Tagged articles
69 articles
Page 1 of 1
Ops Community
Ops Community
May 21, 2026 · Information Security

How to Harden Docker in Production: From Image Scanning to Runtime Protection

This guide walks DevOps engineers through a complete Docker hardening workflow—explaining the security model, recommending safe base images, removing secrets, applying multi‑stage builds, enforcing image signing, configuring runtime privileges, resource limits, network isolation, logging, and continuous audit with tools like Trivy, Cosign, Falco and CIS benchmarks.

CIS BenchmarkDockerHardening
0 likes · 29 min read
How to Harden Docker in Production: From Image Scanning to Runtime Protection
21CTO
21CTO
May 17, 2026 · Fundamentals

How C++26’s Hardened Standard Library Tackles Undefined Behavior

The article explains that undefined behavior in C++ often stems from standard‑library misuse, describes the new C++26 P3471R4 hardened library that turns such UB into runtime contract violations, cites Google’s production data showing over a thousand bugs found with only 0.30% overhead and a 30% drop in segfaults, and details how to enable and use the feature.

ContractsHardeningP3471R4
0 likes · 8 min read
How C++26’s Hardened Standard Library Tackles Undefined Behavior
Ops Community
Ops Community
May 4, 2026 · Information Security

Investigating and Securing a Server After a Suspicious Login

When a production server shows unexpected high CPU usage and unknown login activity, this guide walks Linux ops engineers through confirming intrusion, stopping the attacker, tracing the attack path, removing backdoors, restoring system integrity, and applying hardening measures to prevent future breaches.

ForensicsHardeningLinux
0 likes · 27 min read
Investigating and Securing a Server After a Suspicious Login
MaGe Linux Operations
MaGe Linux Operations
Apr 26, 2026 · Information Security

How to Harden SSH Securely Without Locking Yourself Out

This guide explains why the default SSH configuration is vulnerable, walks through protocol basics, key generation, server hardening settings, step‑by‑step procedures to avoid being locked out, key management best practices, troubleshooting tips, and provides a complete hardening script for Linux systems.

Configuration ManagementFail2banHardening
0 likes · 25 min read
How to Harden SSH Securely Without Locking Yourself Out
MaGe Linux Operations
MaGe Linux Operations
Apr 17, 2026 · Information Security

Master Linux Privilege Escalation: Risks, Exploits, and Hardening Guide

This comprehensive guide explains the most common Linux privilege‑escalation vectors—including unsafe SUID binaries, sudo misconfigurations, cron jobs, password and SSH‑key leaks, kernel vulnerabilities, container escapes, and file‑permission flaws—while providing concrete detection commands and practical hardening steps for each risk.

BashHardeningLinux security
0 likes · 23 min read
Master Linux Privilege Escalation: Risks, Exploits, and Hardening Guide
MaGe Linux Operations
MaGe Linux Operations
Mar 11, 2026 · Information Security

How to Harden Linux Servers: A Step‑by‑Step Guide to Secure SSH, Accounts, Firewalls, and Auditing

This comprehensive guide walks you through Linux host hardening by explaining the security baseline, detailing default configurations, highlighting common pitfalls, and providing concrete, verifiable adjustments for account policies, SSH, firewalls, kernel parameters, file permissions, and audit logging, complete with scripts, examples, and real‑world case studies.

AuditdHardeningLinux
0 likes · 40 min read
How to Harden Linux Servers: A Step‑by‑Step Guide to Secure SSH, Accounts, Firewalls, and Auditing
Ops Community
Ops Community
Feb 25, 2026 · Databases

Hardening MySQL 8.4: Permissions, SSL, Auditing & Compliance Guide

This guide provides a step‑by‑step, production‑ready hardening plan for MySQL 8.4, covering permission hierarchy design, strong password policies, audit‑log configuration, TLS encryption, network access controls, firewall rules, backup scripts, monitoring metrics, and best‑practice recommendations to meet PCI‑DSS and Chinese GB/T 22239 compliance.

