Tagged articles
48 articles
Page 1 of 1
Ops Community
Ops Community
May 4, 2026 · Information Security

Investigating and Securing a Server After a Suspicious Login

When a production server shows unexpected high CPU usage and unknown login activity, this guide walks Linux ops engineers through confirming intrusion, stopping the attacker, tracing the attack path, removing backdoors, restoring system integrity, and applying hardening measures to prevent future breaches.

ForensicsHardeningLinux
0 likes · 27 min read
Investigating and Securing a Server After a Suspicious Login
Architect's Guide
Architect's Guide
Apr 10, 2026 · Operations

How to Block Foreign IPs with NGINX and the ngx_http_geoip2 Module

This step‑by‑step guide shows how to install the GeoIP2 library, compile NGINX 1.18 with the ngx_http_geoip2 module, download the latest MaxMind GeoLite2 database, configure geoip2 directives, and verify that foreign IP requests are blocked with a 404 response.

NginxServer Securityblock foreign IP
0 likes · 7 min read
How to Block Foreign IPs with NGINX and the ngx_http_geoip2 Module
Raymond Ops
Raymond Ops
Dec 26, 2025 · Information Security

How to Respond When Your Server Is Compromised: Essential Incident Response and Forensics for Ops

This guide walks operations engineers through recognizing intrusion indicators, executing rapid detection scripts, following a structured 24‑hour response workflow, performing comprehensive digital forensics, and applying cleanup and hardening measures to secure compromised servers and prevent future attacks.

Server SecuritySystem Hardeningdigital forensics
0 likes · 15 min read
How to Respond When Your Server Is Compromised: Essential Incident Response and Forensics for Ops
Raymond Ops
Raymond Ops
Dec 18, 2025 · Information Security

Build an Impenetrable Linux Server: Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion analysis and a multi‑layered hardening strategy for Linux servers, covering SSH security, Fail2Ban, firewalls, iptables, IDS, file integrity monitoring, automated alerts, emergency response, and advanced techniques to create a robust defense.

Fail2banHardeningIDS
0 likes · 15 min read
Build an Impenetrable Linux Server: Step‑by‑Step Security Hardening Guide
Old Meng AI Explorer
Old Meng AI Explorer
Oct 31, 2025 · Information Security

How SafeLine Turns Your Server into a Zero‑Config WAF in 3 Minutes

SafeLine, an open‑source web application firewall, offers zero‑configuration, multi‑scenario protection against SQL injection, XSS, malicious crawlers, and brute‑force attacks, delivering 99% interception accuracy with minimal resource usage and a simple three‑step Docker deployment for small‑to‑medium sites.

DockerSafeLineServer Security
0 likes · 8 min read
How SafeLine Turns Your Server into a Zero‑Config WAF in 3 Minutes
Open Source Linux
Open Source Linux
Oct 9, 2025 · Information Security

Essential Incident Response & Forensics Guide for Server Intrusions

This article provides a comprehensive step‑by‑step process for detecting server compromises, collecting system, memory, and network evidence, analyzing logs, isolating the affected host, removing malicious artifacts, and hardening the environment to prevent future attacks.

ForensicsServer Securityincident response
0 likes · 15 min read
Essential Incident Response & Forensics Guide for Server Intrusions
Liangxu Linux
Liangxu Linux
Sep 22, 2025 · Information Security

Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion case analysis, multi‑layer defense strategies—including SSH hardening, Fail2Ban, firewall rules, IDS deployment, file integrity monitoring, advanced techniques like port knocking and honeypots—and incident response procedures, providing concrete commands and scripts to secure a Linux server from end to end.

Fail2banHardeningIDS
0 likes · 13 min read
Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide
Liangxu Linux
Liangxu Linux
Aug 10, 2025 · Information Security

How to Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide

This comprehensive guide walks you through real‑world intrusion analysis, multi‑layer SSH hardening, Fail2Ban, firewall and iptables rules, intrusion detection with OSSEC, automated monitoring scripts, advanced techniques like port knocking and honeypots, and a complete incident‑response playbook to secure any Linux server.

