Tag

security hardening

0 views collected around this technical thread.

Efficient Ops
Efficient Ops
Apr 10, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article walks through the symptoms, root causes, forensic commands, and remediation actions taken to investigate and clean a Linux server that was compromised, highlighting key security lessons such as tightening SSH access, monitoring critical files, and restoring locked system utilities.

LinuxServer Intrusionchattr
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 20, 2023 · Information Security

MySQL User Security Hardening: Password Policy, Connection Control, and Password Change Strategies

This article details how to strengthen MySQL user security by implementing comprehensive password complexity requirements, connection control policies, and password change strategies, including configuration of the validate_password component, connection_control plugin, and password expiration settings for MySQL 5.7 and 8.0, with practical examples and code snippets.

Connection ControlDatabase AdministrationMySQL
0 likes · 21 min read
MySQL User Security Hardening: Password Policy, Connection Control, and Password Change Strategies
Efficient Ops
Efficient Ops
Oct 8, 2023 · Operations

How to Migrate from CentOS: Ubuntu 22.04 & Anolis 8.6 Configuration Guide

With CentOS discontinued, this guide walks through the key considerations and step‑by‑step configurations for DNS, time synchronization, security baselines, SELinux, firewall, and kernel tuning on Ubuntu 22.04 and Anolis 8.6 as viable replacements.

AnolisCentOS migrationDNS configuration
0 likes · 12 min read
How to Migrate from CentOS: Ubuntu 22.04 & Anolis 8.6 Configuration Guide
Efficient Ops
Efficient Ops
Nov 26, 2021 · Information Security

How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do

A self‑built Kubernetes cluster suffered a crypto‑mining intrusion due to empty iptables and a misconfigured kubelet, prompting a detailed post‑mortem that outlines the symptoms, root‑cause analysis, and practical hardening steps to protect similar environments.

Incident ResponseKubernetescrypto mining
0 likes · 5 min read
How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do
Efficient Ops
Efficient Ops
Aug 3, 2021 · Information Security

How a Compromised Server Was Hijacked: Inside the gpg-agentd Malware Attack

This article walks through a real‑world server breach where a disguised gpg‑agentd process was used to install backdoors, download malicious scripts, exploit Redis, and launch mass scans, and then offers concrete hardening steps to prevent similar compromises.

gpg-agentdmalware analysismasscan
0 likes · 12 min read
How a Compromised Server Was Hijacked: Inside the gpg-agentd Malware Attack
Efficient Ops
Efficient Ops
Nov 22, 2020 · Information Security

Unmasking the gpg‑agentd Malware: From Server Freeze to Full‑Scale Attack

This article walks through a real‑world compromise of an Alibaba Cloud server, detailing how a disguised gpg‑agentd process was used to install backdoors, hijack SSH keys, exploit Redis, and launch mass scanning with malicious scripts, and it concludes with practical hardening recommendations.

gpg-agentdmalware analysismasscan
0 likes · 15 min read
Unmasking the gpg‑agentd Malware: From Server Freeze to Full‑Scale Attack