Tagged articles
24 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Nov 2, 2025 · Information Security

Master Linux Security Hardening: Advanced firewalld Rules & SELinux Context Management

This guide walks you through practical Linux hardening techniques, covering firewalld's zone‑based and rich‑rule configurations, IPSET management, SELinux context fundamentals, custom policy creation, automation scripts, monitoring, common pitfalls, performance tips, and validation methods to build a multi‑layered defense.

LinuxSELinuxSystem Administration
0 likes · 11 min read
Master Linux Security Hardening: Advanced firewalld Rules & SELinux Context Management
Liangxu Linux
Liangxu Linux
Oct 26, 2025 · Information Security

Master Linux Security Hardening: Advanced firewalld Rules & SELinux Context Management

This guide presents a production‑tested Linux hardening strategy that combines advanced firewalld zone and rich‑rule configurations with precise SELinux context management, offering step‑by‑step commands, custom scripts, troubleshooting tips, and performance optimizations to protect servers from the majority of common attacks.

AutomationLinuxSELinux
0 likes · 10 min read
Master Linux Security Hardening: Advanced firewalld Rules & SELinux Context Management
Raymond Ops
Raymond Ops
Sep 25, 2025 · Information Security

Boost Linux Security: Essential Hardening Steps for RHEL 7

This guide walks through practical Linux security hardening on RHEL 7, covering account locking, password policies, SELinux activation, SSH port changes, firewall minimization, immutable system files, and other measures to elevate the system to a higher security level.

LinuxPassword policyRHEL7
0 likes · 13 min read
Boost Linux Security: Essential Hardening Steps for RHEL 7
MaGe Linux Operations
MaGe Linux Operations
Sep 16, 2025 · Information Security

Master Linux Security Hardening: Practical Scripts & Best Practices

This comprehensive guide walks you through Linux security threats, three-layer defense strategies, user account hardening, SSH and firewall configuration, file system protection, service hardening, kernel tuning, automated monitoring, incident response, and a step‑by‑step implementation roadmap to build a resilient, multi‑layered defense system.

SSHfirewallsecurity hardening
0 likes · 26 min read
Master Linux Security Hardening: Practical Scripts & Best Practices
Open Source Linux
Open Source Linux
Aug 22, 2025 · Information Security

Advanced Linux Security Hardening: firewalld Rules & SELinux Contexts

Learn how to fortify Linux servers by mastering firewalld's advanced zone and rich‑rule configurations, leveraging IPSET for large address sets, and managing SELinux contexts and custom policies, with practical scripts, troubleshooting tips, and production‑grade best practices to achieve multi‑layered protection.

LinuxSELinuxSystem Administration
0 likes · 11 min read
Advanced Linux Security Hardening: firewalld Rules & SELinux Contexts
Ops Community
Ops Community
Aug 19, 2025 · Information Security

Master Linux Security: Advanced firewalld Rules & SELinux Context Management

This guide walks you through hardening Linux servers by using firewalld's zone‑based advanced rules, rich rules, and IPSET collections, combined with precise SELinux context management, practical scripts, troubleshooting tips, and production‑grade best practices to build a multi‑layered defense.

AutomationLinuxSELinux
0 likes · 11 min read
Master Linux Security: Advanced firewalld Rules & SELinux Context Management
Ops Community
Ops Community
Jul 4, 2025 · Information Security

Master Enterprise Linux Security Hardening: From Basics to Advanced

This comprehensive guide walks you through essential Linux security hardening steps—including system updates, service disabling, password policies, SSH configuration, firewall rules, intrusion detection, file integrity monitoring, log auditing, automation scripts, and emergency response—to help enterprises build a resilient and continuously protected infrastructure.

AutomationLinuxSSH
0 likes · 9 min read
Master Enterprise Linux Security Hardening: From Basics to Advanced
Liangxu Linux
Liangxu Linux
Apr 28, 2025 · Information Security

How to Harden Linux Servers for Tier‑3 Security Compliance with Open‑Source Scripts

This guide explains the purpose of China's tiered security protection for Linux servers, outlines key requirements such as identity verification, access control, auditing, intrusion prevention, and provides step‑by‑step usage instructions for two open‑source scripts that automate checking and hardening on Red Hat/CentOS systems.

Tier 3auditopen source
0 likes · 8 min read
How to Harden Linux Servers for Tier‑3 Security Compliance with Open‑Source Scripts
Open Source Linux
Open Source Linux
Apr 10, 2025 · Information Security

How to Harden Linux Systems: Practical Security Hardening Steps for RHEL 7

This guide walks through practical Linux security hardening on RHEL 7, covering account lockdown, password policies, SELinux activation, SSH port changes, login restrictions, file immutability, compiler and log protection, and minimal firewall rules to elevate the system to a higher security level.

RHEL7SELinuxSSH
0 likes · 12 min read
How to Harden Linux Systems: Practical Security Hardening Steps for RHEL 7
MaGe Linux Operations
MaGe Linux Operations
Dec 13, 2024 · Information Security

Can Your SNMP Service Be Hacked? Detect Weak Passwords and Harden Them Across All Platforms

This guide explains how to use nmap scripts to discover SNMP weak passwords, demonstrates various exploitation commands, and provides step‑by‑step hardening procedures for Windows, Linux, AIX, Solaris, and Cisco devices, including community string changes, whitelist configuration, and service management.

