Is Your Server a Tool for Cyber-Criminals?
Protecting your dedicated server from cyber-attacks is always a critical part of system security. You have, after all, invested time and money into protecting your websites and the websites of any...
View ArticleBack to the Basics #6: Network Security
In order for a network to be secure, you need to have some type of firewall in place. Firewalls typically protect your server from a wide variety of network attacks, all of which focus on weaknesses or...
View ArticleBack to the Basics #7: OS Security
The security of your operating system can be very complex. It is a large collection of software that has direct access to your hardware. Therefore, it is crucial to maintain an ongoing security policy...
View ArticleBack to the Basics #8: Application Security
When covering application security, there are three basic application types you should consider: Standard applications that you install directly on your server’s operating system and run only when you...
View ArticleHow to Disable a Firewall on RHEL/CentOS
It is generally not a good idea to disable the firewall on your dedicated server, but there are instances when it might be necessary. For example, if you need to run some network tests or perform some...
View ArticleShould You Worry About Malware on Your Server?
Malware is in the news all the time. From high profile cyber attacks on government infrastructure, to viruses that affect millions of home computers, malware is everywhere. As a system administrator,...
View ArticleHow to Run Commands as Another User
In a previous post, we explained how to use “su” to execute a command as another user, but that is only one of the many ways you can accomplish this on a Linux or Unix server. The following techniques...
View ArticleA Basic Guide to SSH Server Connections: Part 2
Connecting to an SSH server is usually pretty straightforward, and your login credentials are encrypted for security. This makes SSH useful for other types of connections beyond basic shell access....
View ArticleSentry Tools: Host-Level Security for Linux/Unix Servers
Linux dedicated server security does not have to be overly complex. With the right tools, you can accomplish your security goals with efficiency. One such project, Sentry Tools, offers host-level...
View ArticleConfigure Linux to Restrict SuperUser to One Group
The last thing you would ever want or need on your dedicated server is for an unauthorized user to gain root access. This applies to both those external users with malicious intent and those who have...
View ArticleHow to Require Regular Password Changes
A server is only as strong as its weakest user, and a weak user will have a weak password. One way you can at least make passwords a little more secure is to require users to routinely change them. To...
View ArticleRun an End-of-Year Security Audit
As the end of the year approaches, now is a good time to make sure your server is living up to your security standards. It might be easy to neglect if you do not have any noticeable security problems,...
View ArticleLinux Server Security Guide: Part 1
Over the years at Dedicated Server School, we have provided you with numerous security tips, often on an individual and specific level. This five-part series will instead give a general overview of...
View ArticleLinux Server Security Guide: Part 2
System Logs Every Linux operating system keeps logs for system processes and applications. You can use those logs to monitor server performance and also sniff out any abnormalities that may be security...
View ArticleLinux Server Security Guide: Part 3
Network Security When it comes to network security, your firewall is one of your most important tools. It is generally a good idea to have multiple lines of defense, such as a router-level firewall and...
View ArticleLinux Server Security Guide: Part 5
Malware and Spam Of all the security problems a server might have, malware and spam are particularly despicable. Few things are worse than finding out you have a virus or other malware infecting your...
View ArticleHow to Securely Download a File from Your Server
Downloading a file from your server should not be tricky. If it is a web-facing file, you can usually download it with your web browser. If it is not, you could use FTP. The problem with both of these...
View ArticleProtect Your Server with Fail2ban
Monitoring your server is a great way to prevent cyber attacks and stop those that might be in progress. Unfortunately, you cannot always be present to monitor your server. Unless you are an android,...
View ArticleEradicate Malware with LMD
Worried about malware? No? You should be. Cyber criminals are always looking for new and creative ways to attack your server or user your dedicated server to attack others. There are plenty of...
View ArticleWhat Are Shadow Passwords?
On a basic Linux system, passwords are stored in the /etc/passwd file. This is usually OK for a single-user system, but on a multi-user system, such as a server, the passwords should be hidden and...
View Article