Tagged articles
161 articles
Page 1 of 2
Black & White Path
Black & White Path
May 11, 2026 · Information Security

State‑Sponsored Actors Gain Root on Palo Alto PAN‑OS via Captive Portal Buffer Overflow

A detailed analysis of CVE‑2026‑0300 reveals how a nation‑backed group exploited a buffer‑overflow in PAN‑OS's Captive Portal to obtain root on Palo Alto firewalls, outlining the attack chain, affected versions, immediate mitigations, long‑term remediation, compliance impacts, and lessons learned.

CVE-2026-0300Captive PortalPAN-OS
0 likes · 12 min read
State‑Sponsored Actors Gain Root on Palo Alto PAN‑OS via Captive Portal Buffer Overflow
MaGe Linux Operations
MaGe Linux Operations
May 2, 2026 · Information Security

Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation

This article walks operations engineers through the most frequent security‑configuration problems encountered during Grade‑Protection (等保) remediation, detailing the regulatory background, specific compliance gaps, step‑by‑step remediation commands for Linux systems, verification methods, FAQs, and a practical implementation workflow.

AuditdGrade ProtectionLinux Hardening
0 likes · 28 min read
Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation
MaGe Linux Operations
MaGe Linux Operations
Apr 30, 2026 · Information Security

20 Essential Server Hardening Steps Before Launching a New Machine

This guide provides a detailed 20‑item checklist for Linux server hardening—covering snapshots, account management, SSH key authentication, password policies, firewall rules, service reduction, kernel tweaks, logging, and verification scripts—to ensure a new production server is secure before it goes live.

AIDEAuditdFail2ban
0 likes · 33 min read
20 Essential Server Hardening Steps Before Launching a New Machine
MaGe Linux Operations
MaGe Linux Operations
Apr 24, 2026 · Information Security

A Misplaced iptables Rule Nearly Took Down Our Production – Full Incident Postmortem and Best‑Practice Guide

The article recounts a real‑world iptables misconfiguration that cut off SSH access and caused a 47‑minute outage, then walks through the root‑cause analysis, step‑by‑step remediation, common pitfalls, rule‑ordering nuances, monitoring, automation, and migration to nftables, offering a comprehensive firewall best‑practice handbook.

Linuxfirewalliptables
0 likes · 75 min read
A Misplaced iptables Rule Nearly Took Down Our Production – Full Incident Postmortem and Best‑Practice Guide
MaGe Linux Operations
MaGe Linux Operations
Mar 26, 2026 · Operations

How to Diagnose and Fix Port Connectivity Issues on Linux Servers

This guide walks you through the root causes of "port unreachable" problems, explains TCP and UDP handshakes, and provides a seven‑layer troubleshooting framework with concrete commands, scripts, case studies, best‑practice recommendations, and monitoring setups for Linux environments.

SELinuxTCPUDP
0 likes · 37 min read
How to Diagnose and Fix Port Connectivity Issues on Linux Servers
MaGe Linux Operations
MaGe Linux Operations
Mar 11, 2026 · Information Security

How to Harden Linux Servers: A Step‑by‑Step Guide to Secure SSH, Accounts, Firewalls, and Auditing

This comprehensive guide walks you through Linux host hardening by explaining the security baseline, detailing default configurations, highlighting common pitfalls, and providing concrete, verifiable adjustments for account policies, SSH, firewalls, kernel parameters, file permissions, and audit logging, complete with scripts, examples, and real‑world case studies.

AuditdHardeningLinux
0 likes · 40 min read
How to Harden Linux Servers: A Step‑by‑Step Guide to Secure SSH, Accounts, Firewalls, and Auditing
MaGe Linux Operations
MaGe Linux Operations
Feb 28, 2026 · Information Security

Mastering Enterprise Firewalls: iptables vs nftables Rule Management

This guide walks you through the fundamentals of Linux Netfilter, compares iptables and nftables architectures, shows how to build, migrate, and optimize enterprise‑grade firewall rule sets, and provides best‑practice tips, automation scripts, monitoring metrics, and troubleshooting procedures for secure, high‑performance network protection.

DockerKubernetesLinux
0 likes · 44 min read
Mastering Enterprise Firewalls: iptables vs nftables Rule Management
Black & White Path
Black & White Path
Feb 26, 2026 · Information Security

How AI Enabled a Non‑Expert to Breach 6,700 DJI Vacuums and 600 Firewalls Worldwide

A non‑professional using Claude Code exploited a cloud‑permission flaw in DJI Romo robots to control 6,700 devices across 24 countries, while a separate AI‑driven campaign compromised over 600 Fortinet firewalls in 55 nations, illustrating how generative AI is dramatically lowering the barrier to large‑scale cyber attacks.

AIDJIVulnerability
0 likes · 13 min read
How AI Enabled a Non‑Expert to Breach 6,700 DJI Vacuums and 600 Firewalls Worldwide
360 Smart Cloud
360 Smart Cloud
Jan 20, 2026 · Information Security

How to Secure APIs: Core Risks and Multi‑Layer Defense Strategies

This article outlines the four primary API security risks—malicious calls, data tampering, sensitive data leakage, and XSS propagation—and presents a comprehensive, multi‑layered protection framework spanning frontend safeguards, firewalls, gateways, and fine‑grained API design guidelines within APICloud.

