Tagged articles
243 articles
Page 3 of 3
Ops Development Stories
Ops Development Stories
May 30, 2018 · Information Security

Mastering iptables: A Complete Guide to Linux Firewall Rules and NAT

This comprehensive guide explains the fundamentals of iptables, covering its architecture, chain and table concepts, rule syntax, matching modules, actions, and practical examples for filtering, NAT, and port forwarding, enabling readers to configure Linux firewalls effectively in virtual or container environments.

Linux firewallNATiptables
0 likes · 16 min read
Mastering iptables: A Complete Guide to Linux Firewall Rules and NAT
MaGe Linux Operations
MaGe Linux Operations
Dec 30, 2017 · Operations

Essential Linux Operations Interview Questions & Answers from Meituan

This article compiles Meituan's Linux operations engineer interview requirements, common questions on system installation, networking, scripting, MySQL security, replication, iptables, and provides detailed command-line solutions and sample scripts to help candidates prepare effectively.

LinuxOperationsScripting
0 likes · 17 min read
Essential Linux Operations Interview Questions & Answers from Meituan
MaGe Linux Operations
MaGe Linux Operations
Dec 22, 2017 · Operations

Essential Linux System Administration Commands and Tips

This article compiles practical Linux system administration techniques, covering how to check physical CPUs and cores, interpret load averages, understand vmstat columns, differentiate buffer and cache, monitor memory usage with top, inspect network connections, manage services, configure IP addresses, use iptables, rsync options, cron jobs, and troubleshoot hardware issues.

Linuxcommandscron
0 likes · 18 min read
Essential Linux System Administration Commands and Tips
MaGe Linux Operations
MaGe Linux Operations
Oct 8, 2017 · Information Security

25 Must‑Know Linux iptables Rules for Secure Firewall Management

This guide presents 25 essential Linux iptables rules—from clearing existing policies to configuring SSH, HTTP, DNS, and DoS protection—illustrated with command screenshots, enabling administrators to quickly adapt firewall settings to their specific network security needs.

Sysadminiptablesnetwork security
0 likes · 4 min read
25 Must‑Know Linux iptables Rules for Secure Firewall Management
ITPUB
ITPUB
Sep 13, 2017 · Operations

Master Linux TC: Control Bandwidth with HTB, Classes, and Filters

This guide explains Linux traffic control (TC), covering its core components—queueing disciplines, classes, and filters—along with step‑by‑step commands to shape outbound bandwidth, set rate and ceiling limits, use bursts, and apply iptables marks for precise traffic management.

HTBbandwidth managementiptables
0 likes · 11 min read
Master Linux TC: Control Bandwidth with HTB, Classes, and Filters
Practical DevOps Architecture
Practical DevOps Architecture
Sep 6, 2017 · Information Security

Configuring SELinux and iptables on Red Hat/CentOS Systems

This guide explains how to permanently disable SELinux, temporarily change its mode, and provides a comprehensive tutorial on using iptables—including table concepts, basic commands, rule management, scripting, NAT configuration, and saving/restoring firewall rules—on Red Hat/CentOS Linux.

CentOSLinux securitySELinux
0 likes · 16 min read
Configuring SELinux and iptables on Red Hat/CentOS Systems
MaGe Linux Operations
MaGe Linux Operations
Aug 4, 2017 · Operations

Build a Secure LAN with iptables NAT and DHCP on CentOS

This guide walks through setting up a LAN with a static‑IP server, configuring iptables firewall rules, enabling NAT and port forwarding, and deploying a DHCP server on CentOS, complete with sample configuration files and command‑line steps.

CentOSDHCPNAT
0 likes · 6 min read
Build a Secure LAN with iptables NAT and DHCP on CentOS
MaGe Linux Operations
MaGe Linux Operations
Mar 30, 2017 · Information Security

Master Linux iptables: Build and Manage Robust Firewalls

This comprehensive guide explains Linux firewall fundamentals, the role of iptables and Netfilter, the structure of tables and chains, rule ordering, common commands, and real‑world configuration examples for securing networks and handling port mapping.

Linux firewallfirewall rulesiptables
0 likes · 10 min read
Master Linux iptables: Build and Manage Robust Firewalls
MaGe Linux Operations
MaGe Linux Operations
Mar 25, 2017 · Information Security

Mastering FirewallD: A Complete Guide to Linux Firewall Management

This guide explains how to install, enable, and manage FirewallD on Linux, covering zones, services, ports, rich rules, port forwarding, and direct iptables integration, with step‑by‑step commands and visual examples to help administrators configure persistent, dynamic firewalls efficiently.

