Tagged articles
161 articles
Page 2 of 2
Efficient Ops
Efficient Ops
Feb 8, 2022 · Information Security

Kubelet Misconfiguration Triggered a Mining Attack – What We Learned

After discovering a compromised node in our self‑built Kubernetes cluster that was being used for Monero mining, we traced the breach to empty iptables rules and a misconfigured kubelet allowing anonymous API access, then outlined firewall hardening, network isolation, and secure kubelet practices to prevent future intrusions.

Mining Attackfirewallkubelet
0 likes · 6 min read
Kubelet Misconfiguration Triggered a Mining Attack – What We Learned
21CTO
21CTO
Feb 4, 2022 · Information Security

5 Essential SSH Best Practices to Harden Your Linux Server

This guide outlines five practical SSH security measures—including two‑factor authentication, changing default settings, certificate‑based login, bastion host deployment, and firewall configuration—to significantly improve the baseline protection of Linux servers.

Bastion HostLinux securitySSH
0 likes · 7 min read
5 Essential SSH Best Practices to Harden Your Linux Server
The Dominant Programmer
The Dominant Programmer
Dec 28, 2021 · Backend Development

How to Install and Run Node-RED on CentOS 7 via npm

This guide walks through installing Node on CentOS 7, using npm to install Node-RED globally, launching the service, and opening the firewall so the editor is reachable at port 1880, including the required unsafe-perm flag for proper permission handling.

InstallationNode-REDNode.js
0 likes · 2 min read
How to Install and Run Node-RED on CentOS 7 via npm
MaGe Linux Operations
MaGe Linux Operations
Dec 8, 2021 · Information Security

Master Linux Firewall: iptables, firewalld & Netfilter Deep Dive

This comprehensive guide explains Linux firewall fundamentals, covering concepts, classifications, and detailed configurations of iptables, firewalld, and nftables, including NAT, SNAT, DNAT, rule syntax, extensions, optimization practices, and real‑world case studies with diagrams and mind maps to help both beginners and experienced administrators secure their systems.

firewallfirewalldiptables
0 likes · 6 min read
Master Linux Firewall: iptables, firewalld & Netfilter Deep Dive
Efficient Ops
Efficient Ops
Nov 26, 2021 · Information Security

How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do

A self‑built Kubernetes cluster suffered a crypto‑mining intrusion due to empty iptables and a misconfigured kubelet, prompting a detailed post‑mortem that outlines the symptoms, root‑cause analysis, and practical hardening steps to protect similar environments.

crypto miningfirewallincident response
0 likes · 5 min read
How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do
Architects' Tech Alliance
Architects' Tech Alliance
Nov 13, 2021 · Information Security

Understanding Firewalls: Definition, Principles, Architecture, and Functions

This article explains firewalls by defining their purpose, describing how they monitor and filter network traffic, outlining their architecture—including screening routers and proxy servers—and listing their key security functions such as access control, traffic filtering, logging, and attack detection.

Information Securityaccess controlfirewall
0 likes · 7 min read
Understanding Firewalls: Definition, Principles, Architecture, and Functions
MaGe Linux Operations
MaGe Linux Operations
Oct 27, 2021 · Information Security

Mastering iptables: A Complete Guide to Linux Firewall Tables, Chains, and Rules

This article provides a comprehensive overview of iptables, explaining its table and chain architecture, detailing the built‑in tables (filter, nat, mangle, raw), describing common chains and targets, and offering practical command‑line examples for listing, flushing, persisting, and customizing firewall rules on Linux systems.

System Administrationfirewalliptables
0 likes · 19 min read
Mastering iptables: A Complete Guide to Linux Firewall Tables, Chains, and Rules
Liangxu Linux
Liangxu Linux
Sep 20, 2021 · Information Security

Mastering iptables: Tables, Chains, Rules and Practical Commands

This guide explains the architecture of iptables—including tables, chains and rules—covers common targets, shows how to list, flush, persist and modify rules, and provides complete examples for SSH, HTTP, NAT port forwarding and source‑IP restrictions on Linux firewalls.

LinuxNATfirewall
0 likes · 16 min read
Mastering iptables: Tables, Chains, Rules and Practical Commands
Byte Quality Assurance Team
Byte Quality Assurance Team
Jul 28, 2021 · Information Security

Understanding iptables: Chains, Tables, Rules, and Common Commands

This article provides a comprehensive guide to iptables, covering its underlying netfilter architecture, the five built‑in chains and tables, rule syntax, common match and target options, and practical command examples for adding, deleting, querying, and managing firewall rules on Linux systems.