API SecurityAuthenticationencryption
0 likes · 12 min read
How to Secure APIs: Core Risks and Multi‑Layer Defense Strategies
Raymond Ops
Raymond Ops
Dec 18, 2025 · Information Security

Build an Impenetrable Linux Server: Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion analysis and a multi‑layered hardening strategy for Linux servers, covering SSH security, Fail2Ban, firewalls, iptables, IDS, file integrity monitoring, automated alerts, emergency response, and advanced techniques to create a robust defense.

Fail2banHardeningIDS
0 likes · 15 min read
Build an Impenetrable Linux Server: Step‑by‑Step Security Hardening Guide
Raymond Ops
Raymond Ops
Dec 12, 2025 · Operations

Mastering Network Device Operations: Switches, Routers, and Firewalls Explained

This comprehensive guide walks operations engineers through the fundamentals, configuration, monitoring, troubleshooting, and automation of switches, routers, and firewalls, providing practical commands, best‑practice scripts, and security hardening steps for reliable network infrastructure.

ConfigurationRouterfirewall
0 likes · 24 min read
Mastering Network Device Operations: Switches, Routers, and Firewalls Explained
Liangxu Linux
Liangxu Linux
Nov 16, 2025 · Information Security

Mastering Linux Netfilter: Core Tools and Their Functions

Netfilter, created by Rusty Russell in 1998 and merged into the Linux kernel in 2000, offers a modular packet‑filtering framework with hooks for filtering, NAT, dropping and logging, and is managed through utilities such as ebtables, arptables, iptables/ip6tables, nftables, conntrack, ulogd, nf_log and nf_queue.

Linuxfirewalliptables
0 likes · 4 min read
Mastering Linux Netfilter: Core Tools and Their Functions
MaGe Linux Operations
MaGe Linux Operations
Nov 8, 2025 · Information Security

Master iptables: From Basics to Advanced Firewall Rules for Enterprise Security

This comprehensive guide walks you through iptables fundamentals, four‑table architecture, common use cases, environment setup, step‑by‑step rule creation, NAT configuration, advanced attack mitigation, rule management, best practices, troubleshooting, performance monitoring, and backup strategies for building a robust Linux firewall.

LinuxNATSysadmin
0 likes · 39 min read
Master iptables: From Basics to Advanced Firewall Rules for Enterprise Security
Raymond Ops
Raymond Ops
Oct 29, 2025 · Information Security

Master Linux Firewalld: Beginner’s Guide to Configuring Firewall Rules

This beginner-friendly guide explains Linux firewalld fundamentals, compares it with iptables, details zone concepts, and walks through practical examples for blocking ping, restricting SSH access, and enabling Apache, providing clear commands and configuration files to help system administrators secure their servers.

LinuxSystem Administrationfirewall
0 likes · 9 min read
Master Linux Firewalld: Beginner’s Guide to Configuring Firewall Rules
Raymond Ops
Raymond Ops
Oct 11, 2025 · Information Security

Master Linux Firewall & SSH: Step‑by‑Step Guide to Secure Web Server Access

This tutorial walks through configuring a Linux firewall and web server, setting up network interfaces across four virtual machines, enabling NAT, defining DMZ zones, securing SSH on a non‑standard port, and verifying connectivity, providing a comprehensive hands‑on guide for robust network security.

CentOSLinuxSSH
0 likes · 7 min read
Master Linux Firewall & SSH: Step‑by‑Step Guide to Secure Web Server Access
Linux Tech Enthusiast
Linux Tech Enthusiast
Sep 29, 2025 · Fundamentals

A Brief History of Network Hardware: From Cables to Modern Switches

The article traces the evolution of network hardware—from early PCs without networking, through cables, NICs, repeaters, hubs, bridges, and switches, to routers, wireless APs, firewalls and traffic‑control devices—explaining each device's role, limitations, and how they solve specific networking problems.

Routeraccess pointethernet
0 likes · 10 min read
A Brief History of Network Hardware: From Cables to Modern Switches
Raymond Ops
Raymond Ops
Sep 25, 2025 · Information Security

Boost Linux Security: Essential Hardening Steps for RHEL 7

This guide walks through practical Linux security hardening on RHEL 7, covering account locking, password policies, SELinux activation, SSH port changes, firewall minimization, immutable system files, and other measures to elevate the system to a higher security level.

LinuxPassword policyRHEL7
0 likes · 13 min read
Boost Linux Security: Essential Hardening Steps for RHEL 7
Raymond Ops
Raymond Ops
Sep 19, 2025 · Information Security

How to Mitigate MySQL CVEs with iptables: Practical Firewall Rules

As network security threats rise, unpatchable MySQL vulnerabilities can be mitigated by configuring iptables rules that whitelist trusted IPs for port 3306 and drop all other traffic, with clear guidance on rule ordering and the differences between DROP and REJECT actions.

CVELinuxfirewall
0 likes · 7 min read
How to Mitigate MySQL CVEs with iptables: Practical Firewall Rules
Ops Community
Ops Community
Sep 18, 2025 · Information Security

Essential Linux Security: Common Vulnerabilities and Practical Defense Strategies

This guide walks you through the most critical Linux security flaws—from privilege‑escalation and misconfigured sudo to SSH, web server, kernel, and container risks—offering concrete hardening steps, logging practices, firewall rules, incident‑response procedures, and compliance tips to build a resilient production environment.

