Linux Tutorials on the topic “security”

  • Install Let's Encrypt and Secure Nginx with SSL/TLS in Debian 9

    debian Author: Matt VasTags: , , , , , Comments: 9Published: Oct 20, 2017

    This tutorial will show you how to install and secure a Nginx web server on Debian 9 with a TLS certificate issued for free by the Let’s Encrypt Certificate Authority. Furthermore, we will configure automatic renewal of Lets’ Encrypt TLS certificates using a cron job before the certificates expire.

  • How to scan for viruses with ClamAV on Ubuntu

    ubuntu Author: Bill ToulasTags: , , , Comments: 15Updated: Oct 16, 2017

    There aren't many viruses made for Linux distributions and as such, most people who use such systems don't ever bother using an antivirus software. Those however who do want to be able to scan their system or other windows-based systems that are connected on a Linux PC through a network, they can use ClamAV. ClamAV is an open source anti-virus engine that is built to detect viruses, trojans, malware and other threats. It supports multiple file formats (documents, executables or archives), utilizes multi-thread scanner features and receives updates for its signature database at least 3-4 times a day.

  • How to Setup Automatic Security Updates on CentOS 7

    centos Author: Muhammad ArulTags: , , Comments: 5Published: Sep 19, 2017

    Security updates, as most of you'd agree, are very important. On Linux, it's always advisable to keep the installed packages up to date, especially when it comes to security. In general, users should apply security updates to their Linux systems within 30 days of being released. In this tutorial, we will discuss how you can configure a CentOS 7 server for automatic security updates.

  • Linux Basics: How to hide, lock, encrypt, and secure your files on Linux

    linux Author: Bill ToulasTags: , , Comments: 0Published: Sep 08, 2017

    Hiding, locking, or even encrypting your files and folders on Linux is pretty easy, and for whatever reason you want to do this there are many different approaches that you can follow. Here is a quick guide on how to hide, lock, and secure your files in the easiest way possible.

  • Installing a VPN with Tinc on Ubuntu 16.04 LTS

    ubuntu Author: Dan FriesTags: , , Comments: 2Published: Sep 06, 2017

    Tinc is an open-source VPN daemon that available for a wide range of platforms and has several advantages over similar VPN clients. A Virtual Private Network (VPN) is a secure private network that operates over a larger public network such as the internet. VPNs have become increasingly popular in recent years, largely because they offer increased security and privacy without the need for setting up expensive and complex new hardware.

  • How to Clone an Encrypted Disk Image with Clonezilla

    tux Author: Matt VasTags: , , Comments: 0Updated: Aug 29, 2017

    In this guide, we’ll discuss how to image or clone the hard drive of a CentOS 7 server used as a DHCP and DNS server in production (DNS and DHCP data don’t change that often on the server). The cloned image will also be encrypted on-fly during the cloning process. A passphrase will be used to encrypt and decrypt the image. In case of losing or forgetting the passphrase, the imaged data will be forever lost.

  • Key-Based SSH Logins With PuTTY

    linux Author: Falko TimmeTags: , Comments: 69Updated: Aug 03, 2017

    This guide describes how to generate and use a private/public key pair to log in to a remote system with SSH using PuTTY. PuTTY is an SSH client that is available for Windows and Linux (although it is more common on Windows systems). Using key-based SSH logins, you can disable the normal username/password login procedure which means that only people with a valid private/public key pair can log in. That way, there is no way for brute-force attacks to be successful, so your system is more secure.

  • How to install and use Volatility memory forensic tool

    tux Author: AhmadTags: , , Comments: 0Published: Jul 18, 2017

    One of the important parts of Malware analysis is Random Access Memory (RAM) analysis. It helps to identify the running malicious processes, network activities, open connections etc in the compromised system. This article is about the open source security tool "Volatility" for volatile memory analysis. It can be used for both 32/64 bit systems RAM analysis and it supports analysis of Windows, Linux, Mac & Android systems.

  • nginx: How To Block Exploits, SQL Injections, File Injections, Spam, User Agents, Etc.

    nginx Author: Falko TimmeTags: , , , Comments: 9Updated: Jun 16, 2017

    This short article explains how you can block the most common exploits, SQL injections, file injections, spam and user agents used by hackers and bandwidth hoggers from your nginx vhosts with some simple configuration directives. This configuration is far from being complete, but it's a good starting point. You will have to watch your logs for attempted break-in attempts and then try to modify/complete the ruleset.

  • Nginx with libmodsecurity and OWASP ModSecurity Core Rule Set on Ubuntu 16.04

    ubuntu Author: Dino EdwardsTags: , , , Comments: 2Published: Jun 06, 2017

    In this tutorial, I will show you how to compile the latest version of Nginx with libmodsecurity (Modsecurity 3.x) NOT to be confused with Modsecurity 2.9. We will also be integrating the OWASP ModSecurity Core Rule Set (CRS).