HardeningPermissionsTLS
0 likes · 27 min read
Hardening MySQL 8.4: Permissions, SSL, Auditing & Compliance Guide
MaGe Linux Operations
MaGe Linux Operations
Feb 8, 2026 · Operations

Mastering SSH Hardening: From Port Changes to Certificate Authentication

This comprehensive guide walks you through securing SSH on Linux servers by changing the default port, disabling root and password logins, enforcing key‑based authentication, configuring fail2ban, using ProxyJump for multi‑hop access, managing keys at scale, and applying best‑practice hardening techniques.

ConfigurationFail2banHardening
0 likes · 46 min read
Mastering SSH Hardening: From Port Changes to Certificate Authentication
Raymond Ops
Raymond Ops
Dec 28, 2025 · Information Security

Master Docker Security: End‑to‑End Hardening from Image Build to Runtime

This practical guide walks operations engineers through a complete Docker security hardening workflow—covering trusted base‑image selection, vulnerability scanning, multi‑stage builds, image signing, runtime privilege reduction, network isolation, secret management, monitoring, and real‑world CI/CD integration—to build a resilient, enterprise‑grade container environment.

ContainerDockerHardening
0 likes · 18 min read
Master Docker Security: End‑to‑End Hardening from Image Build to Runtime
Raymond Ops
Raymond Ops
Dec 18, 2025 · Information Security

Build an Impenetrable Linux Server: Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion analysis and a multi‑layered hardening strategy for Linux servers, covering SSH security, Fail2Ban, firewalls, iptables, IDS, file integrity monitoring, automated alerts, emergency response, and advanced techniques to create a robust defense.

Fail2banHardeningIDS
0 likes · 15 min read
Build an Impenetrable Linux Server: Step‑by‑Step Security Hardening Guide
Ray's Galactic Tech
Ray's Galactic Tech
Dec 9, 2025 · Information Security

Master Elasticsearch Security: Complete Network, Auth, TLS & Hardening Guide

This comprehensive guide walks you through securing Elasticsearch by isolating the network, enabling authentication and role‑based access, encrypting traffic with TLS, upgrading legacy versions, configuring audit logging, setting up reverse‑proxy protection, and applying enterprise‑grade best practices to prevent data leaks.

AuthenticationElasticsearchHardening
0 likes · 10 min read
Master Elasticsearch Security: Complete Network, Auth, TLS & Hardening Guide
Liangxu Linux
Liangxu Linux
Nov 16, 2025 · Information Security

Essential Linux Security Vulnerabilities & Practical Hardening Guide for Ops Engineers

This comprehensive guide walks ops engineers through the most common Linux security flaws—from sudo misconfigurations and SUID/SGID risks to SSH, web server, kernel, container, file system, logging, firewall, and compliance issues—offering concrete code snippets, step‑by‑step hardening measures, and actionable best‑practice recommendations.

HardeningLinuxOps
0 likes · 16 min read
Essential Linux Security Vulnerabilities & Practical Hardening Guide for Ops Engineers
Xiao Liu Lab
Xiao Liu Lab
Nov 4, 2025 · Information Security

7 Essential Redis Security Baselines to Harden Your Production Deployments

This guide details seven critical Redis hardening steps—including timeout, syslog, strong password, non‑root execution, strict file permissions, trusted bind addresses, and command renaming—to transform insecure default settings into a verifiable, production‑ready security baseline.

ConfigurationHardeningLinux
0 likes · 13 min read
7 Essential Redis Security Baselines to Harden Your Production Deployments
Xiao Liu Lab
Xiao Liu Lab
Nov 3, 2025 · Information Security

13 Essential Tomcat Security Baselines to Harden Your Server

Learn how to secure Apache Tomcat by applying a 13‑item baseline that covers account permissions, root‑less operation, strong passwords, disabling manager apps, preventing directory listing, restricting HTTP methods, enabling HTTPS, changing default ports, configuring access logs, custom error pages, hiding server banners, and limiting connections.

