Linux Tutorials on the topic “security”
-
How to create a Jailed SSH User with Jailkit on Debian 9 (Stretch)
Author: Srijan Kishore • Tags: debian, linux, security • Comments: 2This document describes how to install and configure Jailkit in Debian 9 Server. Jailkit is a set of utilities to limit user accounts to specific files using chroot() and or specific commands. Setting up a chroot shell, a shell limited to some specific command, or a daemon inside a chroot jail is a lot easier and can be automated using these utilities.
-
How to Install OpenVPN Server and Client with Easy-RSA 3 on CentOS 7
Author: Muhammad Arul • Tags: centos, linux, networking, security • Comments: 14OpenVPN is an open source application that allows you to create a secure private network over the public internet. In this tutorial, we will show you how to step-by-step install and configure OpenVPN on CentOS 7.6. And we will implement the certificate-based OpenVPN authentication.
-
How to install Fail2Ban on CentOS 7
Author: Antonio Valencia • Tags: centos, linux, security, server • Comments: 11Most Linux servers offer an SSH login via Port 22 for remote administration purposes. This port is a well-known port, therefore, it is often attacked by brute force attacks. Fail2ban is a software that scans log files for brute force login attempts in real-time and bans the attackers with firewalld or iptables. This tutorial shows the installation and configuration of Fail2Ban with firewalld on CentOS 7.
-
-
Linux Basics: How To Create and Install SSH Keys on the Shell
Author: howtoforge • Tags: linux, security, shell • Comments: 5SSH keys offer a highly secure manner of logging into a server with SSH as against mere dependence on a password. This tutorial shows you how to generate an SSH key pair by using the ssh-keygen command and how to configure the SSH Daemon to only allow logins by key.
-
Tips and Tricks to Secure Your Nginx Web Server
Author: Hitesh Jethva • Tags: debian, linux, nginx, security, ubuntu • Comments: 7Nginx is an open source, lightweight, high-performance the fastest growing web server around the world. In this tutorial, we will explain some popular Nginx server security tips and tricks.
-
How to Setup Kerberos Server and Client on Ubuntu 18.04 LTS
Author: Muhammad Arul • Tags: linux, security, server, ubuntu • Comments: 8In this tutorial, we will show you how to set up Kerberos authentication between two Ubuntu 18.04 servers. We will install and configure the Kerberos server on the Ubuntu server and then install the Kerberos client on the other. Finally, we will test the authentication of the SSH service with the Kerberos server.
-
How to Install Matomo Web Analytics on Ubuntu 18.04 LTS
Author: Blago Eres • Tags: linux, security, ubuntu, web server • Comments: 1Matomo (formerly Piwik) is a free and open source web analytics application for web servers. This tutorial will show you how to install Matomo on a Ubuntu 18.04 LTS system using Nginx as the web server and we will secure the website with a Let's Encrypt SSL certificate.
-
The creation of User, Certificate and Signing of CSR for Lemur Certificate Manager
Author: Ahmad • Tags: linux, security • Comments: 0In this article, we will perform following scripts to interact with Lemur using the terminal: Creation of Authority using CFSSL in the Lemur GUI. This CFSSL Authority will be used in our scripts to generate the certificate.
-
Spectre and Meltdown CPU Vulnerability Test and Microcode Update on Linux
Author: Jose Gutierrez • Tags: linux, security • Comments: 3This tutorial covers an introduction to Spectre & Meltdown CPU Vulnerabilities, a test to find out if your hardware is affected and instructions on how to install Intel Microcode updates to fix the issue on Linux.
-
Chrooted Drop Bear SSH Server HowTo
Author: ebal • Tags: linux, security • Comments: 4This tutorial is being written to help you install Drop Bear SSH server into a chroot environment. Dropbear is a relatively small SSH 2 server and client. It is an alternative lightweight program for OpenSSH and it is designed for environments with low memory and processor resources, such as embedded systems.