Container SecurityLinux securityLog Monitoring
0 likes · 16 min read
Essential Linux Security: Common Vulnerabilities and Practical Defense Strategies
MaGe Linux Operations
MaGe Linux Operations
Sep 16, 2025 · Information Security

Master Linux Security Hardening: Practical Scripts & Best Practices

This comprehensive guide walks you through Linux security threats, three-layer defense strategies, user account hardening, SSH and firewall configuration, file system protection, service hardening, kernel tuning, automated monitoring, incident response, and a step‑by‑step implementation roadmap to build a resilient, multi‑layered defense system.

SSHfirewallsecurity hardening
0 likes · 26 min read
Master Linux Security Hardening: Practical Scripts & Best Practices
Raymond Ops
Raymond Ops
Sep 9, 2025 · Operations

Step‑by‑Step Guide to Install and Configure ocserv VPN on CentOS

This tutorial walks you through installing ocserv, creating a CA and server certificates, configuring ocserv settings, adjusting kernel parameters, setting up iptables firewall rules, managing VPN users, and controlling the ocserv service on a CentOS server.

CertificateLinuxOpenConnect
0 likes · 38 min read
Step‑by‑Step Guide to Install and Configure ocserv VPN on CentOS
Ops Community
Ops Community
Sep 3, 2025 · Operations

Master TCP/IP, Routing, and Firewall Techniques for Advanced Ops Engineers

An in‑depth guide for operations engineers covering TCP/IP stack fundamentals, practical routing and firewall configurations, kernel and NIC tuning, automation scripts, and emerging technologies such as eBPF, providing real‑world case studies and step‑by‑step commands to master network reliability and performance.

Kernel TuningTCP/IPeBPF
0 likes · 24 min read
Master TCP/IP, Routing, and Firewall Techniques for Advanced Ops Engineers
Raymond Ops
Raymond Ops
Aug 22, 2025 · Information Security

Master Linux iptables: A Complete Guide to Software Firewalls and Netfilter

This article provides a comprehensive overview of Linux's software firewall, explaining how iptables works with the netfilter framework, detailing tables, chains, hook functions, packet flow, common commands, rule‑management techniques, best‑practice optimizations, and methods for persisting firewall configurations.

firewalliptablesnetfilter
0 likes · 24 min read
Master Linux iptables: A Complete Guide to Software Firewalls and Netfilter
Liangxu Linux
Liangxu Linux
Aug 10, 2025 · Information Security

How to Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion analysis, multi‑layer SSH hardening, Fail2Ban, firewall and iptables rules, intrusion detection with OSSEC, automated monitoring scripts, advanced techniques like port knocking and honeypots, and a complete incident‑response playbook to secure any Linux server.

Fail2banHardeningIDS
0 likes · 14 min read
How to Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide
MaGe Linux Operations
MaGe Linux Operations
Aug 2, 2025 · Information Security

Build an Impenetrable Linux Server: Complete Security Guide from Zero to One

This comprehensive guide walks you through a real intrusion case, then presents a multi‑layer defense strategy—including SSH hardening, Fail2Ban, firewall rules, IDS, file integrity monitoring, advanced techniques like port knocking and honeypots, plus monitoring, alerting, and emergency response—to dramatically improve Linux server security.

Fail2banIDSSSH Hardening
0 likes · 15 min read
Build an Impenetrable Linux Server: Complete Security Guide from Zero to One
Alibaba Cloud Observability
Alibaba Cloud Observability
Jul 28, 2025 · Information Security

How to Standardize and Collect Enterprise Firewall Logs with LoongCollector

This guide explains why modern enterprises need unified log collection for diverse security devices, introduces LoongCollector's flexible configuration for parsing and standardizing firewall logs from WAF, FortiGate, and Palo Alto, and provides step‑by‑step examples, code snippets, and visual results to enable efficient threat analysis and compliance.

Log StandardizationLoongCollectorfirewall
0 likes · 17 min read
How to Standardize and Collect Enterprise Firewall Logs with LoongCollector
Ops Community
Ops Community
Jul 4, 2025 · Information Security

Master Enterprise Linux Security Hardening: From Basics to Advanced

This comprehensive guide walks you through essential Linux security hardening steps—including system updates, service disabling, password policies, SSH configuration, firewall rules, intrusion detection, file integrity monitoring, log auditing, automation scripts, and emergency response—to help enterprises build a resilient and continuously protected infrastructure.

LinuxSSHSystem Administration
0 likes · 9 min read
Master Enterprise Linux Security Hardening: From Basics to Advanced
Liangxu Linux
Liangxu Linux
Jun 28, 2025 · Information Security

Step-by-Step Guide to Configuring Linux Firewall, Web Server, and SSH Access

This tutorial walks through setting up a Linux firewall with multiple network interfaces, configuring a DMZ web server, enabling HTTP/HTTPS services, blocking ICMP ping, and securely exposing SSH on a custom port for both internal and external access, complete with command examples and verification steps.

