security

How To Install and Secure Memcached on Ubuntu 18.04 — step-by-step Linux tutorial on Progressive Robot

How To Install and Secure Memcached on Ubuntu 18.04

Memory object caching systems like Memcached can optimize backend database performance by temporarily storing information in memory, retaining frequently or recently requested records. In this guide, we will cover how to protect your Memcached server by binding your installation to a local or private interface and creating an authorized user for your Memcached instance.

Read more
How To Install and Secure Redis on CentOS — step-by-step Linux tutorial on Progressive Robot

How To Install and Secure Redis on CentOS

This tutorial provides instructions for installing Redis on a CentOS 7 server and using its built-in security features, in coordination with some other security configurations, to keep it from being accessed by unauthorized users.

Read more
Iptablesファイアウォールルールを一覧表示および削除する方法 — step-by-step Security tutorial on Progressive Robot

Iptablesファイアウォールルールを一覧表示および削除する方法

Iptablesは、多くのLinuxシステムのネットワークセキュリティで重要な役割を果たすファイアウォール技術です。このチュートリアルでは、次のiptablesタスクの実行方法について説明します。ルールの一覧表示、パケットおよびバイトカウンタのクリア、ルールの削除、チェーンのフラッシュ(チェーン内のすべてのルールの削除)、iptablesファイアウォールの完全なリセット。

Read more
How To Protect an Nginx Server with Fail2Ban on Ubuntu 20.04 — step-by-step Linux tutorial on Progressive Robot

How To Protect an Nginx Server with Fail2Ban on Ubuntu 20.04

In this guide, you will learn how to install `fail2ban` on a Ubuntu 20.04 server and configure it to monitor your Nginx logs for intrusion attempts. Fail2ban can significantly mitigate brute force attacks by creating rules that automatically alter your firewall configuration to ban specific IPs after a certain number of unsuccessful login attempts. This will allow your server to harden itself against these access attempts without intervention from you.

Read more
How To Protect Your Linux Server Against the GHOST Vulnerability — step-by-step Linux tutorial on Progressive Robot

How To Protect Your Linux Server Against the GHOST Vulnerability

On January 27, 2015, a GNU C Library (glibc) vulnerability, referred to as the GHOST vulnerability, was announced to the general public. In summary, the vulnerability allows remote attackers to take complete control of a system by exploiting a buffer overflow bug in glibc. It is highly recommended that you update and reboot all of your affected Linux servers. We will show you how to test if your systems are vulnerable and, if they are, how to update glibc to fix the vulnerability.

Read more
CHAT