Introduction Iptables is a powerful Linux utility that allows system administrators to configure the kernel’s built-in firewall. Iptables uses a set of rules to determine how to filter network traffic. Each rule specifies what type of traffic to filter and what action to take on matching traffic. In this guide, we will discuss some basic ..
Category : Security
Introduction Although many users require a database management system like MySQL’s functionality, they might not feel at ease interacting with the system only through the MySQL command line client. To enable user interaction with MySQL via a web interface, PhpMyAdmin was developed. We’ll go over installing and securing PhpMyAdmin in this guide, so you can ..
Introduction Although many users require a database management system like MySQL’s functionality, they might not feel at ease interacting with the system only through the MySQL command line client. To enable user interaction with MySQL via a web interface, PhpMyAdmin was developed. We’ll go over installing and securing PhpMyAdmin in this guide, so you can ..
Many websites and applications begin with the web server and database backend running on the same machine. A setup like this, on the other hand, can become complicated and challenging to scale over time. The solution is to separate these functions and establishing a remote database. Permitting the server and database to grow independently on ..
Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host, or between two remote hosts. It is based on the Secure Shell (SSH) protocol. “SCP” commonly refers to both the Secure Copy Protocol and the program itself. Step 1 : Install SCP On Mac and Linux, the SCP command is pre-installed, so no ..
What is SSH? The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution. An SSH client programme is typically used for establishing connections to an SSH daemon accepting remote connections. Both are commonly present on most modern operating systems, including macOS, Linux, OpenBSD, FreeBSD… In this guide, you will secure the SSH port and disable the root ..
Introduction The sudo command temporarily elevates privileges, allowing users to complete sensitive tasks without logging in as the root user. The following steps will demonstrate how to set up a new user with sudo access on Ubuntu / CentOS / RedHat (RHEL) without having to change the /etc/sudoers file on your server. If you want to set ..
The mod_ssl module provides SSL v3 and TLS v1.x with support to the Apache HTTP Server. This guide provides you with a basic step by step mod_ssl configuration on RHEL/CentOS 7 Linux server using httpd Apache web server. Step-by-Step Instructions to Install mod_ssl on RHEL/CentOS 7 We assume that you have already done a basic ..
Introduction Rsync, sometimes known as Remote Sync, is a free command-line utility that allows you to transfer files and directories to both local and remote locations. Rsync is used for mirroring, backups, and data migration to other servers. This program is quick and efficient, replicating only the changes from the source and allowing for customization. ..
What’s a private key? Even the most complex passwords cannot match the cryptographic strength of private keys. With SSH, private keys significantly improve security by relieving users of the burden of remembering complex passwords (or worse yet, writing them down). Let’s first Open a terminal and generate a private key. Step 1 : Check to ..