SNMPnetwork securitynmap
0 likes · 6 min read
Can Your SNMP Service Be Hacked? Detect Weak Passwords and Harden Them Across All Platforms
Liangxu Linux
Liangxu Linux
Sep 5, 2024 · Information Security

Hardening RHEL7: Practical Linux Security Steps and Commands

This guide walks through comprehensive Linux security hardening on RHEL7, covering account lockout, password policies, SELinux configuration, SSH port changes, root login disabling, umask restriction, immutable system files, GCC limitation, log protection, minimal firewall rules, and related command examples.

LinuxPassword policyRHEL7
0 likes · 13 min read
Hardening RHEL7: Practical Linux Security Steps and Commands
Liangxu Linux
Liangxu Linux
Jul 18, 2024 · Information Security

How to Harden RHEL7: Essential Linux Security Hardening Steps

This guide walks through practical Linux security hardening on RHEL7, covering TCSEC security levels, account lockdown, password policies, SSH hardening, SELinux activation, firewall minimization, immutable system files, and other configuration tweaks to raise the system to a B1 security rating.

LinuxRHEL7SELinux
0 likes · 12 min read
How to Harden RHEL7: Essential Linux Security Hardening Steps
MaGe Linux Operations
MaGe Linux Operations
Jul 2, 2024 · Information Security

How to Harden RHEL7: Essential Linux Security Configurations

This guide walks through practical steps to harden a RHEL7 Linux server—including account restrictions, password policies, SELinux enforcement, SSH port changes, firewall rules, and file attribute protections—using concrete commands and configuration edits to boost system security.

LinuxRHEL7SELinux
0 likes · 13 min read
How to Harden RHEL7: Essential Linux Security Configurations
Efficient Ops
Efficient Ops
Apr 10, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article walks through the symptoms, root causes, forensic commands, and remediation actions taken to investigate and clean a Linux server that was compromised, highlighting key security lessons such as tightening SSH access, monitoring critical files, and restoring locked system utilities.

Cron JobsForensicsLD_PRELOAD
0 likes · 15 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Aikesheng Open Source Community
Aikesheng Open Source Community
Dec 20, 2023 · Information Security

MySQL User Security Hardening: Password Policy, Connection Control, and Password Change Strategies

This article details how to strengthen MySQL user security by implementing comprehensive password complexity requirements, connection control policies, and password change strategies, including configuration of the validate_password component, connection_control plugin, and password expiration settings for MySQL 5.7 and 8.0, with practical examples and code snippets.

Connection ControlDatabase AdministrationPassword policy
0 likes · 21 min read
MySQL User Security Hardening: Password Policy, Connection Control, and Password Change Strategies
Open Source Linux
Open Source Linux
Sep 26, 2022 · Information Security

Bash Scripts to Inspect Linux Processes, Users, and Harden System Security

This article presents a collection of Bash scripts for Linux administrators, covering how to retrieve detailed process information by PID or name, query user account details, and apply various system hardening measures such as password policies, login restrictions, and file immutability.

BashSystem AdministrationUser Management
0 likes · 13 min read
Bash Scripts to Inspect Linux Processes, Users, and Harden System Security
Efficient Ops
Efficient Ops
Nov 26, 2021 · Information Security

How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do

A self‑built Kubernetes cluster suffered a crypto‑mining intrusion due to empty iptables and a misconfigured kubelet, prompting a detailed post‑mortem that outlines the symptoms, root‑cause analysis, and practical hardening steps to protect similar environments.

crypto miningfirewallincident response
0 likes · 5 min read
How a Misconfigured Kubelet Led to a Crypto‑Mining Breach and What to Do
Efficient Ops
Efficient Ops
Nov 22, 2020 · Information Security

Unmasking the gpg‑agentd Malware: From Server Freeze to Full‑Scale Attack

This article walks through a real‑world compromise of an Alibaba Cloud server, detailing how a disguised gpg‑agentd process was used to install backdoors, hijack SSH keys, exploit Redis, and launch mass scanning with malicious scripts, and it concludes with practical hardening recommendations.

gpg-agentdmalware analysismasscan
0 likes · 15 min read
Unmasking the gpg‑agentd Malware: From Server Freeze to Full‑Scale Attack
Ops Development Stories
Ops Development Stories
Jan 22, 2020 · Information Security

How to Detect and Eradicate Hidden Windows Server Mining Malware

This article walks through the discovery, analysis, and complete removal of a stealthy Windows Server mining malware, detailing suspicious processes, malicious scheduled tasks, registry modifications, WMI persistence, and post‑infection hardening steps to secure the system.

Malware RemovalScheduled TasksWindows server
0 likes · 25 min read
How to Detect and Eradicate Hidden Windows Server Mining Malware
MaGe Linux Operations
MaGe Linux Operations
Nov 16, 2017 · Information Security

How to Secure Apache Zeppelin with HTTPS and Command Restrictions in 4 Hours

During a weekend project, we configured Apache Zeppelin to use HTTPS with a domain certificate, added optional mutual TLS, and modified its source code to restrict shell and Python execution, enabling the client’s security team to pass penetration testing while preserving Zeppelin’s core functionality.

Apache ZeppelinHTTPSSource Code Modification
0 likes · 5 min read
How to Secure Apache Zeppelin with HTTPS and Command Restrictions in 4 Hours