SSHWeb serverfirewall
0 likes · 7 min read
Step-by-Step Guide to Configuring Linux Firewall, Web Server, and SSH Access
Raymond Ops
Raymond Ops
Jun 13, 2025 · Information Security

Master Ubuntu’s UFW: Simple Commands to Enable, Configure, and Manage Firewall Rules

This article introduces Ubuntu’s Uncomplicated Firewall (UFW), explaining how to enable, disable, reset, set default policies, and create, modify, or delete specific IP, port, and protocol rules using concise command-line examples, helping users quickly secure client machines with practical firewall configurations.

Command-lineLinuxUbuntu
0 likes · 7 min read
Master Ubuntu’s UFW: Simple Commands to Enable, Configure, and Manage Firewall Rules
MaGe Linux Operations
MaGe Linux Operations
Jun 1, 2025 · Information Security

Patch MySQL Vulnerabilities with iptables Firewall Rules

This guide explains how to mitigate several MySQL-related security flaws—such as CVE-2022-32221, CVE-2023-21912, and CVE-2022-37434—by configuring iptables rules to restrict traffic, illustrating command usage, rule ordering, and the differences between DROP and REJECT actions.

CVEfirewalliptables
0 likes · 6 min read
Patch MySQL Vulnerabilities with iptables Firewall Rules
Java Architect Essentials
Java Architect Essentials
Apr 20, 2025 · Information Security

Free PC Firewall Recommendations and Comparative Analysis

This article provides a comprehensive comparison of free PC firewall solutions, detailing each software's core functions, suitable scenarios, drawbacks, and source references, followed by key recommendations, compatibility notes, performance assessments, and user feedback to help readers choose the most suitable firewall.

Information SecurityPC securityWindows
0 likes · 14 min read
Free PC Firewall Recommendations and Comparative Analysis
Open Source Linux
Open Source Linux
Apr 10, 2025 · Information Security

How to Harden Linux Systems: Practical Security Hardening Steps for RHEL 7

This guide walks through practical Linux security hardening on RHEL 7, covering account lockdown, password policies, SELinux activation, SSH port changes, login restrictions, file immutability, compiler and log protection, and minimal firewall rules to elevate the system to a higher security level.

RHEL7SELinuxSSH
0 likes · 12 min read
How to Harden Linux Systems: Practical Security Hardening Steps for RHEL 7
Efficient Ops
Efficient Ops
Mar 12, 2025 · Information Security

30 High-Risk Ports You Must Secure and How to Close Them

This guide lists 30 commonly exposed high‑risk ports such as LDAP, MySQL, and Docker, explains the security threats they pose, and provides practical firewall, service‑management, and port‑closing steps—including command‑line examples—to help you harden your systems against attacks.

System Hardeningfirewallhigh-risk ports
0 likes · 7 min read
30 High-Risk Ports You Must Secure and How to Close Them
MaGe Linux Operations
MaGe Linux Operations
Feb 21, 2025 · Information Security

Master Linux iptables: From Basics to Advanced Firewall Rules

This comprehensive guide explains Linux's software firewall architecture, the relationship between iptables and netfilter, common use cases, hook functions, packet flow, rule composition, command syntax, matching options, extensions, best‑practice optimizations, and how to persist rules across reboots.

firewalliptablesnetfilter
0 likes · 26 min read
Master Linux iptables: From Basics to Advanced Firewall Rules
Raymond Ops
Raymond Ops
Dec 17, 2024 · Information Security

Mastering firewalld vs iptables on CentOS 7: Zones, Rules, and Configuration

This guide explains the differences between firewalld and iptables on CentOS 7, introduces zone management, details iptables packet flow, tables, chains, and provides practical commands for installing, configuring, and managing firewall rules, including examples for SSH and ping traffic.

Linuxcentos7firewall
0 likes · 12 min read
Mastering firewalld vs iptables on CentOS 7: Zones, Rules, and Configuration
Liangxu Linux
Liangxu Linux
Nov 3, 2024 · Information Security

50 Critical Linux Ports You Must Close to Secure Your System

This guide lists the most dangerous Linux ports, explains their typical uses, the security risks they pose, and provides concrete recommendations—such as changing default ports, disabling services, and applying firewall rules—to harden your system against attacks.

Information SecurityLinuxPort Security
0 likes · 13 min read
50 Critical Linux Ports You Must Close to Secure Your System
Liangxu Linux
Liangxu Linux
Sep 28, 2024 · Information Security

How to Set Up a Reverse SSH Tunnel to Reach Machines Behind Firewalls

This guide explains the concept of reverse SSH, why it is needed to access servers behind restrictive firewalls, and provides step‑by‑step commands and configuration tips—including port forwarding with the -R option and recommended sshd settings—to establish a reliable reverse tunnel.

LinuxReverse TunnelSSH
0 likes · 6 min read
How to Set Up a Reverse SSH Tunnel to Reach Machines Behind Firewalls
Open Source Linux
Open Source Linux
Sep 26, 2024 · Information Security

Why Does a TCP Connection Send RST Packets? Deep Dive into Causes and Analysis

TCP RST packets, used to abruptly terminate or reject connections, appear at various stages—handshake, data transfer, and teardown—and can stem from server port closures, connection limits, malformed SYNs, firewall policies, timeouts, or middlebox interventions, with each scenario identifiable through detailed packet‑level analysis.

