RHEL 7

How to Detect Rootkits with rkhunter and chkrootkit on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Detect Rootkits with rkhunter and chkrootkit on RHEL 7

How to Detect Rootkits with rkhunter and chkrootkit on RHEL 7 A rootkit is a collection of malicious software designed to maintain persistent, hidden access to a compromised system while concealing its presence from the administrator and standard system tools. Once installed, rootkits can replace core binaries, hide processes and network connections, and exfiltrate data […]

Read more
How to Configure nftables Firewall on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Configure nftables Firewall on RHEL 7

How to Configure nftables Firewall on RHEL 7 nftables is the modern successor to iptables, combining the functionality of iptables, ip6tables, arptables, and ebtables into a single, unified framework with a cleaner syntax, better performance, and native support for atomic rule replacement. While firewalld is the default front end on RHEL 7, nftables is available […]

Read more
How to Configure iptables Firewall Rules on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Configure iptables Firewall Rules on RHEL 7

How to Configure iptables Firewall Rules on RHEL 7 RHEL 7 ships with firewalld as the default firewall management layer, but many system administrators prefer to work directly with iptables, the underlying Linux netfilter framework. iptables provides precise, stateful packet filtering through a chain-based rule system and is the right choice when you need fine-grained […]

Read more
How to Set Up Two-Factor Authentication for SSH with Google Authenticator on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Set Up Two-Factor Authentication for SSH with Google Authenticator on RHEL 7

How to Set Up Two-Factor Authentication for SSH with Google Authenticator on RHEL 7 Password-based SSH authentication is vulnerable to brute-force attacks, credential stuffing, and phishing. Adding a second authentication factor — a time-based one-time password (TOTP) generated by an app like Google Authenticator or Authy — dramatically reduces this risk. Even if an attacker […]

Read more
How to Audit Linux Security with Lynis on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Audit Linux Security with Lynis on RHEL 7

How to Audit Linux Security with Lynis on RHEL 7 Maintaining a secure Linux server requires more than installing updates and setting strong passwords. A comprehensive security audit reveals configuration weaknesses, missing hardening measures, and potential vulnerabilities before attackers can exploit them. Lynis is an open-source security auditing tool that performs an in-depth scan of […]

Read more
How to Configure SELinux on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Configure SELinux on RHEL 7

How to Configure SELinux on RHEL 7 SELinux (Security-Enhanced Linux) is a mandatory access control (MAC) system built into the Linux kernel and enabled by default on every RHEL 7 installation. Unlike traditional Unix discretionary access control (DAC), which lets file owners decide who can access their files, SELinux enforces a policy defined by the […]

Read more
How to Install ClamAV Antivirus on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Install ClamAV Antivirus on RHEL 7

How to Install ClamAV Antivirus on RHEL 7 ClamAV is the leading open-source antivirus engine used on Linux servers, primarily for scanning files shared with Windows clients, email attachments passing through mail gateways, and uploaded content on web servers. While RHEL 7 itself is rarely the target of self-propagating malware, compliance frameworks such as PCI-DSS, […]

Read more
How to Install and Configure OpenVPN on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Install and Configure OpenVPN on RHEL 7

How to Install and Configure OpenVPN on RHEL 7 OpenVPN is one of the most widely deployed VPN solutions in the enterprise, valued for its flexibility, strong encryption, and compatibility across nearly every operating system. On RHEL 7, OpenVPN is not included in the base repositories but is available from EPEL. Building a proper PKI […]

Read more
How to Set Up WireGuard VPN on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Set Up WireGuard VPN on RHEL 7

How to Set Up WireGuard VPN on RHEL 7 WireGuard is a modern, high-performance VPN protocol built directly into the Linux kernel (from 5.6 onward) and available as a DKMS module on older kernels like those shipped with RHEL 7. Compared to OpenVPN and IPsec, WireGuard has a dramatically smaller codebase, faster handshake times, and […]

Read more
How to Harden SSH on RHEL 7 — step-by-step RHEL 7 tutorial on Progressive Robot

How to Harden SSH on RHEL 7

How to Harden SSH on RHEL 7 SSH (Secure Shell) is the primary remote administration protocol for RHEL 7 servers, and by default its configuration leaves several attack vectors open. Brute-force attacks against exposed SSH ports are constant on any internet-facing host, making SSH hardening one of the first tasks every RHEL 7 administrator should […]

Read more
CHAT