Linuxfirewalldiptables
0 likes · 11 min read
Mastering FirewallD: A Complete Guide to Linux Firewall Management
MaGe Linux Operations
MaGe Linux Operations
Mar 6, 2017 · Information Security

How I Stopped a Massive Linux DDoS Attack and Eradicated Hidden Rootkits

A remote Ubuntu 12.04 server suffered a sudden 800 MB traffic surge caused by a hidden backdoor that sent continuous HTTP requests to malicious IPs; by analyzing logs, using iftop, netstat, lsof, and replacing compromised tools, the author identified and removed malicious processes, restored normal traffic, and outlined preventive security measures.

Network MonitoringSecurityiptables
0 likes · 9 min read
How I Stopped a Massive Linux DDoS Attack and Eradicated Hidden Rootkits
MaGe Linux Operations
MaGe Linux Operations
Feb 26, 2017 · Information Security

How We Traced and Stopped a UDP Flood Attack on an Oracle‑Tomcat Server

During the Chinese New Year a client’s Oracle‑Tomcat server was overwhelmed by massive UDP traffic, prompting a forensic investigation that uncovered a hidden Trojan, detailed command‑line analysis, iptables hardening, and the root cause of a weak SSH password left after a hardware upgrade.

Linux forensicsSSH Securityincident response
0 likes · 5 min read
How We Traced and Stopped a UDP Flood Attack on an Oracle‑Tomcat Server
ZhiKe AI
ZhiKe AI
Feb 15, 2017 · Information Security

Understanding iptables: A Comprehensive Introduction to Linux Packet Filtering

This article introduces Linux’s built-in iptables (netfilter) firewall, explains its four tables and chains, and provides detailed command-line examples for starting, stopping, configuring, listing, and managing rules, including common options and extended matching techniques.

Linux firewallfirewall rulesiptables
0 likes · 7 min read
Understanding iptables: A Comprehensive Introduction to Linux Packet Filtering
ITPUB
ITPUB
Jan 17, 2017 · Information Security

How to Diagnose and Eradicate a Linux Trojan That Spikes Outbound Traffic

This article recounts a real‑world incident on an Ubuntu 12.04 server where massive outbound traffic was traced to a hidden trojan, detailing step‑by‑step investigation, identification of malicious processes, removal techniques, and preventive hardening measures.

Network MonitoringRootkitincident response
0 likes · 9 min read
How to Diagnose and Eradicate a Linux Trojan That Spikes Outbound Traffic
Efficient Ops
Efficient Ops
Jan 5, 2017 · Information Security

How I Rescued a Compromised Ubuntu Server: Step‑by‑Step Intrusion Response

After a sudden traffic surge and loss of SSH access on an Ubuntu 12.04 server, I worked with the data‑center team to trace malicious outbound connections, identify compromised binaries, remove persistent backdoor scripts, and implement firewall rules and logging practices to prevent future intrusions.

Forensicsiptablesmalware
0 likes · 8 min read
How I Rescued a Compromised Ubuntu Server: Step‑by‑Step Intrusion Response
MaGe Linux Operations
MaGe Linux Operations
Jan 2, 2017 · Information Security

Master iptables: Essential Commands and Advanced Matching Techniques

This guide walks through iptables fundamentals—including listing, flushing, and setting default policies—then demonstrates adding, inserting, replacing, and deleting rules, explores basic and extended match modules, and provides practical exercises for building robust firewall configurations.

Linuxfirewalliptables
0 likes · 7 min read
Master iptables: Essential Commands and Advanced Matching Techniques
MaGe Linux Operations
MaGe Linux Operations
Sep 5, 2016 · Information Security

Secure Your Nginx on Linux: SELinux, Sysctl Tweaks, Module Stripping & Firewall

This guide walks through hardening an Nginx web server on Linux by configuring default files, testing and reloading, enabling SELinux, mounting least‑privilege partitions, applying sysctl security parameters, removing unnecessary modules, and deploying an iptables‑based firewall with detailed command examples.

HardeningLinux securitySELinux
0 likes · 14 min read
Secure Your Nginx on Linux: SELinux, Sysctl Tweaks, Module Stripping & Firewall
ITPUB
ITPUB
Aug 25, 2016 · Information Security

Understanding Linux Netfilter: How the Kernel Handles Packet Filtering

This article provides an in‑depth technical overview of Linux Netfilter, explaining its hook architecture, key macros, packet‑processing flow, and how iptables interacts with the kernel to filter, NAT, and track connections across the IPv4 stack.

KernelLinuxfirewall
0 likes · 15 min read
Understanding Linux Netfilter: How the Kernel Handles Packet Filtering
MaGe Linux Operations
MaGe Linux Operations
May 31, 2016 · Information Security

How to Detect and Mitigate SYN Flood Attacks on Linux Servers

This article explains what a SYN Flood DoS attack is, shows how to diagnose it using system logs and netstat, and provides practical mitigation steps such as iptables blocking, F5 load‑balancer filtering, and kernel parameter tuning to protect Linux web servers.