Fail2banHardeningIDS
0 likes · 14 min read
How to Build an Impenetrable Linux Server: A Step‑by‑Step Security Hardening Guide
MaGe Linux Operations
MaGe Linux Operations
Aug 2, 2025 · Information Security

Build an Impenetrable Linux Server: Complete Security Guide from Zero to One

This comprehensive guide walks you through a real intrusion case, then presents a multi‑layer defense strategy—including SSH hardening, Fail2Ban, firewall rules, IDS, file integrity monitoring, advanced techniques like port knocking and honeypots, plus monitoring, alerting, and emergency response—to dramatically improve Linux server security.

Fail2banIDSSSH Hardening
0 likes · 15 min read
Build an Impenetrable Linux Server: Complete Security Guide from Zero to One
Raymond Ops
Raymond Ops
Dec 26, 2024 · Information Security

How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide

This article details a real‑world Linux server breach, describing the symptoms, investigative commands, log analysis, malicious script removal, file attribute unlocking, and practical remediation steps, while highlighting key lessons and preventive measures for future security.

LinuxRootkit RemovalServer Security
0 likes · 16 min read
How to Detect and Recover from a Linux Server Intrusion: A Step‑by‑Step Guide
Efficient Ops
Efficient Ops
Nov 25, 2024 · Information Security

Uncovering the gpg-agentd Malware: How an Alibaba Cloud Server Was Compromised

This article walks through a real-world intrusion on an Alibaba Cloud CentOS server, detailing how a disguised gpg-agentd process was used to install backdoors, hijack SSH keys, exploit Redis, and launch mass scanning, and provides concrete hardening recommendations to prevent similar attacks.

Linux incident responseSSH HardeningServer Security
0 likes · 13 min read
Uncovering the gpg-agentd Malware: How an Alibaba Cloud Server Was Compromised
DevOps Operations Practice
DevOps Operations Practice
May 3, 2024 · Information Security

Top Antivirus Solutions for Linux Systems

This article reviews several leading cross‑platform antivirus products—Avast, ESET NOD32, F‑PROT, ClamAV, Comodo, and Sophos—highlighting their features, Linux compatibility, and considerations for securing servers while noting that proper security practices may reduce the need for constant antivirus deployment.

AntivirusLinuxMalware Protection
0 likes · 5 min read
Top Antivirus Solutions for Linux Systems
Efficient Ops
Efficient Ops
Aug 15, 2023 · Information Security

How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response

This article details a real‑world Linux server intrusion, describing the observed symptoms, the forensic investigation using commands like ps, top, last, and grep, the removal of malicious cron jobs and backdoors, and the lessons learned for securing SSH, file attributes, and cloud security groups.

RootkitSSHServer Security
0 likes · 15 min read
How I Recovered a Compromised Linux Server: Step‑by‑Step Incident Response
Liangxu Linux
Liangxu Linux
Jul 20, 2023 · Information Security

Boost Your Server Security: Essential SSH, User, and Sudo Hardening Steps

This guide walks you through practical Linux server hardening techniques—including SSH configuration tweaks, disabling ICMP ping responses, managing system users and groups, protecting critical account files, and safely granting root privileges—so you can reduce attack surface and improve overall security.

LinuxSSH HardeningServer Security
0 likes · 6 min read
Boost Your Server Security: Essential SSH, User, and Sudo Hardening Steps
Liangxu Linux
Liangxu Linux
May 28, 2023 · Information Security

How to Harden a Linux Server: SSH, User Management, and Sudo Tweaks

This guide walks through practical steps to secure a Linux server, including modifying SSH settings, disabling ping responses, managing users and groups, protecting critical account files, creating new users, and configuring sudo or UID changes to control root access.

