweight Directory Access Protocol)

Linux SSH & Authentication

LDAP (Lightweight Directory Access Protocol) is a protocol used to access and manage directory services over a network. It is designed to provide a standard way to store and retrieve hierarchical data structures, which can include information about users, grou...

UFW

Linux Linux Firewalls

UFW (Uncomplicated Firewall) UFW is just a front for IPTables. ------------------------------------------------------------------------------------------------------------------------------------------------ Check UFW status ufw status Enable UFW ufw ena...

New Page

Linux Linux Firewalls

fstab

Linux Linux Filesystem (FHS), Storage Concept...

==================================================================================== fstab (File Systems Table) The fstab (file systems table) is a system configuration file (/etc/fstab) used to define how disk partitions, filesystems, and other storage devi...

Single User Mode

Linux Boot, Kernel, Recovery, and Tunables

Boot the server into 'single user mode' B. Once in single user mode, we can look to initiate the fsck We will first need to check the filesystem type being used: get the device name: root@test:~# df Filesystem 1K-blocks Used Av...

remoteIP

Linux cPanel

cPanel install the mod_remoteip Apache module via EasyApache in WHM Create the following file on the server: 1 vim /etc/apache2/conf.modules.d/370_mod_remoteip.conf In here, we need to enter the addresses for proxying, in t...

mod_remoteip

Linux APACHE

(SUCURI NOT CLOUDFLARE) Apache 2.4 and above usually comes with mod_remoteip installed, you just need to enable it. If you are using cPanel/WHM, mod_remoteip can be installed with "yum -y install ea-apache24-mod_remoteip". or via EA4 in WHM. Once mod_remote...

Binary Logging

Linux MySQL

==================================================================================== Binary Logging ==================================================================================== What is Binary Logging? Binary logging in MySQL is a crucial feature fo...

Database Monitoring (New Relic)

Linux MySQL

==================================================================================== What is New Relic? In the context of MySQL, New Relic provides monitoring and performance management capabilities through its Application Performance Monitoring (APM) and In...

CVE Vulnerabilities

Linux Vulnerabilities, Patching, and Security

Common Vulnerabilities and Exposures (CVE) is a system that provides a reference-method for publicly known information-security vulnerabilities and exposures. A CVE-ID follows the format "CVE-YYYY-NNNN", where "YYYY" is the year the CVE-ID was assigned or pub...

Rootkit Scans

Linux Vulnerabilities, Patching, and Security

A rootkit is a collection of software tools that enable an attacker to gain root or administrative-level access to a computer or network and maintain this access covertly. ==================================================================================== c...

Malware Scans

Linux Vulnerabilities, Patching, and Security

==================================================================================== ClamAV ClamAV is a widely used open-source antivirus engine designed for detecting viruses, malware, and other threats on Linux systems. ClamAV Usage clamscan [options] /p...

MySQL Encryption

Linux MySQL

Encryption Types in MySQL Data-at-Rest Encryption: Tablespace Encryption: Encrypts the entire tablespace, including the InnoDB tables. Column-Level Encryption: Encrypts specific columns in a table. Data-in-Transit Encryption: SSL/TLS Encrypt...