RSTTCPfirewall
0 likes · 9 min read
Why Does a TCP Connection Send RST Packets? Deep Dive into Causes and Analysis
Liangxu Linux
Liangxu Linux
Sep 5, 2024 · Information Security

Hardening RHEL7: Practical Linux Security Steps and Commands

This guide walks through comprehensive Linux security hardening on RHEL7, covering account lockout, password policies, SELinux configuration, SSH port changes, root login disabling, umask restriction, immutable system files, GCC limitation, log protection, minimal firewall rules, and related command examples.

LinuxPassword policyRHEL7
0 likes · 13 min read
Hardening RHEL7: Practical Linux Security Steps and Commands
Liangxu Linux
Liangxu Linux
Jun 24, 2024 · Information Security

Master iptables: Essential Commands, Rules, and Real-World Scenarios

This guide walks through installing iptables, loading kernel modules, starting the firewall, mastering core iptables options, creating and managing rules for ports, IPs, and protocols, saving configurations, troubleshooting pitfalls, and provides hands‑on exercises for Linux network security.

LinuxRule Managementcommand-line
0 likes · 19 min read
Master iptables: Essential Commands, Rules, and Real-World Scenarios
Java Tech Enthusiast
Java Tech Enthusiast
May 5, 2024 · Information Security

Preventing Malicious API Abuse: Security Measures and Best Practices

To prevent malicious API abuse, implement layered defenses such as firewalls to block unwanted traffic, robust captchas and SMS verification, mandatory authentication with permission controls, IP whitelisting for critical endpoints, HTTPS encryption, strict rate‑limiting via Redis, continuous monitoring with alerts, and an API gateway that centralizes filtering, authentication and throttling.

API SecurityCaptchaIP whitelist
0 likes · 9 min read
Preventing Malicious API Abuse: Security Measures and Best Practices
Liangxu Linux
Liangxu Linux
May 5, 2024 · Information Security

Master Linux Firewall: Step‑by‑Step firewalld, iptables & fail2ban Guide

This article provides a comprehensive, hands‑on tutorial for securing Linux systems by configuring firewalld with firewall‑cmd, managing iptables rules, enabling port forwarding, setting up fail2ban, and applying advanced techniques such as SELinux, TCP wrappers, and connection‑tracking to harden the firewall.

LinuxSysadminfirewall
0 likes · 9 min read
Master Linux Firewall: Step‑by‑Step firewalld, iptables & fail2ban Guide
Architect
Architect
Apr 27, 2024 · Information Security

How to Stop Malicious API Calls: 8 Practical Defense Strategies

This article walks through eight concrete techniques—firewall rules, captchas, authentication checks, IP whitelists, HTTPS encryption, rate limiting, monitoring, and an API gateway—to prevent abusive requests from draining resources or compromising critical services.

API SecurityAuthenticationCaptcha
0 likes · 11 min read
How to Stop Malicious API Calls: 8 Practical Defense Strategies
Liangxu Linux
Liangxu Linux
Apr 27, 2024 · Information Security

Why Linux Needs Fewer Antivirus Tools: 5 Security Advantages Explained

Linux’s open‑source nature, robust package management, kernel‑level protections, built‑in firewall, and community‑driven security practices result in far fewer malware threats, reducing the need for traditional antivirus software and external firewalls compared to Windows, as outlined in five key reasons.

AntivirusLinuxfirewall
0 likes · 5 min read
Why Linux Needs Fewer Antivirus Tools: 5 Security Advantages Explained
Liangxu Linux
Liangxu Linux
Apr 13, 2024 · Operations

Master Linux Network Interface Management: Essential Commands and Real-World Examples

This guide walks Linux system administrators through essential network interface commands—such as ifconfig, ip, route, netstat, traceroute, ping, ss, nmcli, iw, ethtool, firewall-cmd, and iptables—providing clear syntax, practical examples, and tips for configuring IP addresses, routes, DNS, VPNs, and firewall rules.

LinuxNetwork ConfigurationShell Commands
0 likes · 8 min read
Master Linux Network Interface Management: Essential Commands and Real-World Examples
MaGe Linux Operations
MaGe Linux Operations
Mar 19, 2024 · Information Security

Master Linux Firewalls: iptables, firewalld, and Netfilter Explained

This guide details Linux firewall components—including iptables, firewalld, and netfilter—explaining their coexistence, rule tables, chain structures, command syntax, and configuration files, while providing practical examples for managing zones, services, and packet filtering on RHEL/CentOS systems.

Linuxfirewallfirewalld
0 likes · 30 min read
Master Linux Firewalls: iptables, firewalld, and Netfilter Explained
MaGe Linux Operations
MaGe Linux Operations
Mar 11, 2024 · Information Security

Mastering CentOS7 Firewall: firewalld vs iptables and Zone Management

This guide explains the coexistence of firewalld and iptables on CentOS 7, compares their features, details zone concepts, outlines iptables architecture, and provides step‑by‑step commands for installing, configuring, and managing firewall rules, including rule syntax and saving configurations.

centos7firewallfirewalld
0 likes · 16 min read
Mastering CentOS7 Firewall: firewalld vs iptables and Zone Management
Selected Java Interview Questions
Selected Java Interview Questions
Feb 29, 2024 · Information Security

How to Prevent Malicious API Abuse: Firewalls, Captchas, Authentication, IP Whitelists, Encryption, Rate Limiting, Monitoring, and Gateways

This article explains a comprehensive set of techniques—including firewalls, captchas, authentication checks, IP whitelists, data encryption, rate limiting, monitoring, and API gateways—to protect interfaces from malicious abuse and ensure secure, reliable service operation.