Linuxcommand-linefirewall
0 likes · 15 min read
Understanding iptables: Chains, Tables, Rules, and Common Commands
Practical DevOps Architecture
Practical DevOps Architecture
Mar 2, 2021 · Information Security

Automating IP Blocking with iptables Using a Bash Script

This article explains how iptables filters network packets and provides a Bash script that monitors Nginx access logs, identifies high‑frequency IPs, and automatically adds firewall rules to drop those IPs, with a suggestion for more robust nginx‑Lua interception.

firewalliptables
0 likes · 3 min read
Automating IP Blocking with iptables Using a Bash Script
Liangxu Linux
Liangxu Linux
Dec 6, 2020 · Information Security

Master Linux Security: From Firewall Rules to User & File Permissions

This guide walks through essential Linux security measures, covering common attack vectors, network and OS hardening, firewall configuration with iptables, user and group management, and detailed file‑permission techniques, providing practical commands and examples for robust system protection.

File PermissionsLinuxSystem Administration
0 likes · 20 min read
Master Linux Security: From Firewall Rules to User & File Permissions
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 28, 2020 · Operations

How to Install and Configure Jenkins on CentOS 7

This guide walks through installing Jenkins on CentOS 7, covering prerequisite JDK setup, repository configuration, service start‑up, troubleshooting common startup errors, firewall adjustments, and port configuration to get a functional CI/CD server.

DevOpsInstallationJenkins
0 likes · 6 min read
How to Install and Configure Jenkins on CentOS 7
Open Source Linux
Open Source Linux
May 14, 2020 · Information Security

Master iptables: Essential Command Syntax and Practical Examples

This article breaks down the fundamental iptables command syntax, explains each option and parameter, provides practical examples for adding, inserting, listing, deleting, and managing firewall rules, and covers common modules, backup, and restoration techniques for effective Linux network security.

LinuxNATSNAT
0 likes · 13 min read
Master iptables: Essential Command Syntax and Practical Examples
Ops Development Stories
Ops Development Stories
Apr 26, 2020 · Information Security

Essential Linux & Windows System Hardening Steps for Strong Security

This guide details practical hardening techniques for Linux and Windows servers, covering SSH configuration, password policies, account lockout, su restrictions, ICMP suppression, firewall rules, RDP port changes, security policies, and disabling vulnerable services to significantly improve system security.

LinuxPassword policySSH
0 likes · 10 min read
Essential Linux & Windows System Hardening Steps for Strong Security
Efficient Ops
Efficient Ops
Feb 3, 2020 · Information Security

Mastering Linux iptables: From Theory to Real-World Service Mesh Deployments

This article explains the fundamentals of Linux iptables—including its role with netfilter, rule ordering, tables and chains—then walks through packet‑processing flows and three practical scenarios such as Envoy traffic hijacking, massive long‑connection handling, and bastion‑host security.

LinuxMicroservicesService Mesh
0 likes · 16 min read
Mastering Linux iptables: From Theory to Real-World Service Mesh Deployments
Programmer DD
Programmer DD
Dec 22, 2019 · Operations

Master nftables: Build a Simple Linux Firewall with Token Bucket Rate Limiting

This guide walks you through installing nftables on CentOS 7, creating a basic firewall with INPUT, FORWARD, and OUTPUT chains, leveraging built‑in sets and maps for efficient IP and port matching, implementing connection‑tracking, token‑bucket rate limiting for ICMP, handling TCP/UDP traffic, persisting rules, and configuring rsyslog logging.

Token Bucketconnection trackingfirewall
0 likes · 17 min read
Master nftables: Build a Simple Linux Firewall with Token Bucket Rate Limiting
Ops Development Stories
Ops Development Stories
Nov 21, 2019 · Information Security

Master Linux firewalld: From Basics to Advanced Zone Management

This comprehensive guide explains Linux firewall fundamentals, the netfilter framework, firewalld architecture, zone and service management, command‑line and graphical tools, as well as practical examples of configuring zones, services, ports, rich rules, and troubleshooting common issues.