DoS mitigationLinux networkingSYN Flood
0 likes · 9 min read
How to Detect and Mitigate SYN Flood Attacks on Linux Servers
ITPUB
ITPUB
Apr 11, 2016 · Operations

Quick Guide: Set Up Samba on Linux for Windows File Sharing

This step‑by‑step tutorial shows how to install Samba on a Linux server, configure a shared home directory, create a Samba user, adjust firewall and SELinux settings, and finally access the share from a Windows client.

ConfigurationLinuxSELinux
0 likes · 5 min read
Quick Guide: Set Up Samba on Linux for Windows File Sharing
MaGe Linux Operations
MaGe Linux Operations
Mar 3, 2016 · Information Security

Master iptables Quickly with This Visual Mind Map

This article presents a concise visual mind map of iptables, illustrating its core concepts, chains, tables, and typical rules, enabling readers to quickly grasp firewall configuration and operation at a glance in.

Linuxfirewalliptables
0 likes · 1 min read
Master iptables Quickly with This Visual Mind Map
ITPUB
ITPUB
Feb 25, 2016 · Information Security

Hardening Linux Against SYN Flood & DDoS: sysctl, iptables & DDoS Deflate

This guide explains how to protect Linux servers from SYN flood and DDoS attacks by tuning sysctl parameters, applying iptables rules, installing the free DDoS‑deflate script, and monitoring nginx logs to identify and block malicious IPs and user agents.

DDoS mitigationLinuxfirewall
0 likes · 10 min read
Hardening Linux Against SYN Flood & DDoS: sysctl, iptables & DDoS Deflate
MaGe Linux Operations
MaGe Linux Operations
Jul 31, 2015 · Information Security

Master Linux Network Security: Firewall, IDS, IPS, and iptables Deep Dive

This article outlines Linux network security fundamentals, covering firewall types and placement, intrusion detection and prevention systems, honeypots, vulnerability scanners, rootkits, and provides a detailed explanation of iptables/netfilter architecture, tables, chains, rules, and packet handling actions.

IDSIPSLinux
0 likes · 6 min read
Master Linux Network Security: Firewall, IDS, IPS, and iptables Deep Dive
Qunar Tech Salon
Qunar Tech Salon
May 29, 2015 · Information Security

Implementing Network ACL for Memcached Using iptables

This article explains how to use Linux iptables to create network-level ACLs that block non-production IP ranges from accessing a Memcached server, providing command examples for adding, listing, and clearing firewall rules, and discusses future considerations such as IPv6 support.

ACLLinuxMemcached
0 likes · 5 min read
Implementing Network ACL for Memcached Using iptables
MaGe Linux Operations
MaGe Linux Operations
Sep 12, 2014 · Information Security

Secure Your New Ubuntu Server in Minutes: SSH, Firewall, and Fail2Ban

This step‑by‑step guide shows how to harden a freshly installed Ubuntu 12.04 LTS server by creating a non‑root user, disabling root SSH access, configuring SSH keys, applying system updates, setting up iptables firewall rules, and installing Fail2Ban to automatically block malicious login attempts.

Fail2banLinuxSSH
0 likes · 13 min read
Secure Your New Ubuntu Server in Minutes: SSH, Firewall, and Fail2Ban
MaGe Linux Operations
MaGe Linux Operations
Aug 9, 2014 · Information Security

Master Linux iptables: From Basics to Advanced Firewall Rules

This comprehensive guide explains Linux firewall concepts, the evolution and operation of iptables, rule chains, policies, command syntax, matching criteria, state tracking, NAT/DNAT techniques, and practical exercises, providing readers with the knowledge to configure and manage secure network access effectively.

LinuxNATfirewall
0 likes · 17 min read
Master Linux iptables: From Basics to Advanced Firewall Rules
MaGe Linux Operations
MaGe Linux Operations
Jul 8, 2014 · Information Security

Top 9 Essential Linux Security Practices Every Admin Should Implement

Securing Linux systems requires more than a single anti‑malware tool; this guide outlines nine practical measures—including SELinux, vulnerability alerts, service hardening, log monitoring, port knocking, iptables, default‑deny policies, IDS, and full‑disk encryption—to strengthen system defenses against attacks.

IDSLinuxPort Knocking
0 likes · 6 min read
Top 9 Essential Linux Security Practices Every Admin Should Implement
MaGe Linux Operations
MaGe Linux Operations
Jun 23, 2014 · Information Security

How Linux’s SYNPROXY Shields Against SYN Flood DoS Attacks

The article explains how the Linux kernel’s SYNPROXY feature, introduced in version 3.13, effectively mitigates SYN flood DoS attacks by acting as a gateway, validating handshake cookies, and dramatically reducing kernel soft‑IRQ load during testing on Debian and SLES‑12.

DoSLinuxSYNPROXY
0 likes · 2 min read
How Linux’s SYNPROXY Shields Against SYN Flood DoS Attacks