Category: Security

How to Install and Configure CSF (Config Server Firewall)

How to Install and Configure CSF (Config Server Firewall) – CSF is firewall application suite for Linux servers. CSF is also a Login/Intrusion Detection for applications like SSH, SMTP, IMAP, Pop3, the “su” command and many more. CSF is a good security solution for hosting servers. How to Install and Configure CSF 1. Installation of

Restricted Access SFTP In Linux

Restricted Access SFTP In Linux – This is a short guide to providing users with restricted SFTP access to a single directory using built-in OpenSSH functionality and or denied to access SFTP. What is SFTP? SFTP, which stands for SSH File Transfer Protocol, or Secure File Transfer Protocol, is a separate protocol packaged with SSH

Tutorial Install Let’s Encrypt Centos7

Tutorial Install Let’s Encrypt Centos7 – Let’s Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG), more info.  In this Tutorial we will install Let’s Encrypt in Centos7 by combining Tengine web server. Tutorial Install Let’s Encrypt Centos7 Before starting we need to install some

Basic Hardening Security Tips for Linux Servers

Basic Hardening Security Tips for Linux Servers – However, Linux has in-built security model in place by default. Need to tune it up and customize as per your need which may help to make more secure system. Linux is harder to manage but offers more flexibility and configuration options. Securing your Linux server is important to protect

Mitigating Layer7 HTTP Flood

Mitigating Layer7 HTTP Flood – This tutorial is regarding mitigation of layer 7 http flood using nginx and fail2ban. In this tutorial we assumed to have installed nginx web server and running well. There are many types of Distributed Denial of Service (DDOS) attacks that can affect and bring down a website, and they vary in complexity