Tagged articles
35 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
May 2, 2026 · Information Security

Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation

This article walks operations engineers through the most frequent security‑configuration problems encountered during Grade‑Protection (等保) remediation, detailing the regulatory background, specific compliance gaps, step‑by‑step remediation commands for Linux systems, verification methods, FAQs, and a practical implementation workflow.

AuditdGrade ProtectionLinux Hardening
0 likes · 28 min read
Common Security Configuration Issues Ops Engineers Face During Grade‑Protection Remediation
MaGe Linux Operations
MaGe Linux Operations
Apr 30, 2026 · Information Security

20 Essential Server Hardening Steps Before Launching a New Machine

This guide provides a detailed 20‑item checklist for Linux server hardening—covering snapshots, account management, SSH key authentication, password policies, firewall rules, service reduction, kernel tweaks, logging, and verification scripts—to ensure a new production server is secure before it goes live.

AIDEAuditdFail2ban
0 likes · 33 min read
20 Essential Server Hardening Steps Before Launching a New Machine
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Nov 5, 2025 · Backend Development

Complete Easysearch.yml Field Guide and Security Configuration Walkthrough

This article answers a WeChat query by providing the official documentation link, demonstrating how to disable HTTP TLS, testing TCP TLS, and offering a line‑by‑line walkthrough of easysearch.yml’s core settings—including cluster basics, security options, TLS certificates, password policies, and critical risk warnings for production deployments.

ClusterEasysearchElasticsearch
0 likes · 8 min read
Complete Easysearch.yml Field Guide and Security Configuration Walkthrough
Xiao Liu Lab
Xiao Liu Lab
Oct 30, 2025 · Information Security

Essential Linux Security Baseline for Tier‑3 Compliance: Step‑by‑Step Guide

This article provides a comprehensive, step‑by‑step Linux security baseline for Tier‑3 compliance, covering password policies, login controls, access restrictions, audit logging, intrusion prevention, patch management, and resource limits, complete with executable commands for major distributions.

LinuxPassword policySecurity
0 likes · 9 min read
Essential Linux Security Baseline for Tier‑3 Compliance: Step‑by‑Step Guide
Raymond Ops
Raymond Ops
Sep 25, 2025 · Information Security

Boost Linux Security: Essential Hardening Steps for RHEL 7

This guide walks through practical Linux security hardening on RHEL 7, covering account locking, password policies, SELinux activation, SSH port changes, firewall minimization, immutable system files, and other measures to elevate the system to a higher security level.

LinuxPassword policyRHEL7
0 likes · 13 min read
Boost Linux Security: Essential Hardening Steps for RHEL 7
Raymond Ops
Raymond Ops
Aug 10, 2025 · Information Security

Master Linux Account Security: PAM, sudo, and GRUB Hardening Techniques

This guide walks you through essential Linux security measures—including system account cleanup, password policies, command history restrictions, PAM authentication modules, sudo configuration, GRUB boot protection, weak‑password detection with John the Ripper, and network port scanning with nmap—to help you harden servers against unauthorized access and privilege escalation.

GRUBPassword policySudo
0 likes · 21 min read
Master Linux Account Security: PAM, sudo, and GRUB Hardening Techniques
Raymond Ops
Raymond Ops
Jul 12, 2025 · Information Security

How to Enforce Password Expiration and Complexity on Linux Systems

Learn how to configure password aging and enforce complexity rules on Linux by editing /etc/login.defs and /etc/pam.d/system-auth, including setting maximum password age, minimum length, character class requirements, and preventing reuse of recent passwords, with practical sed commands and example configurations for CentOS 6 and 7.

Password ComplexityPassword policySecurity
0 likes · 8 min read
How to Enforce Password Expiration and Complexity on Linux Systems
Open Source Linux
Open Source Linux
Apr 28, 2025 · Information Security

Hardening CentOS 7/8: Essential Security Configurations to Protect Your Linux Servers

This guide walks you through a series of practical security measures for CentOS 7/8—including creating non‑root users, tightening SSH settings, enforcing password policies, securing logging, and applying kernel hardening—so you can significantly reduce the risk of unauthorized access and system compromise.

CentOSHardeningPassword policy
0 likes · 12 min read
Hardening CentOS 7/8: Essential Security Configurations to Protect Your Linux Servers
Liangxu Linux
Liangxu Linux
Jan 19, 2025 · Information Security

Hardening Linux Account Security: User Locks, Password Policies, PAM & Sudo

This guide explains how to secure Linux accounts by disabling logins, locking or deleting users, enforcing password expiration with chage, configuring PAM modules, restricting commands via sudo, protecting the GRUB bootloader, and performing controlled password‑cracking tests with John the Ripper.

GRUBJohn the RipperLinux
0 likes · 10 min read
Hardening Linux Account Security: User Locks, Password Policies, PAM & Sudo
MaGe Linux Operations
MaGe Linux Operations
Dec 5, 2024 · Information Security

How to Configure Linux Password Expiration and Complexity Rules

This guide explains how to set password aging limits in /etc/login.defs, modify them with sed, and enforce password complexity on CentOS systems using PAM modules such as pam_cracklib and pam_pwquality, including recommended values and practical examples.

