Rkhunter Install and Configuration
rkhunter (Rootkit Hunter) is a Unix-based tool that scans for rootkits, backdoors and possible local exploits. It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong...
Chkrootkit Install and Configuration
chkrootkit (Check Rootkit) is a common Unix-based program intended to help system administrators check their system for known rootkits. It is a shell script using common UNIX/Linux tools like the strings and grep commands to search core system programs for...
Secure your /tmp and /dev/shm partition
Keep you server clean of rookits is a good idea to get a good security level. A sysadministrator can create a seperate partition for /tmp and mount it with noexec and nosuid parameters. And to do it is not necessary to reboot...
What SSL Do I Need?
What SSL Do I Need? So you have come to the realization that you need an SSL Certificate. But there are several different types. Which one do you really need? Basic Usage If you only have one site or one...
Joomla 1.5 Security Tutorial
The purpose of this tutorial is to show you how to secure your Joomla website. There are several steps you can take to protect your Joomla application. Joomla’s security can be improved significantly by following these simple steps. Change the...
Dealing With iptables
Introduction Iptables is a critical tool for developers and system administrators managing Linux firewalls. It allows for comprehensive control over network traffic, making it essential for Linux server security. Understanding Iptables Iptables enables system administrators to configure the Linux kernel...
What is mod_security? What are the benefits? How might it affect me?
After months of extensive testing and tuning, we deployed the mod_security Apache Module on all of our shared servers beginning in November 2008 in a bid to improve overall system stability and security. Before deploying mod_security we saw a lot...