API SecurityAuthenticationCaptcha
0 likes · 12 min read
How to Prevent Malicious API Abuse: Firewalls, Captchas, Authentication, IP Whitelists, Encryption, Rate Limiting, Monitoring, and Gateways
Su San Talks Tech
Su San Talks Tech
Feb 16, 2024 · Information Security

How to Prevent Malicious API Abuse: 8 Practical Security Measures

This article outlines eight effective techniques—including firewalls, captchas, authentication checks, IP whitelists, data encryption, rate limiting, monitoring, and API gateways—to protect interfaces from malicious traffic and costly abuse while balancing user experience.

API SecurityCaptchaencryption
0 likes · 9 min read
How to Prevent Malicious API Abuse: 8 Practical Security Measures
Java Tech Enthusiast
Java Tech Enthusiast
Jan 30, 2024 · Operations

Why Can’t I Reach My Cloud Server Port? 7 Common Pitfalls & Fixes

This guide enumerates seven typical reasons why a cloud server’s port may be unreachable—ranging from an unstarted application and incorrect port listening to security‑group rules, firewall settings, application‑level IP blocks, network outages, and user‑side issues—and provides concrete Linux commands and configuration steps to diagnose and resolve each problem.

LinuxNetwork DiagnosticsSecurity Group
0 likes · 6 min read
Why Can’t I Reach My Cloud Server Port? 7 Common Pitfalls & Fixes
Java Tech Enthusiast
Java Tech Enthusiast
Jan 21, 2024 · Information Security

Security Risks of Exposing Your Public IP Address

Exposing your public IP address can invite DDoS floods, vulnerability scanning, privacy breaches, and targeted phishing or malware attacks, so you should protect it with firewalls, regular updates, secure VPN connections, and by avoiding public disclosure on social platforms.

DDoSInformation SecurityPublic IP
0 likes · 3 min read
Security Risks of Exposing Your Public IP Address
IT Services Circle
IT Services Circle
Jan 17, 2024 · Operations

Common Reasons Why Cloud Server Ports Are Unreachable and How to Fix Them

This article lists the most frequent causes—such as an unstarted application, incorrect port listening, cloud security‑group settings, firewall rules, application‑level IP restrictions, network problems, and user‑side issues—and provides step‑by‑step commands and screenshots to help troubleshoot and restore access to cloud server ports.

Security Groupcloudfirewall
0 likes · 8 min read
Common Reasons Why Cloud Server Ports Are Unreachable and How to Fix Them
Liangxu Linux
Liangxu Linux
Jan 11, 2024 · Operations

Step‑by‑Step Guide to Install and Configure TigerVNC on Rocky Linux 8.9

This tutorial walks through installing TigerVNC on a Rocky Linux 8.9 server, creating VNC users, configuring systemd services, opening firewall ports, and connecting from a Windows 10 client with UltraVNC Viewer, providing all necessary commands and screenshots for a fully functional remote desktop setup.

LinuxRemote DesktopRocky Linux
0 likes · 12 min read
Step‑by‑Step Guide to Install and Configure TigerVNC on Rocky Linux 8.9
dbaplus Community
dbaplus Community
Nov 1, 2023 · Databases

What’s New in MySQL 8.2.0? Features, Deprecations, and Firewall Updates

MySQL 8.2.0, released on October 25, 2023, introduces audit‑log cleanup scripts, FIDO‑based authentication, named‑parameter support, numerous deprecations, firewall reload scheduling, expanded SQL syntax options, and new client and server features while dropping outdated functions and variables.

Database FeaturesRelease Notesdeprecation
0 likes · 9 min read
What’s New in MySQL 8.2.0? Features, Deprecations, and Firewall Updates
Laravel Tech Community
Laravel Tech Community
Oct 24, 2023 · Information Security

Configuring Firewalld on CentOS to Restrict Access to Specific Ports and IP Addresses

This article explains what Firewalld is, outlines its key features such as zones, runtime versus permanent settings, services, and dynamic updates, and provides step‑by‑step commands to create firewall rules that limit access to an Nginx server on port 8088 to a single IP address while leaving other ports unrestricted.

CentOSLinuxfirewall
0 likes · 8 min read
Configuring Firewalld on CentOS to Restrict Access to Specific Ports and IP Addresses
Liangxu Linux
Liangxu Linux
Sep 21, 2023 · Operations

How to Build a Simple Website Firewall with iptables on Linux

This step‑by‑step guide shows how to install iptables, clear existing rules, set default DROP policies, allow established connections and loopback traffic, block a specific IP from accessing port 80, save the configuration, and verify that the firewall works as intended.

LinuxSysadminfirewall
0 likes · 5 min read
How to Build a Simple Website Firewall with iptables on Linux
Open Source Linux
Open Source Linux
Jul 27, 2023 · Operations

17 Essential Linux Ops Tricks to Boost Your Productivity

This article compiles seventeen practical Linux administration techniques—from batch file handling and directory checks to log analysis, disk monitoring, firewall rules, and network capture—each illustrated with ready‑to‑run shell commands and concise explanations for sysadmins.