HardeningServerTomcat
0 likes · 12 min read
13 Essential Tomcat Security Baselines to Harden Your Server
Xiao Liu Lab
Xiao Liu Lab
Oct 27, 2025 · Information Security

How to Harden Nginx: Hide Version, Block Sensitive Files, and Stop Host Header Attacks

This guide walks you through securing an Nginx gateway by hiding its version, blocking access to sensitive files and directories, preventing Host header attacks, adding essential security response headers, and providing a complete configuration template with verification steps for enterprise‑grade protection.

HardeningNginxWeb server
0 likes · 8 min read
How to Harden Nginx: Hide Version, Block Sensitive Files, and Stop Host Header Attacks
Raymond Ops
Raymond Ops
Oct 13, 2025 · Information Security

How to Secure Your Ubuntu Kubernetes Cluster: A Step‑by‑Step Hardening Guide

This comprehensive guide explains how to harden an Ubuntu‑based Kubernetes cluster with external IPs by applying system hardening, firewall rules, TLS encryption, Calico network policies, RBAC permissions, audit logging, and verification steps to achieve a multi‑layered security posture.

HardeningKubernetesRBAC
0 likes · 17 min read
How to Secure Your Ubuntu Kubernetes Cluster: A Step‑by‑Step Hardening Guide
Liangxu Linux
Liangxu Linux
Sep 22, 2025 · Information Security

Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion case analysis, multi‑layer defense strategies—including SSH hardening, Fail2Ban, firewall rules, IDS deployment, file integrity monitoring, advanced techniques like port knocking and honeypots—and incident response procedures, providing concrete commands and scripts to secure a Linux server from end to end.

Fail2banHardeningIDS
0 likes · 13 min read
Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide
MaGe Linux Operations
MaGe Linux Operations
Sep 6, 2025 · Information Security

10 Proven SSH Hardening Techniques to Stop Bruteforce Attacks

This guide shares ten battle‑tested methods for hardening SSH, from changing the default port and disabling root login to using key authentication, fail2ban, IP whitelisting, two‑factor authentication, bastion hosts, and automated monitoring, helping you build a multilayered defense against brute‑force attacks.

HardeningSSHbrute force
0 likes · 23 min read
10 Proven SSH Hardening Techniques to Stop Bruteforce Attacks
Liangxu Linux
Liangxu Linux
Sep 3, 2025 · Information Security

Hardening CentOS 7/8: 15 Essential Security Configurations

This guide walks through fifteen practical steps to secure a CentOS 7 or 8 server, covering user management, SSH hardening, password policies, file permissions, logging, and kernel protections, each with clear commands and explanations to reduce attack surface.

CentOSHardeningLinux
0 likes · 12 min read
Hardening CentOS 7/8: 15 Essential Security Configurations
Raymond Ops
Raymond Ops
Sep 1, 2025 · Information Security

Master Nginx Security: Essential Hardening Techniques for Safer Web Servers

This comprehensive guide walks system administrators and developers through essential Nginx hardening steps—including hiding version information, restricting sensitive directories, configuring custom error pages, enabling HTTPS, applying CSP, setting proper file permissions, adding security headers, limiting connections, whitelisting IPs, optimizing SSL, securing file uploads, and mitigating common attacks—to dramatically improve web server security.

DevOpsHardening
0 likes · 30 min read
Master Nginx Security: Essential Hardening Techniques for Safer Web Servers
Ops Community
Ops Community
Aug 30, 2025 · Information Security

Master Linux Server Hardening: From Manual Steps to Automated Scripts

This comprehensive guide walks you through Linux server security hardening, covering real-world incident analysis, a detailed checklist of system, SSH, firewall, kernel and logging configurations, plus ready-to-use Bash scripts, Ansible playbooks, Docker hardening, monitoring tools, and actionable steps to build an enterprise‑grade defense.

