All articles tagged with ["Linux Security"
FTP is a security relic that exposes credentials in plain text. Learn how to implement chrooted SFTP on CentOS 6 and Debian 6 to satisfy Datatilsynet requirements and secure your infrastructure.
In an era of LulzSec and automated botnets, default settings are a death sentence. Here is the battle-hardened guide to securing your CentOS and Debian servers, optimized for Norwegian infrastructure standards.
Default installations are dangerous. From securing SSH to configuring iptables and Fail2Ban, here is the battle-tested guide to hardening your Linux VPS against brute-force attacks and exploits.
Stop relying on 'security through obscurity'. From configuring rigid iptables to navigating Norwegian privacy laws, this guide covers the mandatory steps to secure your VPS against modern botnets and brute-force attacks.
Sending credentials in cleartext is professional suicide in 2011. We analyze the risks of legacy FTP, demonstrate how to implement a chrooted SFTP environment using OpenSSH, and discuss why Norwegian data privacy laws demand better encryption standards.
Botnets don't sleep. Secure your CentOS and Ubuntu servers with these battle-tested hardening techniques. From iptables to SSH keys, here is how to keep your data safe in compliance with Datatilsynet standards.
The default Linux installation is not secure. From locking down SSH to configuring iptables, here is the battle-tested guide to securing your VPS against the rising tide of automated botnets targeting European infrastructure.
A battle-tested guide to locking down RHEL/CentOS and Debian systems in 2010. From accurate iptables chains to kernel tuning against SYN floods, we cover what actually works in the Norwegian threat landscape.
Stop script kiddies cold. A battle-hardened guide to securing your CentOS and Debian servers using iptables, SSH keys, and common sense. Written for the paranoid admin.