Tagged articles
13 articles
Page 1 of 1
Ops Community
Ops Community
Sep 18, 2025 · Information Security

Essential Linux Security: Common Vulnerabilities and Practical Defense Strategies

This guide walks you through the most critical Linux security flaws—from privilege‑escalation and misconfigured sudo to SSH, web server, kernel, and container risks—offering concrete hardening steps, logging practices, firewall rules, incident‑response procedures, and compliance tips to build a resilient production environment.

Container SecurityLinux securityLog Monitoring
0 likes · 16 min read
Essential Linux Security: Common Vulnerabilities and Practical Defense Strategies
MaGe Linux Operations
MaGe Linux Operations
Aug 2, 2025 · Information Security

Build an Impenetrable Linux Server: Complete Security Guide from Zero to One

This comprehensive guide walks you through a real intrusion case, then presents a multi‑layer defense strategy—including SSH hardening, Fail2Ban, firewall rules, IDS, file integrity monitoring, advanced techniques like port knocking and honeypots, plus monitoring, alerting, and emergency response—to dramatically improve Linux server security.

Fail2banIDSSSH Hardening
0 likes · 15 min read
Build an Impenetrable Linux Server: Complete Security Guide from Zero to One
Efficient Ops
Efficient Ops
Nov 25, 2024 · Information Security

Uncovering the gpg-agentd Malware: How an Alibaba Cloud Server Was Compromised

This article walks through a real-world intrusion on an Alibaba Cloud CentOS server, detailing how a disguised gpg-agentd process was used to install backdoors, hijack SSH keys, exploit Redis, and launch mass scanning, and provides concrete hardening recommendations to prevent similar attacks.

Linux incident responseSSH HardeningServer Security
0 likes · 13 min read
Uncovering the gpg-agentd Malware: How an Alibaba Cloud Server Was Compromised
Java Tech Enthusiast
Java Tech Enthusiast
Oct 22, 2024 · Information Security

How to Harden Ubuntu 20.04 Server: SSH, Users, Keys, and Firewall

This guide walks through securing an Ubuntu 20.04 server by updating packages, changing the default SSH port, enforcing strong passwords, creating a non‑root user with sudo, disabling root login, enabling RSA key authentication, configuring the UFW firewall, and blocking ping requests.

Linux securityRSA keysSSH Hardening
0 likes · 9 min read
How to Harden Ubuntu 20.04 Server: SSH, Users, Keys, and Firewall
Liangxu Linux
Liangxu Linux
Jul 20, 2023 · Information Security

Boost Your Server Security: Essential SSH, User, and Sudo Hardening Steps

This guide walks you through practical Linux server hardening techniques—including SSH configuration tweaks, disabling ICMP ping responses, managing system users and groups, protecting critical account files, and safely granting root privileges—so you can reduce attack surface and improve overall security.

SSH HardeningServer SecuritySudo
0 likes · 6 min read
Boost Your Server Security: Essential SSH, User, and Sudo Hardening Steps
Open Source Linux
Open Source Linux
May 24, 2023 · Information Security

Boost Your Server Security: Essential Linux Hardening Steps

This guide walks you through practical Linux server hardening techniques—including SSH configuration, disabling ping replies, user and group management, sudoers tweaks, and granting root privileges—to significantly reduce the risk of unauthorized access.

SSH HardeningServer SecuritySudo
0 likes · 6 min read
Boost Your Server Security: Essential Linux Hardening Steps
Liangxu Linux
Liangxu Linux
May 10, 2023 · Information Security

Boost Your Server Security: Essential SSH, User, and Root Hardening Steps

This guide walks you through practical steps to secure a newly purchased Linux server, covering SSH configuration changes, disabling ping responses, thorough user and group management, creating new accounts, and three reliable methods to grant root privileges safely.

Root AccessSSH HardeningServer Security
0 likes · 6 min read
Boost Your Server Security: Essential SSH, User, and Root Hardening Steps
Java Captain
Java Captain
Mar 7, 2023 · Information Security

Server Intrusion Investigation and Remediation Steps

This article details a recent server intrusion case, describing the observed symptoms, possible causes, step‑by‑step forensic investigation using commands like ps, top, grep and crontab, and comprehensive remediation actions such as tightening SSH security, unlocking and restoring system binaries, removing malicious scripts, and key lessons for future protection.

SSH HardeningServer Securitychattr
0 likes · 14 min read
Server Intrusion Investigation and Remediation Steps
MaGe Linux Operations
MaGe Linux Operations
Mar 4, 2018 · Information Security

Hardening OpenSSH: Essential Steps to Secure Your SSH Server

This guide walks you through securing OpenSSH on Linux/Unix systems by configuring key‑based authentication, disabling root and password logins, restricting users, tightening firewall rules, applying rate limits, and using additional tools to protect against brute‑force attacks, all with concrete command examples.

Linux securityOpenSSHPublic Key Authentication
0 likes · 18 min read
Hardening OpenSSH: Essential Steps to Secure Your SSH Server
MaGe Linux Operations
MaGe Linux Operations
Dec 4, 2017 · Information Security

How to Harden Your Linux Server Against Unauthorized Access

This guide walks you through essential steps to secure a Linux server, including regular system updates, automatic security patches, creating restricted user accounts, hardening SSH with key authentication and daemon options, deploying Fail2Ban, removing unused services, and configuring firewalls for robust protection.

Fail2banSSH HardeningServer Security
0 likes · 13 min read
How to Harden Your Linux Server Against Unauthorized Access