AnsibleDockerHardening
0 likes · 17 min read
Master Linux Server Hardening: From Manual Steps to Automated Scripts
Liangxu Linux
Liangxu Linux
Aug 10, 2025 · Information Security

How to Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion analysis, multi‑layer SSH hardening, Fail2Ban, firewall and iptables rules, intrusion detection with OSSEC, automated monitoring scripts, advanced techniques like port knocking and honeypots, and a complete incident‑response playbook to secure any Linux server.

Fail2banHardeningIDS
0 likes · 14 min read
How to Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide
Liangxu Linux
Liangxu Linux
Jun 16, 2025 · Information Security

Hardening CentOS 7/8: Essential Security Baseline Steps

This guide outlines a comprehensive set of security hardening measures for CentOS 7/8 servers, including creating non‑root users, disabling root SSH login, configuring password policies, tightening SSH settings, enabling logging, and applying kernel protections such as ASLR to reduce attack surface.

HardeningPasswordPolicySSH
0 likes · 12 min read
Hardening CentOS 7/8: Essential Security Baseline Steps
Liangxu Linux
Liangxu Linux
May 2, 2025 · Information Security

Hardening Linux Servers to Level‑3 Security with Open‑Source Check and Protective Scripts

This article introduces open‑source Linux server hardening scripts that meet Level‑3 security protection requirements, outlines the essential security controls such as identity verification, access control, auditing, and intrusion prevention, and provides step‑by‑step usage instructions for both checking and applying the protective scripts.

HardeningLevel 3security
0 likes · 8 min read
Hardening Linux Servers to Level‑3 Security with Open‑Source Check and Protective Scripts
Open Source Linux
Open Source Linux
Apr 28, 2025 · Information Security

Hardening CentOS 7/8: Essential Security Configurations to Protect Your Linux Servers

This guide walks you through a series of practical security measures for CentOS 7/8—including creating non‑root users, tightening SSH settings, enforcing password policies, securing logging, and applying kernel hardening—so you can significantly reduce the risk of unauthorized access and system compromise.

CentOSHardeningPassword policy
0 likes · 12 min read
Hardening CentOS 7/8: Essential Security Configurations to Protect Your Linux Servers
Raymond Ops
Raymond Ops
Apr 16, 2025 · Information Security

Boost Linux Server Security: Practical Hardening Steps for RHEL7

This guide walks through a comprehensive Linux hardening checklist for RHEL7, covering account locking, password policies, SSH port changes, SELinux activation, firewall tightening, and file attribute protections to elevate the system to a B1 security level.

HardeningLinuxRHEL7
0 likes · 12 min read
Boost Linux Server Security: Practical Hardening Steps for RHEL7
MaGe Linux Operations
MaGe Linux Operations
Mar 31, 2025 · Information Security

How to Harden Linux Systems: Practical Security Steps for RHEL7

An in‑depth guide shows how to harden a RHEL 7 Linux server by tightening account permissions, enforcing password policies, limiting login attempts, changing SSH settings, restricting compiler use, protecting log files, applying minimal firewall rules, and enabling SELinux to achieve a B1‑level security baseline.

HardeningRHEL7SELinux
0 likes · 13 min read
How to Harden Linux Systems: Practical Security Steps for RHEL7
Liangxu Linux
Liangxu Linux
Feb 19, 2025 · Information Security

How to Harden Nginx: Essential Security Configurations and Best Practices

This comprehensive guide walks system administrators and developers through essential Nginx hardening steps—including hiding version info, restricting sensitive directories, custom error pages, CSP, HTTPS, SSL tuning, file permissions, security headers, rate limiting, IP whitelisting, and logging—to dramatically improve web server security.

CSPHardeningNginx
0 likes · 31 min read
How to Harden Nginx: Essential Security Configurations and Best Practices
Liangxu Linux
Liangxu Linux
Oct 29, 2024 · Information Security

Essential Linux Red Hat Security Hardening Checklist: Accounts, Passwords, SSH, and Services

This guide provides a comprehensive step‑by‑step checklist for hardening Red Hat Linux systems, covering shared account detection, redundant account lockout, root remote‑login restrictions, password complexity and lifespan policies, critical directory permissions, default umask settings, audit logging, remote log server configuration, history timestamping, SSH hardening, unnecessary service removal, Ctrl‑Alt‑Del disabling, and patch management.