LinuxRoot AccessSSH
0 likes · 6 min read
How to Harden a Linux Server: SSH, User Management, and Sudo Tweaks
Open Source Linux
Open Source Linux
May 24, 2023 · Information Security

Boost Your Server Security: Essential Linux Hardening Steps

This guide walks you through practical Linux server hardening techniques—including SSH configuration, disabling ping replies, user and group management, sudoers tweaks, and granting root privileges—to significantly reduce the risk of unauthorized access.

LinuxSSH HardeningServer Security
0 likes · 6 min read
Boost Your Server Security: Essential Linux Hardening Steps
Liangxu Linux
Liangxu Linux
May 10, 2023 · Information Security

Boost Your Server Security: Essential SSH, User, and Root Hardening Steps

This guide walks you through practical steps to secure a newly purchased Linux server, covering SSH configuration changes, disabling ping responses, thorough user and group management, creating new accounts, and three reliable methods to grant root privileges safely.

LinuxRoot AccessSSH Hardening
0 likes · 6 min read
Boost Your Server Security: Essential SSH, User, and Root Hardening Steps
Liangxu Linux
Liangxu Linux
May 5, 2023 · Information Security

Boost Your Server’s Defense: Essential SSH and User Security Tweaks

Learn practical steps to harden a Linux server—including changing the SSH port, disabling root login, blocking ping, managing users and groups, securing critical system files, and configuring sudo—so you can protect your machine from common attacks and unauthorized access.

LinuxRoot AccessSSH
0 likes · 6 min read
Boost Your Server’s Defense: Essential SSH and User Security Tweaks
Java High-Performance Architecture
Java High-Performance Architecture
Mar 21, 2023 · Information Security

How to Detect and Recover from a Compromised Linux Server: Step‑by‑Step Guide

A detailed walkthrough of a recent Linux server breach shows how attackers hijacked system utilities, inserted hidden scripts, and leveraged LD_PRELOAD, while the remediation steps cover log analysis, SSH hardening, file attribute restoration, cron cleanup, and key lessons for future hardening.

LinuxRootkit RemovalServer Security
0 likes · 15 min read
How to Detect and Recover from a Compromised Linux Server: Step‑by‑Step Guide
Java Captain
Java Captain
Mar 7, 2023 · Information Security

Server Intrusion Investigation and Remediation Steps

This article details a recent server intrusion case, describing the observed symptoms, possible causes, step‑by‑step forensic investigation using commands like ps, top, grep and crontab, and comprehensive remediation actions such as tightening SSH security, unlocking and restoring system binaries, removing malicious scripts, and key lessons for future protection.

SSH HardeningServer Securitychattr
0 likes · 14 min read
Server Intrusion Investigation and Remediation Steps
MaGe Linux Operations
MaGe Linux Operations
Feb 27, 2023 · Backend Development

How to Block Foreign IPs in Nginx Using the GeoIP2 Module

This step‑by‑step guide shows how to install the GeoIP2 library, upgrade Nginx, compile the ngx_http_geoip2 module, download the MaxMind GeoLite2 database, configure nginx.conf to detect non‑Chinese IPs, and return a 404 response to block foreign visitors.

ConfigurationServer Securityblock foreign IP
0 likes · 8 min read
How to Block Foreign IPs in Nginx Using the GeoIP2 Module
Architecture Digest
Architecture Digest
Oct 8, 2022 · Information Security

Server Intrusion Investigation and Remediation Steps on a Linux Host

This article documents a real‑world Linux server compromise, detailing the observed symptoms, forensic commands, malicious scripts, file‑locking tricks, and a step‑by‑step remediation process including SSH hardening, cron cleanup, chattr usage, and preventive security recommendations.

LinuxRootkitServer Security
0 likes · 15 min read
Server Intrusion Investigation and Remediation Steps on a Linux Host
php Courses
php Courses
Aug 6, 2022 · Information Security

Building a Custom IP Filtering System for Public Servers with Automated Whitelisting

Facing constant port scans and malicious login attempts on a public server, the author outlines a self‑developed IP filtering solution that automatically adds trusted IPs to a whitelist, featuring multi‑process support, concurrency, daemon mode, a web management panel, traffic statistics, and interception logging.