Linuxfirewallfirewalld
0 likes · 25 min read
Master Linux firewalld: From Basics to Advanced Zone Management
MaGe Linux Operations
MaGe Linux Operations
Aug 31, 2019 · Information Security

Essential Linux Hardening: 14 Steps to Secure Your Servers

This guide explains why Linux dominates modern IT, then walks through fourteen practical hardening measures—including physical security, updates, minimal installations, login restrictions, user and file management, firewall configuration, package handling, disabling Ctrl‑Alt‑Del, monitoring, log centralization, backups, security tools, and management policies—to build a robust and attack‑resistant Linux server.

BackupServer Administrationfirewall
0 likes · 14 min read
Essential Linux Hardening: 14 Steps to Secure Your Servers
MaGe Linux Operations
MaGe Linux Operations
Dec 5, 2018 · Information Security

25 Essential Linux Hardening Tips to Secure Your Servers

This comprehensive guide presents 25 practical Linux hardening techniques—from BIOS protection and disk partitioning to SELinux configuration, firewall rules, and user account management—helping system administrators strengthen server security and defend against potential attacks.

HardeningLinuxSELinux
0 likes · 14 min read
25 Essential Linux Hardening Tips to Secure Your Servers
MaGe Linux Operations
MaGe Linux Operations
Dec 3, 2018 · Information Security

Essential Linux Security Hardening: 12 Practical Commands to Protect Your System

This article walks through twelve essential Linux security techniques—including console access restrictions, password aging, sudo notifications, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, SELinux reporting, and sealert usage—providing commands and configuration tips to fortify a system.

HardeningLinuxSELinux
0 likes · 15 min read
Essential Linux Security Hardening: 12 Practical Commands to Protect Your System
MaGe Linux Operations
MaGe Linux Operations
Nov 17, 2018 · Information Security

Hardening Linux: Practical Commands to Boost System Security

This article presents a comprehensive guide on strengthening Linux systems by applying console restrictions, password policies, sudo notifications, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, and SELinux tools such as aureport and sealert.

HardeningLinuxSELinux
0 likes · 15 min read
Hardening Linux: Practical Commands to Boost System Security
Architects' Tech Alliance
Architects' Tech Alliance
Nov 5, 2018 · Operations

Load Balancing: Concepts, Types, Advantages, and Algorithms

This article explains load balancing as a clustering technology that distributes network services across multiple devices or links to improve performance, scalability, reliability, and manageability, and it details various types, strategies, and algorithms used in modern networks.

AlgorithmsScalabilityServer
0 likes · 13 min read
Load Balancing: Concepts, Types, Advantages, and Algorithms
Efficient Ops
Efficient Ops
Apr 19, 2018 · Information Security

How to Detect and Mitigate Oracle WebLogic CVE‑2018‑2628 Remote Code Execution

Oracle's April Critical Patch Update fixes a high‑severity remote code execution vulnerability (CVE‑2018‑2628) in WebLogic, and this guide explains the affected versions, impact scope, detection methods, and both official and interim protection measures using NIPS and next‑generation firewalls.

CVE-2018-2628NIPSSecurity Patch
0 likes · 9 min read
How to Detect and Mitigate Oracle WebLogic CVE‑2018‑2628 Remote Code Execution
MaGe Linux Operations
MaGe Linux Operations
Mar 4, 2018 · Information Security

Hardening OpenSSH: Essential Steps to Secure Your SSH Server

This guide walks you through securing OpenSSH on Linux/Unix systems by configuring key‑based authentication, disabling root and password logins, restricting users, tightening firewall rules, applying rate limits, and using additional tools to protect against brute‑force attacks, all with concrete command examples.

Linux securityOpenSSHPublic Key Authentication
0 likes · 18 min read
Hardening OpenSSH: Essential Steps to Secure Your SSH Server
MaGe Linux Operations
MaGe Linux Operations
Dec 4, 2017 · Information Security

How to Harden Your Linux Server Against Unauthorized Access

This guide walks you through essential steps to secure a Linux server, including regular system updates, automatic security patches, creating restricted user accounts, hardening SSH with key authentication and daemon options, deploying Fail2Ban, removing unused services, and configuring firewalls for robust protection.