HardeningLinuxPassword policy
0 likes · 16 min read
Essential Linux Red Hat Security Hardening Checklist: Accounts, Passwords, SSH, and Services
Liangxu Linux
Liangxu Linux
May 18, 2024 · Information Security

Essential Linux Redhat Security Hardening Checklist: Accounts, SSH, Logging, and More

This guide provides a step‑by‑step hardening checklist for Red Hat AS 3/4, covering shared‑account detection, redundant‑account lock policies, root remote‑login restrictions, password complexity and lifespan, critical directory permissions, audit logging, SSH configuration, unnecessary service removal, and patch installation.

HardeningLinuxPassword policy
0 likes · 15 min read
Essential Linux Redhat Security Hardening Checklist: Accounts, SSH, Logging, and More
Liangxu Linux
Liangxu Linux
May 23, 2023 · Information Security

Comprehensive Guide to Linux Security Mechanisms Across Hardware, Kernel, and Application Layers

Linux’s open architecture offers a rich set of security mechanisms spanning hardware, firmware, CPU features, kernel protections, and application‑level tools, and this guide systematically outlines each layer’s attack surface and corresponding defenses, from BIOS and TPM to SELinux, cgroups, and network hardening.

HardeningLinuxSELinux
0 likes · 17 min read
Comprehensive Guide to Linux Security Mechanisms Across Hardware, Kernel, and Application Layers
Liangxu Linux
Liangxu Linux
Apr 1, 2023 · Information Security

Master Linux Security Hardening: Essential Baseline Scripts and Checks

This guide explains why Linux servers need security baseline hardening, describes baseline scanning, and provides a comprehensive set of Bash scripts that back up critical files, enforce password policies, restrict services, adjust file permissions, and verify system integrity to protect against common vulnerabilities.

BaselineHardeningLinux
0 likes · 24 min read
Master Linux Security Hardening: Essential Baseline Scripts and Checks
Open Source Linux
Open Source Linux
Aug 8, 2022 · Information Security

Secure Your Linux Server: 8 Essential SSH Hardening Steps

Learn how to protect your Linux server by disabling root SSH login, changing the default port, enforcing strong passwords, limiting login attempts, using SSH protocol 2, disabling forwarding, employing key‑based authentication, and restricting access by IP, with clear commands and configuration examples.

HardeningKeyAuthenticationLinux
0 likes · 7 min read
Secure Your Linux Server: 8 Essential SSH Hardening Steps
Liangxu Linux
Liangxu Linux
Jul 20, 2022 · Information Security

How to Harden SSH on Linux: 8 Essential Security Steps

This guide explains why the default SSH configuration is risky and provides eight concrete actions—including disabling root login, changing the default port, limiting authentication attempts, and using key‑based authentication—to secure Linux servers against common attacks.

ConfigurationHardeningLinux
0 likes · 8 min read
How to Harden SSH on Linux: 8 Essential Security Steps
Cloud Native Technology Community
Cloud Native Technology Community
Jun 30, 2022 · Cloud Native

Top 10 Kubernetes Application Security Hardening Techniques

This article presents ten practical methods for hardening Kubernetes application manifests, covering securityContext settings such as runAsUser, privileged mode, capabilities, read‑only root filesystem, privilege escalation, Seccomp, resource limits, image tagging, and optional AppArmor/SELinux policies, to reduce attack surface during development and deployment.

ContainersHardeningcloud-native
0 likes · 11 min read
Top 10 Kubernetes Application Security Hardening Techniques
Efficient Ops
Efficient Ops
May 4, 2022 · Information Security

How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do

This article recounts a real‑world incident where a SpringBoot server was compromised by a crypto‑mining malware, details the malicious code and its actions, shows forensic traces left on the system, and provides step‑by‑step remediation and hardening recommendations.