OpsShellSysadmin
0 likes · 8 min read
17 Essential Linux Ops Tricks to Boost Your Productivity
DeWu Technology
DeWu Technology
May 19, 2023 · Operations

Investigation and Resolution of In‑flight Wi‑Fi Connectivity Issues for a Mobile E‑Commerce App

The SRE team diagnosed an in‑flight Wi‑Fi outage for the DeWu e‑commerce app by reproducing the problem, capturing packets with ping, traceroute and tcpdump, discovered a firewall rule misclassifying the domain as a download site, and resolved it through a vendor‑issued policy update, restoring connectivity on both ATG and SATCOM links.

SRETCPWiFi
0 likes · 18 min read
Investigation and Resolution of In‑flight Wi‑Fi Connectivity Issues for a Mobile E‑Commerce App
Open Source Linux
Open Source Linux
May 16, 2023 · Information Security

Mastering Linux Firewalls: From IDS/IPS to iptables and Netfilter

This comprehensive guide explains intrusion detection and prevention systems, firewalls, waterwalls, Netfilter, and essential Linux firewall tools such as iptables, firewalld, and nftables, covering their architectures, command syntax, rule management, NAT, and packet capture with tcpdump.

IDSIPSLinux
0 likes · 24 min read
Mastering Linux Firewalls: From IDS/IPS to iptables and Netfilter
Open Source Linux
Open Source Linux
Apr 28, 2023 · Information Security

Understanding Firewalls: Types, Operation, and Choosing the Right One

This article explains what firewalls are, how they inspect network traffic, the various deployment and operational types—including hardware, software, cloud, packet‑filtering, stateful, proxy, and next‑generation firewalls—and their respective advantages and disadvantages.

cloud firewallfirewallhardware firewall
0 likes · 14 min read
Understanding Firewalls: Types, Operation, and Choosing the Right One
360 Tech Engineering
360 Tech Engineering
Apr 19, 2023 · Databases

ProxySQL Overview: Core Features, Configuration Layers, and Practical Use Cases

This article introduces ProxySQL as a high‑performance MySQL proxy, explains its request flow, multi‑layer configuration system, key tables, and demonstrates practical scenarios such as read‑write splitting, hostgroup weight tuning, replication‑lag handling, blacklist/whitelist rules, and firewall protection.

Database ProxyProxySQLSQL Routing
0 likes · 26 min read
ProxySQL Overview: Core Features, Configuration Layers, and Practical Use Cases
MaGe Linux Operations
MaGe Linux Operations
Dec 26, 2022 · Information Security

Master Linux Connection Tracking and iptables: Complete Guide

This article explains Linux connection tracking (conntrack), its implementation in Netfilter, and provides detailed instructions for using iptables—including rule queries, additions, deletions, modifications, saving, loading, match extensions, custom chains, and logging—to manage firewall behavior and network security effectively.

Linuxconntrackfirewall
0 likes · 31 min read
Master Linux Connection Tracking and iptables: Complete Guide
Practical DevOps Architecture
Practical DevOps Architecture
Dec 26, 2022 · Information Security

Understanding iptables: Tables, Chains, and NAT Operations

This article provides a comprehensive overview of iptables, detailing its host‑type filter table, limitations, the four main tables (filter, nat, mangle, raw), their respective chains, common command examples, and explains NAT concepts such as SNAT, DNAT, and MASQUERADE for Linux network security.

LinuxNATfirewall
0 likes · 6 min read
Understanding iptables: Tables, Chains, and NAT Operations
Su San Talks Tech
Su San Talks Tech
Dec 21, 2022 · Information Security

Block Malicious IPs on a Small Linux Site with iptables and Cron

This guide explains how to detect traffic attacks on a low‑traffic Linux website, split Nginx logs daily, identify IPs with excessive requests, and automatically block them using iptables rules scheduled via cron, complete with ready‑to‑run Bash scripts and common firewall commands.

BashDDoS mitigationLinux
0 likes · 9 min read
Block Malicious IPs on a Small Linux Site with iptables and Cron
Liangxu Linux
Liangxu Linux
Nov 27, 2022 · Operations

How to Open and Manage Linux Ports with firewalld and iptables

This guide explains step‑by‑step how to check firewall status, start firewalld, open specific ports, reload or restart the firewall on CentOS 7, and modify iptables directly on CentOS 6, including useful commands for listing, removing, and temporarily disabling ports.

CentOSLinuxfirewall
0 likes · 5 min read
How to Open and Manage Linux Ports with firewalld and iptables
Laravel Tech Community
Laravel Tech Community
Nov 6, 2022 · Information Security

Implementing Rate Limiting with iptables hashlimit Module

This article explains how to use the iptables hashlimit module to create a stateful rate‑limiting chain, details the required commands, clarifies the meaning of the --hashlimit‑upto and --hashlimit‑burst parameters, and provides an example illustrating credit‑based packet acceptance.

Linuxfirewallhashlimit
0 likes · 4 min read
Implementing Rate Limiting with iptables hashlimit Module
Liangxu Linux
Liangxu Linux
Sep 22, 2022 · Information Security

Comparing Top Open-Source Linux Firewalls: Features & Use Cases

An overview of essential Linux firewall solutions—including iptables, IPCop, Shorewall, UFW, Vuurmuur, pfSense, IPFire, Smoothwall, Endian, and ConfigServer—covers their core functions, key features, and typical use cases, helping administrators choose the right tool for network protection.

