security

How To Install and Secure Memcached on CentOS 7 — step-by-step Linux tutorial on Progressive Robot

How To Install and Secure Memcached on CentOS 7

Memory object caching systems like Memcached can optimize backend database performance by temporarily storing information in memory, retaining frequently or recently requested records. In this guide, we will cover how to protect your Memcached server by binding your installation to a local or private network interface and creating an authorized user for your Memcached instance.

Read more
How to Install Linux Socket Monitor (LSM) on CentOS 6.4 — step-by-step Linux tutorial on Progressive Robot

How to Install Linux Socket Monitor (LSM) on CentOS 6.4

In this article we will be looking at enhancing system security by increasing the level of monitoring performed. We are going to set up Linux Socket Monitor (LSM) which sends out alerts when a new socket / port is created, which is a potential signal of an intrusion by an unknown application taking over its host.

Read more
Auflisten und Löschen von iptables-Firewall-Regeln — step-by-step Security tutorial on Progressive Robot

Auflisten und Löschen von iptables-Firewall-Regeln

Iptables ist eine Firewall-Technologie, die in vielen Linux-Systemen eine wesentliche Rolle bei der Netzwerksicherheit spielt. In diesem Tutorial erläutern wir die Verwendung der folgenden iptables-Aufgaben: Regeln auflisten, Paket- und Byte-Zähler löschen, Regeln löschen, Ketten leeren (alle Regeln in einer Kette löschen) und iptables-Firewall vollständig zurücksetzen.

Read more
How To Protect an Nginx Server with Fail2Ban on Rocky Linux 8 — step-by-step Linux tutorial on Progressive Robot

How To Protect an Nginx Server with Fail2Ban on Rocky Linux 8

In this guide, you will learn how to install `fail2ban` on a Rocky Linux 8 server and configure it to monitor your Nginx logs for intrusion attempts. Fail2ban can significantly mitigate brute force attacks by creating rules that automatically alter your firewall configuration to ban specific IPs after a certain number of unsuccessful login attempts. This will allow your server to harden itself against these access attempts without intervention from you.

Read more
CHAT