LinuxPassword ComplexityPassword policy
0 likes · 9 min read
How to Configure Linux Password Expiration and Complexity Rules
Liangxu Linux
Liangxu Linux
Oct 29, 2024 · Information Security

Essential Linux Red Hat Security Hardening Checklist: Accounts, Passwords, SSH, and Services

This guide provides a comprehensive step‑by‑step checklist for hardening Red Hat Linux systems, covering shared account detection, redundant account lockout, root remote‑login restrictions, password complexity and lifespan policies, critical directory permissions, default umask settings, audit logging, remote log server configuration, history timestamping, SSH hardening, unnecessary service removal, Ctrl‑Alt‑Del disabling, and patch management.

HardeningLinuxPassword policy
0 likes · 16 min read
Essential Linux Red Hat Security Hardening Checklist: Accounts, Passwords, SSH, and Services
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2024 · Information Security

Essential Linux Account Security: Disable Root, Harden Permissions, and Block Attacks

This guide details practical steps for securing Linux accounts, including disabling unnecessary super‑user accounts, enforcing strong password policies, locking critical files, restricting privileged commands, tightening file permissions, and configuring network and system settings to prevent spoofing, DoS, and SYN attacks.

InfoSecLinuxPassword policy
0 likes · 11 min read
Essential Linux Account Security: Disable Root, Harden Permissions, and Block Attacks
Liangxu Linux
Liangxu Linux
Sep 5, 2024 · Information Security

Hardening RHEL7: Practical Linux Security Steps and Commands

This guide walks through comprehensive Linux security hardening on RHEL7, covering account lockout, password policies, SELinux configuration, SSH port changes, root login disabling, umask restriction, immutable system files, GCC limitation, log protection, minimal firewall rules, and related command examples.

LinuxPassword policyRHEL7
0 likes · 13 min read
Hardening RHEL7: Practical Linux Security Steps and Commands
Liangxu Linux
Liangxu Linux
May 18, 2024 · Information Security

Essential Linux Redhat Security Hardening Checklist: Accounts, SSH, Logging, and More

This guide provides a step‑by‑step hardening checklist for Red Hat AS 3/4, covering shared‑account detection, redundant‑account lock policies, root remote‑login restrictions, password complexity and lifespan, critical directory permissions, audit logging, SSH configuration, unnecessary service removal, and patch installation.

HardeningLinuxPassword policy
0 likes · 15 min read
Essential Linux Redhat Security Hardening Checklist: Accounts, SSH, Logging, and More
Open Source Linux
Open Source Linux
Apr 18, 2024 · Information Security

Essential Linux Security Hardening Checklist for Red Hat Systems

This guide outlines a comprehensive set of security configurations for Red Hat Linux, covering shared account checks, redundant account locking, root remote login restrictions, password complexity and lifespan policies, directory permissions, logging, SSH hardening, service disabling, and patch management to ensure robust system protection.

LinuxPassword policySecurity
0 likes · 22 min read
Essential Linux Security Hardening Checklist for Red Hat Systems
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 20, 2023 · Information Security

MySQL User Security Hardening: Password Policy, Connection Control, and Password Change Strategies

This article details how to strengthen MySQL user security by implementing comprehensive password complexity requirements, connection control policies, and password change strategies, including configuration of the validate_password component, connection_control plugin, and password expiration settings for MySQL 5.7 and 8.0, with practical examples and code snippets.

Connection ControlDatabase AdministrationPassword policy
0 likes · 21 min read
MySQL User Security Hardening: Password Policy, Connection Control, and Password Change Strategies
Aikesheng Open Source Community
Aikesheng Open Source Community
Sep 12, 2023 · Databases

Understanding MySQL 8.0 Password Policy Options and Common Misunderstandings

This article analyzes MySQL 8.0 password‑related parameters, explains the meaning of NULL values in the mysql.user table, demonstrates how global settings interact with per‑user attributes, and clarifies the priority rules between password_history and password_reuse_interval through practical test scenarios.

ALTER USERCREATE USERDatabase Administration
0 likes · 9 min read
Understanding MySQL 8.0 Password Policy Options and Common Misunderstandings
Laiye Technology Team
Laiye Technology Team
Nov 17, 2020 · Information Security

Comprehensive Security Practices and Vulnerability Mitigation at Laiye Technology

This article details Laiye Technology's end‑to‑end security strategy—including application hardening, password policies, brute‑force defenses, SQL injection, XSS and CSRF mitigations, privilege controls, secure file uploads, code‑review standards, and infrastructure vulnerability scanning—to protect sensitive data and AI‑driven robot platforms from a wide range of attacks.

CSRFPassword policySQL injection
0 likes · 21 min read
Comprehensive Security Practices and Vulnerability Mitigation at Laiye Technology
Liangxu Linux
Liangxu Linux
Jun 2, 2020 · Information Security

Step-by-Step Guide to Harden CentOS 7.7 Server Security

This article provides a comprehensive, step‑by‑step tutorial for hardening a CentOS 7.7 server, covering complex password creation, password‑policy configuration, PAM strength settings, login‑attempt limits, disabling root SSH access, changing the SSH port, tightening security‑group rules, command‑history limits, log monitoring, and regular data backup procedures.