HardeningSpringBoot RCEcrypto mining malware
0 likes · 12 min read
How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do
Architecture Digest
Architecture Digest
Mar 20, 2022 · Information Security

Comprehensive Linux Hardening Guide: Kernel, Sysctl, Boot Parameters, and Security Best Practices

This guide provides a detailed, step‑by‑step hardening strategy for Linux systems, covering distro selection, kernel choices, extensive sysctl tweaks, boot‑loader parameters, MAC policies, sandboxing, memory allocator hardening, compile‑time mitigations, root account protection, firewall rules, swap configuration, PAM policies, microcode updates, IPv6 privacy, partition mounting options, entropy sources, and physical security measures.

HardeningLinuxboot
0 likes · 51 min read
Comprehensive Linux Hardening Guide: Kernel, Sysctl, Boot Parameters, and Security Best Practices
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jun 27, 2021 · Information Security

Top 12 Proven Strategies to Secure Your Nginx Web Server

This guide outlines twelve practical steps—including keeping Nginx up‑to‑date, removing unused modules, disabling version disclosure, blocking malicious user agents, limiting HTTP methods, setting buffer limits, and configuring TLS—to harden Nginx servers against common attacks.

HardeningServer SecurityTLS
0 likes · 8 min read
Top 12 Proven Strategies to Secure Your Nginx Web Server
MaGe Linux Operations
MaGe Linux Operations
May 17, 2021 · Information Security

How to Harden Linux: Essential Security Settings and Best Practices

This comprehensive guide walks you through selecting a secure Linux distribution, configuring kernel and sysctl parameters, applying boot‑time hardening, managing network and firewall rules, restricting root access, enabling MAC policies, sandboxing applications, and employing advanced memory and entropy techniques to dramatically improve system privacy and resilience against attacks.

$rootHardeningLinux
0 likes · 55 min read
How to Harden Linux: Essential Security Settings and Best Practices
Open Source Linux
Open Source Linux
May 11, 2021 · Information Security

Ultimate Guide to Hardening Linux: Boost Security & Privacy

This comprehensive guide explains how to dramatically improve Linux security and privacy by selecting hardened distributions, configuring kernel and boot parameters, applying sysctl tweaks, disabling unnecessary services, using MAC frameworks, sandboxing applications, hardening memory allocation, and following best‑practice system administration steps.

$rootHardeningLinux
0 likes · 59 min read
Ultimate Guide to Hardening Linux: Boost Security & Privacy
21CTO
21CTO
Mar 5, 2021 · Information Security

Essential Linux Security Hardening: Account, Service, and Rootkit Defense

This guide walks operations engineers through comprehensive Linux hardening techniques—including account and login protection, unnecessary service removal, password and key authentication policies, proper use of sudo, system welcome message sanitization, file‑system safeguards, and practical rootkit detection with chkrootkit and RKHunter—plus a step‑by‑step response plan for compromised servers.

HardeningLinuxRootkit
0 likes · 26 min read
Essential Linux Security Hardening: Account, Service, and Rootkit Defense
Liangxu Linux
Liangxu Linux
Jan 16, 2021 · Information Security

Essential Linux Security Hardening Checklist for System Administrators

This guide provides system administrators with a step‑by‑step checklist to audit and harden Linux operating systems, covering account management, password policies, service restrictions, filesystem permissions, logging configuration, and practical command examples for comprehensive security compliance.

HardeningLinuxShell
0 likes · 9 min read
Essential Linux Security Hardening Checklist for System Administrators
Efficient Ops
Efficient Ops
Feb 12, 2020 · Information Security

Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection

This guide presents a comprehensive Linux security hardening checklist covering account and login safety, unnecessary service removal, password and key authentication policies, sudo usage, filesystem protection, remote access safeguards, rootkit detection tools, and step‑by‑step incident response for compromised servers.