IP filteringPHPServer Security
0 likes · 3 min read
Building a Custom IP Filtering System for Public Servers with Automated Whitelisting
Open Source Linux
Open Source Linux
Jun 1, 2022 · Information Security

How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do

This article chronicles the discovery of a server breach used for cryptocurrency mining, analyzes the malicious Python payload and its system modifications, and provides concrete remediation steps such as system reinstall, non‑root deployment, firewall hardening, and Nginx authentication.

Cryptocurrency MiningServer SecuritySpringBoot
0 likes · 12 min read
How a SpringBoot Server Was Hijacked for Crypto Mining and What You Can Do
Open Source Linux
Open Source Linux
Mar 11, 2022 · Backend Development

How to Build a Dynamic IP Blacklist with Nginx, Lua, and Redis

Learn to protect your server from malicious crawlers by creating a dynamic IP blacklist using Nginx, Lua, and Redis, covering architecture choices, installation steps, configuration snippets, and how to share and update the blacklist across multiple machines.

BackendLuaNginx
0 likes · 4 min read
How to Build a Dynamic IP Blacklist with Nginx, Lua, and Redis
Architecture Digest
Architecture Digest
Dec 14, 2021 · Information Security

Implementing a Dynamic IP Blacklist with Nginx, Lua, and Redis

This guide explains how to build a dynamic IP blacklist using Nginx, Lua scripts, and Redis to block malicious or unwanted requests at the server level, covering architecture choices, installation steps, configuration details, and the benefits of a lightweight, shared, and easily updatable solution.

Server Securityip blacklistredis
0 likes · 4 min read
Implementing a Dynamic IP Blacklist with Nginx, Lua, and Redis
Open Source Linux
Open Source Linux
Sep 4, 2021 · Operations

What’s New in Windows Server 2022 LTSC? Security, Networking, and Edge Updates

This article outlines the key features of Windows Server 2022 LTSC—including enhanced security with TPM 2.0 and VBS, default HTTPS/TLS 1.3, SMB AES‑256 encryption, network stack improvements, Hyper‑V virtualization upgrades, and the switch to Chromium Edge as the default browser—while noting Microsoft’s new multi‑year support model.

Edge BrowserHyper-VNetwork Stack
0 likes · 5 min read
What’s New in Windows Server 2022 LTSC? Security, Networking, and Edge Updates
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Jun 27, 2021 · Information Security

Top 12 Proven Strategies to Secure Your Nginx Web Server

This guide outlines twelve practical steps—including keeping Nginx up‑to‑date, removing unused modules, disabling version disclosure, blocking malicious user agents, limiting HTTP methods, setting buffer limits, and configuring TLS—to harden Nginx servers against common attacks.

HardeningServer SecurityTLS
0 likes · 8 min read
Top 12 Proven Strategies to Secure Your Nginx Web Server
macrozheng
macrozheng
Nov 26, 2020 · Information Security

Recovering a Server Hijacked by a Crypto‑Mining Virus: My Step‑by‑Step Fix

After my small 1‑CPU, 2 GB server was compromised by a crypto‑mining virus that hijacked SSH access, I used VNC to investigate, identified malicious processes, traced infected files, removed cron jobs, restored system utilities, repaired SELinux, and closed the Redis vulnerability to fully recover the machine.

LinuxRedis vulnerabilitySSH
0 likes · 10 min read
Recovering a Server Hijacked by a Crypto‑Mining Virus: My Step‑by‑Step Fix
Java Backend Technology
Java Backend Technology
Apr 2, 2018 · Information Security

How a Hidden Cron Job Hijacked My Server and How I Fixed It

A production server running Tomcat, MySQL, MongoDB and ActiveMQ was taken down by a malicious cron job that executed a cryptomining script, and the article walks through the investigation, removal, and hardening steps to fully recover and secure the system.

