security

How To Install and Secure Memcached on Ubuntu 16.04 — step-by-step Linux tutorial on Progressive Robot

How To Install and Secure Memcached on Ubuntu 16.04

Memory object caching systems like Memcached can optimize backend database performance by temporarily storing information in memory, retaining frequently or recently requested records. In this guide, we will cover how to protect your Memcached server by binding your installation to a local or private interface and creating an authorized user for your Memcached instance.

Read more
How to Install MongoDB on Debian 8 — step-by-step Linux tutorial on Progressive Robot

How to Install MongoDB on Debian 8

MongoDB is a free and open-source NoSQL document database used commonly in modern web applications. This tutorial will help you set up MongoDB on your server for use in a production application environment. You’ll install MongoDB and configure firewall…

Read more
Cómo listar y eliminar reglas de firewall de Iptables — step-by-step Security tutorial on Progressive Robot

Cómo listar y eliminar reglas de firewall de Iptables

Iptables es una tecnología de firewall que tiene una función esencial en la seguridad de la red para muchos sistemas Linux. En este tutorial, veremos cómo hacer las siguientes tareas de iptables: listar reglas, borrar contadores de paquetes y bytes, eliminar reglas, vaciar cadenas (eliminar todas las reglas de una cadena) y restablecer por completo un firewall de iptables.

Read more
How To Protect an Nginx Server with Fail2Ban on Rocky Linux 9 — step-by-step Linux tutorial on Progressive Robot

How To Protect an Nginx Server with Fail2Ban on Rocky Linux 9

In this guide, you will learn how to install `fail2ban` on a Rocky Linux 9 server and configure it to monitor your Nginx logs for intrusion attempts. Fail2ban can significantly mitigate brute force attacks by creating rules that automatically alter your firewall configuration to ban specific IPs after a certain number of unsuccessful login attempts. This will allow your server to harden itself against these access attempts without intervention from you.

Read more
CHAT