Quantcast
Channel: Server Security – Dedicated Server School
Browsing latest articles
Browse All 40 View Live

How to Securely Download a File from Your Server

Downloading a file from your server should not be tricky. If it is a web-facing file, you can usually download it with your web browser. If it is not, you could use FTP. The problem with both of these...

View Article



Protect Your Server with Fail2ban

Monitoring your server is a great way to prevent cyber attacks and stop those that might be in progress. Unfortunately, you cannot always be present to monitor your server. Unless you are an android,...

View Article

Eradicate Malware with LMD

Worried about malware? No? You should be. Cyber criminals are always looking for new and creative ways to attack your server or user your dedicated server to attack others. There are plenty of...

View Article

What Are Shadow Passwords?

On a basic Linux system, passwords are stored in the /etc/passwd file. This is usually OK for a single-user system, but on a multi-user system, such as a server, the passwords should be hidden and...

View Article

Install and Configure APF Firewall on an Ubuntu Server

In a previous post, we learned how to install a basic LAMP server setup on an Ubuntu Server. Once you have Apache, MySQL, and PHP up and running, you should strongly consider reconfiguring your...

View Article


5 Basic Server Security Tips

As we approach the end of the year, now might be a good time to review your security practices and fix any weaknesses in your system. The following are 5 basic security tips to keep your server secure....

View Article

5 More Basic Server Security Tips

In a previous post, we highlighted some crucial security measures you should adopt to keep your dedicated server safe. What follows are five more tips that are of equal or even greater importance. 1....

View Article

The Benefits of SSH Tunneling

SSH tunneling is a method of connection that, as the name implies, tunnels your information stream through SSH. The result is an encrypted and secure transaction, even if the standard connection method...

View Article


How to Update Your OpenSSL Version to Fix Heartbleed Bug

Heartbleed, the highly publicized OpenSSL bug with the unfortunate name, has a lot of system administrators scurrying to fix the problem. If you have not heard about it by now, it is a security hole...

View Article


Encrypt Your Linux Server Filesystem with eCryptfs

Encryption has become a highly requested feature on the web lately with all of the talk of government spying, heartbleed and general security concerns. While most discussion has centered around...

View Article

How to Require Regular Password Changes

A server is only as strong as its weakest user, and a weak user will have a weak password. One way you can at least make passwords a little more secure is to require users to routinely change them. To...

View Article

Run an End-of-Year Security Audit

As the end of the year approaches, now is a good time to make sure your server is living up to your security standards. It might be easy to neglect if you do not have any noticeable security problems,...

View Article

Linux Server Security Guide: Part 1

Over the years at Dedicated Server School, we have provided you with numerous security tips, often on an individual and specific level. This five-part series will instead give a general overview of...

View Article


Linux Server Security Guide: Part 2

System Logs Every Linux operating system keeps logs for system processes and applications. You can use those logs to monitor server performance and also sniff out any abnormalities that may be security...

View Article

Linux Server Security Guide: Part 3

Network Security When it comes to network security, your firewall is one of your most important tools. It is generally a good idea to have multiple lines of defense, such as a router-level firewall and...

View Article


Linux Server Security Guide: Part 5

Malware and Spam Of all the security problems a server might have, malware and spam are particularly despicable. Few things are worse than finding out you have a virus or other malware infecting your...

View Article

How to Configure Linux Password Policies

One of your best weapons in the fight for server security is strong password management. Using the password policies you set in Linux, you enforce strong passwords, require password renewals and many...

View Article


How to Check Your Server for Bash Shellshock Vulnerability

The hosting world has been hit with yet another highly publicized server vulnerability. This one affects the ubiquitous shell program GNU Bash and is referred to as Shellshock. Most Linux, BSD and Mac...

View Article

How to Fix the Bash Shellshock Vulnerability on Linux

In the previous post, we explained how to check your Linux server for the highly publicized Shellshock vulnerability in Bash. Fortunately, most, if not all, major Linux distributions have already...

View Article

Essential vs. Wildcard vs. EV SSL Certificates

SSL certificates are an important part of online business. They bind small digital files with a cryptographic key to ensure safety during online transactions. After they have been installed on a...

View Article
Browsing latest articles
Browse All 40 View Live




Latest Images