Linux Tutorials on the topic “security”
Author: Falko Timme •
Tags: linux, nginx, security, web server •
This short article explains how you can block the most common exploits, SQL injections, file injections, spam and user agents used by hackers and bandwidth hoggers from your nginx vhosts with some simple configuration directives. This configuration is far from being complete, but it's a good starting point. You will have to watch your logs for attempted break-in attempts and then try to modify/complete the ruleset.
Author: Dino Edwards •
Tags: linux, nginx, security, ubuntu •
In this tutorial, I will show you how to compile the latest version of Nginx with libmodsecurity (Modsecurity 3.x) NOT to be confused with Modsecurity 2.9. We will also be integrating the OWASP ModSecurity Core Rule Set (CRS).
Author: Muhammad Arul •
Tags: high-availability, linux, security, ubuntu •
In this tutorial, I will show you step by step how to create a High Availability Clustered Nginx Web Server with Pacemaker, Corosync, and Crmsh. We will create an Active-Passive Cluster or Failover-cluster Nginx web server on Ubuntu 16.04.
Author: Oliver •
Tags: centos, debian, fedora, linux, opensuse, security, suse, ubuntu •
This tutorial explains how to install pandom: a timing jitter true random number generator maintained by ncomputers.org. The built-in Linux kernel true random number generator provides low throughput under modern circumstances, as for example: personal computers with solid state drives (SSD) and virtual private servers (VPS). This problem is becoming popular in Linux implementations, because of the continuously increasing need for true random numbers, mainly by diverse cryptographic purposes.
Author: Ahmad •
Tags: linux, security, ubuntu •
The purpose of this tutorial is to explore LibreSwan which provides an IPsec protocol implementation. It is available in RedHat distributions, however, it can be compiled for another platform such as Ubuntu/Debian easily. In this article, the LibreSwan tool is built from source on Ubuntu, then a two peer VPN is configured using preshared & RSA keys between the gateway devices.
Author: Muhammad Arul •
Tags: centos, security •
Config Server Firewall / CSF is firewall application suite for Linux servers. CSF is also a Login/Intrusion Detection for applications like SSH, SMTP, IMAP, Pop3, the "su" command and many more. This tutorial will show the installation of CSF on CentOS 7 and guide you trough the first steps to use this powerful application suite.
Author: Ahmed Qadeer •
Tags: centos, linux, security •
SSHFS is a handy tool to share files securely. It is a filesystem based on the SSH File Transfer Protocol. In this tutorial we will see how to install SSHFS with from the CentOS repository with the yum command and also how to compile it from source.
Author: Himanshu Arora •
Tags: linux, security, shell, ubuntu •
The sudo command on Linux: ever got a 'Permission denied' error while working on the Linux command line? Chances are that you were trying to perform an operation that requires root permissions.
Author: Stephane T. •
Tags: debian, linux, security •
This tutorial documents the process of using the badips abuse tracker in conjunction with Fail2ban to protect your server or computer. I've tested it on a Debian 8 Jessie and Debian 7 Wheezy.
Author: Ondrej Vasko •
Tags: debian, linux, postfix, security, server •
This article contains an analysis and solution for blocking of international SPAM botnets with on postfix mail servers by using a postfwd plugin which analyses the sasl connects by country.