CentOSPassword policySSH Security
0 likes · 6 min read
Step-by-Step Guide to Harden CentOS 7.7 Server Security
Open Source Linux
Open Source Linux
May 27, 2020 · Information Security

How to Harden a CentOS 7.7 Server: Essential Security Steps

This guide walks you through essential CentOS 7.7 server hardening steps—including setting complex passwords, configuring password policies, enforcing password strength, limiting login attempts, disabling root SSH access, changing SSH ports, tightening firewall rules, managing command history, monitoring logs, and scheduling regular backups—to improve system security.

CentOSLinuxPassword policy
0 likes · 5 min read
How to Harden a CentOS 7.7 Server: Essential Security Steps
Ops Development Stories
Ops Development Stories
Apr 26, 2020 · Information Security

Essential Linux & Windows System Hardening Steps for Strong Security

This guide details practical hardening techniques for Linux and Windows servers, covering SSH configuration, password policies, account lockout, su restrictions, ICMP suppression, firewall rules, RDP port changes, security policies, and disabling vulnerable services to significantly improve system security.

LinuxPassword policySSH
0 likes · 10 min read
Essential Linux & Windows System Hardening Steps for Strong Security
JD Tech
JD Tech
May 11, 2018 · Databases

MySQL 8.0 User Management, Password Policies, and Role Management

This article explains the new MySQL 8.0 features for user and role management, including changes to authentication plugins, password encryption, dynamic SET PERSIST configuration, password expiration and reuse policies, and detailed SQL examples for creating users, granting privileges, and managing roles.

Password policyRolesSET PERSIST
0 likes · 14 min read
MySQL 8.0 User Management, Password Policies, and Role Management
MaGe Linux Operations
MaGe Linux Operations
Mar 30, 2017 · Information Security

25 Essential Linux Hardening Tips to Boost System Security

Discover 25 practical Linux hardening techniques—from BIOS protection and minimal package installation to SELinux configuration, firewall rules, and user account management—that help system administrators strengthen security, prevent attacks, and maintain a resilient, well‑configured server environment.

HardeningPassword policySELinux
0 likes · 14 min read
25 Essential Linux Hardening Tips to Boost System Security
Efficient Ops
Efficient Ops
Mar 23, 2017 · Information Security

Why Weak Passwords Still Threaten Enterprises: Real-World DevOps Security Risks

The article examines common security risks such as weak passwords, GitHub credential leaks, and misconfigurations in DevOps pipelines, illustrating how attackers exploit these flaws and offering practical mitigation strategies like access control, least‑privilege policies, robust password rules, and vulnerability tracking.

Password policygit securityinformation security
0 likes · 10 min read
Why Weak Passwords Still Threaten Enterprises: Real-World DevOps Security Risks
dbaplus Community
dbaplus Community
Feb 28, 2017 · Databases

How to Stop Bitcoin Ransomware Attacks on MySQL and Other Databases

This article reviews recent ransomware campaigns targeting MySQL, MongoDB, ElasticSearch, Hadoop, and Redis, explains how attackers exploit weak password policies, and provides concrete MySQL password‑policy settings, password‑less login configuration, and security checklists for multiple database platforms.

MongoDBPassword policymysql
0 likes · 13 min read
How to Stop Bitcoin Ransomware Attacks on MySQL and Other Databases
ITPUB
ITPUB
Jul 21, 2016 · Information Security

How to Harden Oracle Database Security: Practical Hardening Steps

This guide outlines comprehensive Oracle database security hardening measures, covering system‑level protections, disaster‑recovery configuration, account privilege tightening, data access controls, network restrictions, password policies, audit settings, and patch management, with concrete commands and configuration examples for each step.

DataGuardDatabase SecurityHardening
0 likes · 19 min read
How to Harden Oracle Database Security: Practical Hardening Steps
21CTO
21CTO
Feb 6, 2016 · Information Security

Essential Web Application Security Checklist: From Input Validation to Server Hardening

This guide outlines a comprehensive security checklist covering form input validation, safe system call handling, buffer overflow prevention, strong password policies, session protection, mitigation of XSS, SQL injection, CSRF, Apache and MySQL hardening, PHP configuration, and fuzz testing techniques.

Password policyWeb Securityapache hardening
0 likes · 6 min read
Essential Web Application Security Checklist: From Input Validation to Server Hardening
ITPUB
ITPUB
Jan 29, 2016 · Information Security

Why Strict Password Rules Fail and How to Design Better Policies

The article critiques common mandatory password complexity rules, explains why they often reduce security and usability, and proposes simpler, more effective approaches such as longer minimum lengths, pattern restrictions, and using strength estimators like zxcvbn, illustrated with Laravel implementation examples.

LaravelPassword policyinformation security
0 likes · 5 min read
Why Strict Password Rules Fail and How to Design Better Policies