Tag: Security

How to Setup Two-Factor Authentication For SSH In Linux

By default, SSH already uses secure data communication between remote machines, but if you want to add some extra security layer to your SSH connections, you can add a Google Authenticator (two-factor authentication) module that

How To Set Correct SSH Directory Permissions in Linux

For SSH to work well, it requires correct permissions on the ~/.ssh or /home/username/.ssh directory: the default location for all user-specific ssh configuration and authentication files. The recommended permissions are read/write/execute for the user, and

Top PHP Hardening Security Tips for Linux Servers

It’s no brainier that PHP is one of the most used server scripting programming languages. It makes sense for an attacker to find various ways by which he can manipulate PHP as it is often

20 Useful Security Features and Tools for Linux Admins

In this article, we shall a list of useful Linux security features that every system administrator should know. We also share some useful tools to help a system admin ensure security on their Linux servers.

7 Useful Linux Security Features and Tools for Beginners

The primary use of computers in any form, whether it’s a mobile phone, personal computer, or a workstation, or a server offering services on the internet, is for the storage and manipulation of data and

How to Block SSH Brute Force Attacks Using SSHGUARD

SSHGuard is an open-source daemon that shields hosts from brute-force attacks. It accomplishes this through monitoring and aggregation of system logs, detecting attacks, and blocking attackers using one of the Linux firewall backends: iptables, FirewallD,

How to Set a Custom SSH Warning Banner and MOTD in Linux

SSH banner warnings are necessary when companies or organizations want to display a stern warning to discourage unauthorized parties from accessing a server. These warnings are displayed just before the password prompt so that unauthorized

How to Install ModSecurity for Nginx on Debian/Ubuntu

It is every developer’s desire to deploy secure web applications which are safe from threats. On most occasions, this is effortless said than done. The frequency of websites being hacked keeps rising as hackers continue

How to Secure Apache with Let’s Encrypt SSL Certificate on CentOS 8

Securing your web server is always one of the key factors that you should consider before going live with your website. A security certificate is critical for securing traffic sent from web browsers to web

How to Install Fail2ban on Rocky Linux and AlmaLinux

Written in Python, Fail2ban is a free and open-source Intrusion Prevention System (IPS) that protects the server against brute-force attacks. After a specified number of incorrect password attempts, the client’s IP address is banned from