Fail2banSSH HardeningServer Security
0 likes · 13 min read
How to Harden Your Linux Server Against Unauthorized Access
Practical DevOps Architecture
Practical DevOps Architecture
Sep 6, 2017 · Information Security

Configuring SELinux and iptables on Red Hat/CentOS Systems

This guide explains how to permanently disable SELinux, temporarily change its mode, and provides a comprehensive tutorial on using iptables—including table concepts, basic commands, rule management, scripting, NAT configuration, and saving/restoring firewall rules—on Red Hat/CentOS Linux.

CentOSLinux securitySELinux
0 likes · 16 min read
Configuring SELinux and iptables on Red Hat/CentOS Systems
dbaplus Community
dbaplus Community
Aug 9, 2017 · Information Security

Secure Enterprise Ops: Network Segmentation, Hardware, Monitoring & Recovery

This guide outlines practical steps for constructing a secure enterprise operations platform, covering network zone segmentation, selection and deployment of firewalls, IPS/IDS/WAF, endpoint management, web traffic control, monitoring, disaster‑recovery procedures, and incident response best practices to protect corporate data and systems.

IDSIPSWAF
0 likes · 14 min read
Secure Enterprise Ops: Network Segmentation, Hardware, Monitoring & Recovery
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2017 · Operations

Build a Secure LAN with iptables NAT and DHCP on CentOS

This guide walks through setting up a LAN with a static‑IP server, configuring iptables firewall rules, enabling NAT and port forwarding, and deploying a DHCP server on CentOS, complete with sample configuration files and command‑line steps.

CentOSDHCPNAT
0 likes · 6 min read
Build a Secure LAN with iptables NAT and DHCP on CentOS
ITPUB
ITPUB
Jul 19, 2017 · Information Security

Essential Linux Hardening: Minimalism, Port Tweaks, and Kernel Optimizations

This guide walks through practical Linux hardening steps—including minimal installation, SSH port changes, sudo privilege tailoring, extensive kernel sysctl tuning, firewall adjustments, system version hiding, file protection, and package installation strategies—to boost security and performance while keeping the system lean.

SSHSudoSystem Hardening
0 likes · 6 min read
Essential Linux Hardening: Minimalism, Port Tweaks, and Kernel Optimizations
MaGe Linux Operations
MaGe Linux Operations
Apr 15, 2017 · Information Security

Boost Your Linux Security: Essential Commands and Best Practices

This article provides a comprehensive, step‑by‑step guide to hardening a Linux system, covering console restrictions, password policies, sudo alerts, SSH tuning, Tripwire intrusion detection, firewalld and iptables management, compiler restrictions, immutable files, SELinux auditing with aureport, and the sealert tool.

HardeningSELinuxSSH
0 likes · 14 min read
Boost Your Linux Security: Essential Commands and Best Practices
MaGe Linux Operations
MaGe Linux Operations
Apr 1, 2017 · Information Security

Hardening Linux Servers: Essential SSH & Firewall Configurations

This guide explains how to secure Linux servers against common attacks by configuring SELinux, iptables, SSH public‑key authentication, and immutable file attributes, while also showing real‑world scan results and practical hardening steps.

Information SecuritySELinuxSSH Hardening
0 likes · 7 min read
Hardening Linux Servers: Essential SSH & Firewall Configurations
MaGe Linux Operations
MaGe Linux Operations
Mar 30, 2017 · Information Security

25 Essential Linux Hardening Tips to Boost System Security

Discover 25 practical Linux hardening techniques—from BIOS protection and minimal package installation to SELinux configuration, firewall rules, and user account management—that help system administrators strengthen security, prevent attacks, and maintain a resilient, well‑configured server environment.

HardeningPassword policySELinux
0 likes · 14 min read
25 Essential Linux Hardening Tips to Boost System Security
MaGe Linux Operations
MaGe Linux Operations
Mar 28, 2017 · Information Security

Hardening Linux Servers: Essential Security Configurations & Best Practices

This guide walks through comprehensive Linux server hardening techniques, covering user account management, service minimization, file permission tightening, virtual memory tuning, log handling, and firewall configuration with iptables and ipchains, providing step‑by‑step commands and screenshots to enhance system security and stability.

HardeningServer SecuritySystem optimization
0 likes · 16 min read
Hardening Linux Servers: Essential Security Configurations & Best Practices
MaGe Linux Operations
MaGe Linux Operations
Mar 27, 2017 · Information Security

Top 10 Enterprise Linux Server Security Practices You Must Implement

This guide outlines ten essential security measures for enterprise Linux servers, covering password management, network service restriction, user account controls, root privilege handling, logging, firewall and IDS integration, vulnerability tracking, and regular patch updates to strengthen system protection.