Linux HardeningServer Securitycron job
0 likes · 4 min read
How a Hidden Cron Job Hijacked My Server and How I Fixed It
MaGe Linux Operations
MaGe Linux Operations
Dec 4, 2017 · Information Security

How to Harden Your Linux Server Against Unauthorized Access

This guide walks you through essential steps to secure a Linux server, including regular system updates, automatic security patches, creating restricted user accounts, hardening SSH with key authentication and daemon options, deploying Fail2Ban, removing unused services, and configuring firewalls for robust protection.

Fail2banSSH HardeningServer Security
0 likes · 13 min read
How to Harden Your Linux Server Against Unauthorized Access
MaGe Linux Operations
MaGe Linux Operations
Mar 28, 2017 · Information Security

Hardening Linux Servers: Essential Security Configurations & Best Practices

This guide walks through comprehensive Linux server hardening techniques, covering user account management, service minimization, file permission tightening, virtual memory tuning, log handling, and firewall configuration with iptables and ipchains, providing step‑by‑step commands and screenshots to enhance system security and stability.

HardeningServer SecuritySystem optimization
0 likes · 16 min read
Hardening Linux Servers: Essential Security Configurations & Best Practices
dbaplus Community
dbaplus Community
Jan 25, 2017 · Information Security

Effective Server Security Incident Response: Step‑by‑Step Guide

When a production server is compromised, abrupt actions like pulling the plug can disrupt services, so this guide outlines an eight‑stage, evidence‑driven response process—including verification, on‑site preservation, containment, impact assessment, online analysis, backup, deep forensics, and reporting—plus real‑world case studies and concrete command examples.

Case StudyForensicsLinux
0 likes · 14 min read
Effective Server Security Incident Response: Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
Sep 12, 2014 · Information Security

Secure Your New Ubuntu Server in Minutes: SSH, Firewall, and Fail2Ban

This step‑by‑step guide shows how to harden a freshly installed Ubuntu 12.04 LTS server by creating a non‑root user, disabling root SSH access, configuring SSH keys, applying system updates, setting up iptables firewall rules, and installing Fail2Ban to automatically block malicious login attempts.

Fail2banLinuxSSH
0 likes · 13 min read
Secure Your New Ubuntu Server in Minutes: SSH, Firewall, and Fail2Ban
MaGe Linux Operations
MaGe Linux Operations
Jul 15, 2014 · Information Security

How I Traced a Bandwidth‑Hogging Malware on a Linux Server

A Linux admin recounts responding to a bandwidth‑saturation incident, discovering a suspicious sbin process hidden in /var/cache, using ifconfig, top, and netstat to reveal PPTP connections, and outlining the steps taken to identify and remove the malicious scripts.

Bandwidth HijackingLinuxMalware Investigation
0 likes · 6 min read
How I Traced a Bandwidth‑Hogging Malware on a Linux Server
MaGe Linux Operations
MaGe Linux Operations
Jul 4, 2014 · Information Security

Rootkit Hijack on a Linux Server: Forensic Walkthrough and Recovery

This article details a real‑world Linux server intrusion, showing how a rootkit exploited an Awstats script vulnerability, the forensic steps to identify malicious processes, hidden files, and compromised accounts, and the recommended remediation actions to restore a secure environment.

AwstatsForensicsLinux
0 likes · 14 min read
Rootkit Hijack on a Linux Server: Forensic Walkthrough and Recovery
MaGe Linux Operations
MaGe Linux Operations
Jun 23, 2014 · Information Security

Essential Linux Server Hardening: Disable Root SSH, Change Port, and More

This guide outlines practical Linux server hardening steps—including disabling root SSH login, changing the default SSH port, using SCP over FTP, installing denyhosts, managing file permissions, employing dedicated service accounts, and safely obtaining tools like PuTTY—to significantly improve system security.

DenyHostsLinuxPutty
0 likes · 5 min read
Essential Linux Server Hardening: Disable Root SSH, Change Port, and More