How to: Secure My Webserver in Linux
Find the HOWTO or step-by-step guide that you need right here.
Find the HOWTO or step-by-step guide that you need right here.
Protecting your web server is crucial for the security of your website and sensitive information. Linux servers are a popular choice among developers and businesses. Ninety-six percent of the top 1,000,000 web servers are Linux-based. Linux is a huge market force, and it is important to protect your data if you use it.
MariaDB is an open-source, relational database system that's widely used as a replacement for MySQL. It is a powerful database management system with strong security features and a flexible design. This makes it suitable for many applications. This tutorial will walk you through the installation of MariaDB on Ubuntu 24, a stable and recent release of one of the most popular Linux Distributions.
ZeroSSL is a free SSL certificate authority created by CodeNotary, a software company known for its immutability and blockchain solutions for data integrity.
For those seeking to bolster their server’s defenses against web-based threats, understanding “How to Install Modsecurity 2 with Apache on Ubuntu 22.04 Jammy Jellyfish or its older stable release Ubuntu 20.04 Focal Fossa” is paramount. ModSecurity, a leading open-source web application firewall (WAF), seamlessly integrates with the Apache HTTP Server.
MySQL and MariaDB are popular relational database management systems used for storing and managing data. The root user in MySQL and MariaDB has extensive privileges and control over the databases, making it a prime target for potential security breaches. It is crucial to change the root password regularly to enhance the security of your system. In this article, we will explore the step-by-step process of changing the root password of MySQL or MariaDB in Linux.
Looking for free-to-use tools to enumerate hidden directories and files on a web server? Here are the best Linux tools for directory bursting.
SELinux can make it a challenge to get newly installed or custom applications to run because it blocks them from having access to certain directories in the file system hierarchy. Instead of disabling SELinux, the better option is to configure the security system so applications and services can function as expected. This is especially important when you have an application or service that requires a nonstandard configuration.
When you want to quickly spin up a Linux server in the cloud, AWS EC2 is your best bet.
This tutorial explains how to improve the security of Nginx web servers running on Linux.
If you find yourself having to use Secure Shell to remote into multiple Linux servers throughout the day, you should consider using a config file to make your life considerably easier. In this tutorial, Jack Wallen shows you how.
Learn how to secure, harden and improve the performance of your Nginx web server in this Tecmint tutorial.
Learn how to use WPScan to scan WordPress for vulnerabilities on Kali Linux in this LinuxConfig.org guide.
This tutorial examines how to secure a FTP server using SSL/TLS in Ubuntu 16.04/16.10.
Learn how to setup passwordless SSH key-based authentication for multiple remote Linux servers simultaneously using a shell script in this TecMint tutorial.
Using SSH key-based authentication is beneficial for both security and convenience. Learn how to generate and share keys using ssh-keygen in this tutorial.
It is 2020, and we can say for sure, that ssh-server is still one of the most popular services on Linux systems. During various meetings, I was often asked: How to secure SSH? Even though this question seems trivial, it is not. There are a lot of things to remember to accomplish well-designed service security.
Linux is the most popular OS for web-facing computers, running on nearly 75% of servers according to Netcraft’s August 2019 data - making Linux servers an increasingly popular target among cyber criminals. This article offers tips and advice for securing your Linux servers against malware and other dangerous exploits.
Learn how to enable passwordless SSH authentication on Linux in this helpful tutorial.
Looking to secure and harden your OpenSSH server? Check out this tutorial, which provides valuable tips and advice on how this can be done.
If you’re managing a Linux server, you'll want to have a selection of commands that you can use to check user activity. This article examines some helpful commands that Linux server admins can use to view user activity.