Serverfirewallpassword
0 likes · 14 min read
Top 10 Enterprise Linux Server Security Practices You Must Implement
Practical DevOps Architecture
Practical DevOps Architecture
Mar 2, 2017 · Operations

Sample Huawei Router Configuration Commands

This document provides a comprehensive set of Huawei router configuration commands covering system settings, SNMP, time, portal loading, security policies, ACL rules, user authentication, firewall zones, interface definitions, IP addressing, NAT, static routes, and user interface configurations.

ACLConfigurationNAT
0 likes · 4 min read
Sample Huawei Router Configuration Commands
MaGe Linux Operations
MaGe Linux Operations
Jan 2, 2017 · Information Security

Master iptables: Essential Commands and Advanced Matching Techniques

This guide walks through iptables fundamentals—including listing, flushing, and setting default policies—then demonstrates adding, inserting, replacing, and deleting rules, explores basic and extended match modules, and provides practical exercises for building robust firewall configurations.

Linuxfirewalliptables
0 likes · 7 min read
Master iptables: Essential Commands and Advanced Matching Techniques
MaGe Linux Operations
MaGe Linux Operations
Sep 6, 2016 · Information Security

How to Harden Nginx: Buffer Limits, Timeouts, and Security Best Practices

This guide walks through securing an Nginx web server by configuring buffer size limits, timeouts, concurrent connection controls, host and method restrictions, user‑agent blocking, hot‑link protection, directory access rules, SSL setup, PHP hardening, chroot isolation, and firewall‑level IP connection limits.

NginxSSLbuffer
0 likes · 14 min read
How to Harden Nginx: Buffer Limits, Timeouts, and Security Best Practices
ITPUB
ITPUB
Aug 25, 2016 · Information Security

Understanding Linux Netfilter: How the Kernel Handles Packet Filtering

This article provides an in‑depth technical overview of Linux Netfilter, explaining its hook architecture, key macros, packet‑processing flow, and how iptables interacts with the kernel to filter, NAT, and track connections across the IPv4 stack.

Linuxfirewalliptables
0 likes · 15 min read
Understanding Linux Netfilter: How the Kernel Handles Packet Filtering
MaGe Linux Operations
MaGe Linux Operations
Mar 3, 2016 · Information Security

Master iptables Quickly with This Visual Mind Map

This article presents a concise visual mind map of iptables, illustrating its core concepts, chains, tables, and typical rules, enabling readers to quickly grasp firewall configuration and operation at a glance in.

Linuxfirewalliptables
0 likes · 1 min read
Master iptables Quickly with This Visual Mind Map
ITPUB
ITPUB
Feb 25, 2016 · Information Security

Hardening Linux Against SYN Flood & DDoS: sysctl, iptables & DDoS Deflate

This guide explains how to protect Linux servers from SYN flood and DDoS attacks by tuning sysctl parameters, applying iptables rules, installing the free DDoS‑deflate script, and monitoring nginx logs to identify and block malicious IPs and user agents.

DDoS mitigationLinuxfirewall
0 likes · 10 min read
Hardening Linux Against SYN Flood & DDoS: sysctl, iptables & DDoS Deflate
Practical DevOps Architecture
Practical DevOps Architecture
May 12, 2015 · Information Security

Configuring Email Filtering Policies on USG Firewall

This guide details how to set up USG firewall email filtering to block specific attachment types, limit attachment size, and prevent messages containing prohibited keywords by creating pattern groups, defining a mail‑filter policy, applying it to the outbound interzone firewall view, and verifying the configuration.

Information SecurityUSGattachment control
0 likes · 5 min read
Configuring Email Filtering Policies on USG Firewall
MaGe Linux Operations
MaGe Linux Operations
Aug 9, 2014 · Information Security

Master Linux iptables: From Basics to Advanced Firewall Rules

This comprehensive guide explains Linux firewall concepts, the evolution and operation of iptables, rule chains, policies, command syntax, matching criteria, state tracking, NAT/DNAT techniques, and practical exercises, providing readers with the knowledge to configure and manage secure network access effectively.

LinuxNATfirewall
0 likes · 17 min read
Master Linux iptables: From Basics to Advanced Firewall Rules