Tagged articles
8 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Oct 10, 2025 · Information Security

CanaryTokens: Turning SSH Port Exposure into Real‑Time Attack‑Chain Detection

This article explains how to protect exposed SSH ports in cloud‑native environments by deploying CanaryToken honeytokens, hardening SSH configurations, automating detection and response, and building a complete attack‑chain tracing system that reduces intrusion discovery from hours to minutes.

CanaryTokenSSH Securityattack chain tracing
0 likes · 32 min read
CanaryTokens: Turning SSH Port Exposure into Real‑Time Attack‑Chain Detection
MaGe Linux Operations
MaGe Linux Operations
Jul 30, 2025 · Information Security

7 Proven Ways to Harden SSH and Block Brute‑Force Attacks

This guide walks you through seven practical SSH hardening techniques—from changing the default port and disabling password logins to deploying Fail2ban, IP whitelisting, connection limits, two‑factor authentication, and a honeypot—showing why each step matters and how to implement it securely.

Port ObfuscationPublic Key AuthenticationSSH Security
0 likes · 12 min read
7 Proven Ways to Harden SSH and Block Brute‑Force Attacks
MaGe Linux Operations
MaGe Linux Operations
May 8, 2025 · Information Security

4 Proven Ways to Stop SSH Brute‑Force Attacks (with Fail2ban Guide)

This article explains four effective techniques to protect SSH from brute‑force attacks—including strong passwords, changing the default port, using non‑root privileged users, and key‑based authentication—followed by detailed examples of configuration changes, Fail2ban installation, jail setup, testing, and IP unbanning procedures.

Brute-force protectionFail2banSSH Security
0 likes · 11 min read
4 Proven Ways to Stop SSH Brute‑Force Attacks (with Fail2ban Guide)
MaGe Linux Operations
MaGe Linux Operations
Dec 12, 2021 · Information Security

How to Stop Brute‑Force SSH Attacks on Your Raspberry Pi

This article explains how a Raspberry Pi exposed to the Internet was repeatedly attacked via SSH, how the author identified the brute‑force attempts in /var/log/auth.log, and step‑by‑step methods using hosts.allow/deny and ufw to whitelist trusted IPs and block malicious traffic.

Brute-force protectionLinux securityRaspberry Pi
0 likes · 5 min read
How to Stop Brute‑Force SSH Attacks on Your Raspberry Pi
Liangxu Linux
Liangxu Linux
Jun 2, 2020 · Information Security

Step-by-Step Guide to Harden CentOS 7.7 Server Security

This article provides a comprehensive, step‑by‑step tutorial for hardening a CentOS 7.7 server, covering complex password creation, password‑policy configuration, PAM strength settings, login‑attempt limits, disabling root SSH access, changing the SSH port, tightening security‑group rules, command‑history limits, log monitoring, and regular data backup procedures.

CentOSInformation SecurityPassword policy
0 likes · 6 min read
Step-by-Step Guide to Harden CentOS 7.7 Server Security
Open Source Linux
Open Source Linux
May 27, 2020 · Information Security

How to Harden a CentOS 7.7 Server: Essential Security Steps

This guide walks you through essential CentOS 7.7 server hardening steps—including setting complex passwords, configuring password policies, enforcing password strength, limiting login attempts, disabling root SSH access, changing SSH ports, tightening firewall rules, managing command history, monitoring logs, and scheduling regular backups—to improve system security.

CentOSLinuxPassword policy
0 likes · 5 min read
How to Harden a CentOS 7.7 Server: Essential Security Steps
Efficient Ops
Efficient Ops
May 20, 2019 · Information Security

How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server

After a routine morning, the author discovers an Alibaba Cloud server frozen due to malicious outbound traffic, then traces a sophisticated malware chain involving a disguised gpg-agentd process, malicious cron jobs, compromised SSH keys, Redis exploitation, and mass scanning, culminating in detailed forensic analysis and security recommendations.

Cron JobsSSH Securitygpg-agentd
0 likes · 13 min read
How a Hidden gpg-agentd Malware Hijacked an Alibaba Cloud Server
MaGe Linux Operations
MaGe Linux Operations
Feb 26, 2017 · Information Security

How We Traced and Stopped a UDP Flood Attack on an Oracle‑Tomcat Server

During the Chinese New Year a client’s Oracle‑Tomcat server was overwhelmed by massive UDP traffic, prompting a forensic investigation that uncovered a hidden Trojan, detailed command‑line analysis, iptables hardening, and the root cause of a weak SSH password left after a hardware upgrade.

Linux forensicsSSH Securityincident response
0 likes · 5 min read
How We Traced and Stopped a UDP Flood Attack on an Oracle‑Tomcat Server