Linuxfirewalliptables
0 likes · 9 min read
Comparing Top Open-Source Linux Firewalls: Features & Use Cases
Liangxu Linux
Liangxu Linux
Sep 4, 2022 · Information Security

Restrict Host and Docker Ports to a Specific IP Using iptables

This guide shows how to use iptables to allow only a designated IP address to access a host's port 80, how to apply the same restriction to Docker containers by adding rules to the DOCKER-USER chain, and how to make the settings persistent across reboots.

DockerLinuxfirewall
0 likes · 3 min read
Restrict Host and Docker Ports to a Specific IP Using iptables
Open Source Linux
Open Source Linux
Aug 8, 2022 · Information Security

Secure Your Linux Server: 8 Essential SSH Hardening Steps

Learn how to protect your Linux server by disabling root SSH login, changing the default port, enforcing strong passwords, limiting login attempts, using SSH protocol 2, disabling forwarding, employing key‑based authentication, and restricting access by IP, with clear commands and configuration examples.

HardeningKeyAuthenticationLinux
0 likes · 7 min read
Secure Your Linux Server: 8 Essential SSH Hardening Steps
php Courses
php Courses
Aug 6, 2022 · Information Security

Building a Custom IP Filtering System for Public Servers with Automated Whitelisting

Facing constant port scans and malicious login attempts on a public server, the author outlines a self‑developed IP filtering solution that automatically adds trusted IPs to a whitelist, featuring multi‑process support, concurrency, daemon mode, a web management panel, traffic statistics, and interception logging.

IP filteringPHPServer Security
0 likes · 3 min read
Building a Custom IP Filtering System for Public Servers with Automated Whitelisting
Open Source Linux
Open Source Linux
Jul 18, 2022 · Information Security

Do You Really Need Antivirus or a Firewall on Linux? Myths Debunked

While Linux is generally more secure than other operating systems, many users wonder whether antivirus software or a firewall is necessary; this article explains why Linux desktop malware is rare, how package managers improve safety, the limited effectiveness of antivirus tools, and when a firewall truly matters.

AntivirusLinuxbest practices
0 likes · 9 min read
Do You Really Need Antivirus or a Firewall on Linux? Myths Debunked
Laravel Tech Community
Laravel Tech Community
Jun 20, 2022 · Information Security

Understanding iptables: Structure, Tables, Chains, Rules, and Practical Configuration

This article provides a comprehensive guide to iptables, explaining its hierarchical structure of tables, chains, and rules, detailing the built‑in tables (filter, nat, mangle, raw) and their chains, describing rule syntax and target actions, and offering practical command examples for listing, flushing, saving, setting default policies, and configuring SSH, HTTP, NAT, and IP‑based restrictions.

LinuxNATfirewall
0 likes · 17 min read
Understanding iptables: Structure, Tables, Chains, Rules, and Practical Configuration
Architects' Tech Alliance
Architects' Tech Alliance
Jun 10, 2022 · Information Security

Understanding Firewalls: Principles, Architecture, and Functions

This article explains what a firewall is, how it isolates risk zones from safe zones, its working principles, the typical architecture involving screening routers and proxy servers, and the key security functions it provides for protecting network communications.

Information Securityaccess controlfirewall
0 likes · 6 min read
Understanding Firewalls: Principles, Architecture, and Functions
Liangxu Linux
Liangxu Linux
May 22, 2022 · Information Security

Master firewalld: Zones, Services, Ports, Rich Rules & Direct Rules on Linux

This guide walks you through configuring firewalld on Linux, covering zones, temporary and permanent settings, service and port management, zone manipulation, rich rule creation, direct rule usage, and essential commands for enabling, disabling, and querying the firewall.

Information Securityfirewallfirewalld
0 likes · 15 min read
Master firewalld: Zones, Services, Ports, Rich Rules & Direct Rules on Linux
MaGe Linux Operations
MaGe Linux Operations
May 10, 2022 · Fundamentals

How Does NAT Traversal Really Work? A Deep Dive into Modern Techniques

This article explains the challenges of connecting two devices behind NAT and firewalls, explores the underlying principles of NAT, STUN, ICE, and related protocols, and presents practical strategies—including port mapping, relay fallback, and IPv6 considerations—to achieve reliable peer‑to‑peer communication.

ICENATSTUN
0 likes · 55 min read
How Does NAT Traversal Really Work? A Deep Dive into Modern Techniques
Architecture Digest
Architecture Digest
Mar 20, 2022 · Information Security

Comprehensive Linux Hardening Guide: Kernel, Sysctl, Boot Parameters, and Security Best Practices

This guide provides a detailed, step‑by‑step hardening strategy for Linux systems, covering distro selection, kernel choices, extensive sysctl tweaks, boot‑loader parameters, MAC policies, sandboxing, memory allocator hardening, compile‑time mitigations, root account protection, firewall rules, swap configuration, PAM policies, microcode updates, IPv6 privacy, partition mounting options, entropy sources, and physical security measures.

HardeningLinuxboot
0 likes · 51 min read
Comprehensive Linux Hardening Guide: Kernel, Sysctl, Boot Parameters, and Security Best Practices