Top

Archive | linux

How To Set Up a Firewall Using Iptables

Setting up a good firewall is an essential step to take in securing any modern operating system. Most Linux distributions ship with a few different firewall tools that we can use to configure our firewalls. In this guide, we’ll be covering the iptables firewall. A good starting point is check the current rules that are […]

Continue Reading

Protect SSH With Two-Factor Authentication

To extra protect your SSH server with an two-factor authentication, you can use the Google Authenticator PAM module. Every time you login ssh to server you have to enter extra the code from your smartphone. note: If you activate the google-authenticator for a normal user but not for root you can’t login with the root […]

Continue Reading

Linux Server Hardening Security Tips

Securing your Linux server is important to protect your and customers data, intellectual property, and time, from the hands of crackers/hackers. The system administrator is responsible for security Linux Server. 1. Use only Encrypt Data Communication Because all data transmitted over a network is open to monitoring. Encrypt transmitted data whenever possible with password or […]

Continue Reading