Quantcast
Channel: Server Security – Dedicated Server School
Browsing all 40 articles
Browse latest View live

Is Your Server a Tool for Cyber-Criminals?

Protecting your dedicated server from cyber-attacks is always a critical part of system security. You have, after all, invested time and money into protecting your websites and the websites of any...

View Article



Back to the Basics #6: Network Security

In order for a network to be secure, you need to have some type of firewall in place. Firewalls typically protect your server from a wide variety of network attacks, all of which focus on weaknesses or...

View Article

Back to the Basics #7: OS Security

The security of your operating system can be very complex. It is a large collection of software that has direct access to your hardware. Therefore, it is crucial to maintain an ongoing security policy...

View Article

Back to the Basics #8: Application Security

When covering application security, there are three basic application types you should consider: Standard applications that you install directly on your server’s operating system and run only when you...

View Article

How to Disable a Firewall on RHEL/CentOS

It is generally not a good idea to disable the firewall on your dedicated server, but there are instances when it might be necessary. For example, if you need to run some network tests or perform some...

View Article


Should You Worry About Malware on Your Server?

Malware is in the news all the time. From high profile cyber attacks on government infrastructure, to viruses that affect millions of home computers, malware is everywhere. As a system administrator,...

View Article

How to Run Commands as Another User

In a previous post, we explained how to use “su” to execute a command as another user, but that is only one of the many ways you can accomplish this on a Linux or Unix server. The following techniques...

View Article

A Basic Guide to SSH Server Connections: Part 2

Connecting to an SSH server is usually pretty straightforward, and your login credentials are encrypted for security. This makes SSH useful for other types of connections beyond basic shell access....

View Article


Sentry Tools: Host-Level Security for Linux/Unix Servers

Linux dedicated server security does not have to be overly complex. With the right tools, you can accomplish your security goals with efficiency. One such project, Sentry Tools, offers host-level...

View Article


Configure Linux to Restrict SuperUser to One Group

The last thing you would ever want or need on your dedicated server is for an unauthorized user to gain root access. This applies to both those external users with malicious intent and those who have...

View Article

How to Require Regular Password Changes

A server is only as strong as its weakest user, and a weak user will have a weak password. One way you can at least make passwords a little more secure is to require users to routinely change them. To...

View Article

Run an End-of-Year Security Audit

As the end of the year approaches, now is a good time to make sure your server is living up to your security standards. It might be easy to neglect if you do not have any noticeable security problems,...

View Article

Linux Server Security Guide: Part 1

Over the years at Dedicated Server School, we have provided you with numerous security tips, often on an individual and specific level. This five-part series will instead give a general overview of...

View Article


Linux Server Security Guide: Part 2

System Logs Every Linux operating system keeps logs for system processes and applications. You can use those logs to monitor server performance and also sniff out any abnormalities that may be security...

View Article

Linux Server Security Guide: Part 3

Network Security When it comes to network security, your firewall is one of your most important tools. It is generally a good idea to have multiple lines of defense, such as a router-level firewall and...

View Article


Linux Server Security Guide: Part 5

Malware and Spam Of all the security problems a server might have, malware and spam are particularly despicable. Few things are worse than finding out you have a virus or other malware infecting your...

View Article

How to Securely Download a File from Your Server

Downloading a file from your server should not be tricky. If it is a web-facing file, you can usually download it with your web browser. If it is not, you could use FTP. The problem with both of these...

View Article


Protect Your Server with Fail2ban

Monitoring your server is a great way to prevent cyber attacks and stop those that might be in progress. Unfortunately, you cannot always be present to monitor your server. Unless you are an android,...

View Article

Eradicate Malware with LMD

Worried about malware? No? You should be. Cyber criminals are always looking for new and creative ways to attack your server or user your dedicated server to attack others. There are plenty of...

View Article

What Are Shadow Passwords?

On a basic Linux system, passwords are stored in the /etc/passwd file. This is usually OK for a single-user system, but on a multi-user system, such as a server, the passwords should be hidden and...

View Article
Browsing all 40 articles
Browse latest View live


Latest Images