Account ManagementHardeningLinux
0 likes · 27 min read
Essential Linux Security Hardening: Accounts, Services, and Rootkit Protection
MaGe Linux Operations
MaGe Linux Operations
Sep 6, 2019 · Information Security

Boost Your Linux Security: Practical Commands Every Admin Should Know

This article walks you through essential Linux security techniques—console protection, password policies, sudo alerts, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, and SELinux auditing tools—providing concrete commands and configurations to harden your system against evolving threats.

HardeningSELinuxSSH
0 likes · 17 min read
Boost Your Linux Security: Practical Commands Every Admin Should Know
MaGe Linux Operations
MaGe Linux Operations
Dec 5, 2018 · Information Security

25 Essential Linux Hardening Tips to Secure Your Servers

This comprehensive guide presents 25 practical Linux hardening techniques—from BIOS protection and disk partitioning to SELinux configuration, firewall rules, and user account management—helping system administrators strengthen server security and defend against potential attacks.

HardeningLinuxSELinux
0 likes · 14 min read
25 Essential Linux Hardening Tips to Secure Your Servers
MaGe Linux Operations
MaGe Linux Operations
Dec 3, 2018 · Information Security

Essential Linux Security Hardening: 12 Practical Commands to Protect Your System

This article walks through twelve essential Linux security techniques—including console access restrictions, password aging, sudo notifications, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, SELinux reporting, and sealert usage—providing commands and configuration tips to fortify a system.

HardeningLinuxSELinux
0 likes · 15 min read
Essential Linux Security Hardening: 12 Practical Commands to Protect Your System
MaGe Linux Operations
MaGe Linux Operations
Nov 17, 2018 · Information Security

Hardening Linux: Practical Commands to Boost System Security

This article presents a comprehensive guide on strengthening Linux systems by applying console restrictions, password policies, sudo notifications, SSH hardening, Tripwire intrusion detection, firewalld and iptables firewall management, compiler restrictions, immutable files, and SELinux tools such as aureport and sealert.

HardeningLinuxSELinux
0 likes · 15 min read
Hardening Linux: Practical Commands to Boost System Security
MaGe Linux Operations
MaGe Linux Operations
Nov 9, 2018 · Information Security

Essential Linux Security Practices Every Ops Engineer Should Know

This article outlines comprehensive Linux security measures—including account hardening, remote access protection, file system safeguards, rootkit detection tools, and step‑by‑step post‑attack response—to help system administrators strengthen server defenses and quickly recover from compromises.

HardeningLinuxOperations
0 likes · 23 min read
Essential Linux Security Practices Every Ops Engineer Should Know
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2018 · Information Security

Essential Linux Hardening: 12 Practical Commands to Secure Your System

This article walks through twelve essential Linux security techniques—from console access restrictions and password aging to SSH hardening, Tripwire intrusion detection, firewalld and iptables configuration, compiler restrictions, immutable files, SELinux auditing, and more—providing concrete commands to fortify a system against evolving threats.

HardeningLinuxSSH
0 likes · 16 min read
Essential Linux Hardening: 12 Practical Commands to Secure Your System
21CTO
21CTO
Nov 24, 2017 · Information Security

Why Linus Torvalds Slammed Kernel Security Hardening – A Deep Dive

Linus Torvalds publicly rebuked recent kernel security hardening attempts, arguing that such changes often introduce bugs, should be deferred until final review, and that many security developers act irrationally, sparking a heated debate on the Linux mailing list.

HardeningInformation SecurityLinus Torvalds
0 likes · 3 min read
Why Linus Torvalds Slammed Kernel Security Hardening – A Deep Dive
BiCaiJia Technology Team
BiCaiJia Technology Team
Sep 9, 2017 · Information Security

Top 12 Tomcat Hardening Steps to Secure Your Java Web Server

Learn how to harden Apache Tomcat by disabling default users, removing unnecessary webapps, preventing directory listings, enforcing HttpOnly cookies, securing shutdown ports, hiding version info, disabling auto‑deployment, setting proper file permissions, enabling access logs, customizing error pages, and configuring custom application paths.

ConfigurationHardeningTomcat
0 likes · 10 min read
Top 12 Tomcat Hardening Steps to Secure Your Java Web Server
MaGe Linux Operations
MaGe Linux Operations
Apr 15, 2017 · Information Security

Boost Your Linux Security: Essential Commands and Best Practices

This article provides a comprehensive, step‑by‑step guide to hardening a Linux system, covering console restrictions, password policies, sudo alerts, SSH tuning, Tripwire intrusion detection, firewalld and iptables management, compiler restrictions, immutable files, SELinux auditing with aureport, and the sealert tool.

HardeningSELinuxSSH
0 likes · 14 min read
Boost Your Linux Security: Essential Commands and Best Practices
MaGe Linux Operations
MaGe Linux Operations
Mar 30, 2017 · Information Security

25 Essential Linux Hardening Tips to Boost System Security

Discover 25 practical Linux hardening techniques—from BIOS protection and minimal package installation to SELinux configuration, firewall rules, and user account management—that help system administrators strengthen security, prevent attacks, and maintain a resilient, well‑configured server environment.

HardeningPassword policySELinux
0 likes · 14 min read
25 Essential Linux Hardening Tips to Boost System Security
MaGe Linux Operations
MaGe Linux Operations
Mar 28, 2017 · Information Security

Hardening Linux Servers: Essential Security Configurations & Best Practices

This guide walks through comprehensive Linux server hardening techniques, covering user account management, service minimization, file permission tightening, virtual memory tuning, log handling, and firewall configuration with iptables and ipchains, providing step‑by‑step commands and screenshots to enhance system security and stability.

HardeningServer SecuritySystem optimization
0 likes · 16 min read
Hardening Linux Servers: Essential Security Configurations & Best Practices
ITPUB
ITPUB
Jan 30, 2017 · Information Security

How to Harden a Linux Host: BIOS Protection, Disk Encryption, SSH Hardening and More

This guide outlines practical techniques to improve Linux host security, covering BIOS password setup, disk encryption, boot directory protection, USB disabling, system updates, package cleanup, port scanning, SSH hardening, SELinux activation, network parameter tuning, password policies, and file permission hardening.

HardeningSELinuxSSH
0 likes · 14 min read
How to Harden a Linux Host: BIOS Protection, Disk Encryption, SSH Hardening and More
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2016 · Information Security

Secure Your Nginx on Linux: SELinux, Sysctl Tweaks, Module Stripping & Firewall

This guide walks through hardening an Nginx web server on Linux by configuring default files, testing and reloading, enabling SELinux, mounting least‑privilege partitions, applying sysctl security parameters, removing unnecessary modules, and deploying an iptables‑based firewall with detailed command examples.

HardeningLinux securitySELinux
0 likes · 14 min read
Secure Your Nginx on Linux: SELinux, Sysctl Tweaks, Module Stripping & Firewall
ITPUB
ITPUB
Jul 21, 2016 · Information Security

How to Harden Oracle Database Security: Practical Hardening Steps

This guide outlines comprehensive Oracle database security hardening measures, covering system‑level protections, disaster‑recovery configuration, account privilege tightening, data access controls, network restrictions, password policies, audit settings, and patch management, with concrete commands and configuration examples for each step.

DataGuardDatabase SecurityHardening
0 likes · 19 min read
How to Harden Oracle Database Security: Practical Hardening Steps
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2014 · Information Security

25 Essential Linux Hardening Tips to Secure Your Servers

This guide lists 25 practical Linux hardening techniques—from BIOS protection and partitioning to SSH configuration, SELinux, firewall rules, password policies, and log management—helping system administrators strengthen server security against attacks and vulnerabilities.

HardeningLinuxServer
0 likes · 15 min read
25 Essential Linux Hardening Tips to Secure Your Servers