Tagged articles
31 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Dec 26, 2025 · Information Security

How to Respond When Your Server Is Compromised: Essential Incident Response and Forensics for Ops

This guide walks operations engineers through recognizing intrusion indicators, executing rapid detection scripts, following a structured 24‑hour response workflow, performing comprehensive digital forensics, and applying cleanup and hardening measures to secure compromised servers and prevent future attacks.

Server SecuritySystem Hardeningdigital forensics
0 likes · 15 min read
How to Respond When Your Server Is Compromised: Essential Incident Response and Forensics for Ops
Xiao Liu Lab
Xiao Liu Lab
Oct 30, 2025 · Information Security

Essential Linux Security Baseline for Tier‑3 Compliance: Step‑by‑Step Guide

This article provides a comprehensive, step‑by‑step Linux security baseline for Tier‑3 compliance, covering password policies, login controls, access restrictions, audit logging, intrusion prevention, patch management, and resource limits, complete with executable commands for major distributions.

Password policySecuritySystem Hardening
0 likes · 9 min read
Essential Linux Security Baseline for Tier‑3 Compliance: Step‑by‑Step Guide
Ops Community
Ops Community
Sep 2, 2025 · Information Security

Mastering SELinux in Production: A Complete Security Configuration Guide

This comprehensive guide walks you through SELinux fundamentals, core concepts, mode differences, security contexts, real‑world configuration examples for web and database services, boolean management, troubleshooting techniques, performance tuning, and enterprise‑grade best practices to turn SELinux into a reliable production‑level security guardian.

Linux securitySELinuxSystem Hardening
0 likes · 16 min read
Mastering SELinux in Production: A Complete Security Configuration Guide
Open Source Linux
Open Source Linux
Mar 20, 2025 · Information Security

30 High‑Risk Ports to Secure and How to Safely Close Them

This guide lists thirty commonly exposed high‑risk ports, explains the security threats each poses, and provides practical firewall, service‑management, and closure steps to help you harden your systems against attacks.

System Hardeninghigh-risk portsnetwork security
0 likes · 7 min read
30 High‑Risk Ports to Secure and How to Safely Close Them
Efficient Ops
Efficient Ops
Mar 12, 2025 · Information Security

30 High-Risk Ports You Must Secure and How to Close Them

This guide lists 30 commonly exposed high‑risk ports such as LDAP, MySQL, and Docker, explains the security threats they pose, and provides practical firewall, service‑management, and port‑closing steps—including command‑line examples—to help you harden your systems against attacks.

System Hardeningfirewallhigh-risk ports
0 likes · 7 min read
30 High-Risk Ports You Must Secure and How to Close Them
Liangxu Linux
Liangxu Linux
Nov 3, 2024 · Information Security

50 Critical Linux Ports You Must Close to Secure Your System

This guide lists the most dangerous Linux ports, explains their typical uses, the security risks they pose, and provides concrete recommendations—such as changing default ports, disabling services, and applying firewall rules—to harden your system against attacks.

Port SecuritySystem Hardeningfirewall
0 likes · 13 min read
50 Critical Linux Ports You Must Close to Secure Your System
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2024 · Information Security

Essential Linux Account Security: Disable Root, Harden Permissions, and Block Attacks

This guide details practical steps for securing Linux accounts, including disabling unnecessary super‑user accounts, enforcing strong password policies, locking critical files, restricting privileged commands, tightening file permissions, and configuring network and system settings to prevent spoofing, DoS, and SYN attacks.

InfoSecPassword policyRoot Hardening
0 likes · 11 min read
Essential Linux Account Security: Disable Root, Harden Permissions, and Block Attacks
Open Source Linux
Open Source Linux
Apr 18, 2024 · Information Security

Essential Linux Security Hardening Checklist for Red Hat Systems

This guide outlines a comprehensive set of security configurations for Red Hat Linux, covering shared account checks, redundant account locking, root remote login restrictions, password complexity and lifespan policies, directory permissions, logging, SSH hardening, service disabling, and patch management to ensure robust system protection.

Password policySecuritySystem Hardening
0 likes · 22 min read
Essential Linux Security Hardening Checklist for Red Hat Systems
DevOps Operations Practice
DevOps Operations Practice
Mar 6, 2024 · Information Security

Comprehensive Linux System Hardening Guide for Production Environments

This guide details practical Linux hardening steps—including disabling SELinux, trimming startup services, applying the principle of least privilege, configuring sudo, synchronizing time, adjusting file descriptor limits, locking critical files, disabling ping, optimizing SSH, changing hostnames, and preventing destructive rm commands—to improve security and stability in production deployments.

SELinuxSudoSystem Hardening
0 likes · 12 min read
Comprehensive Linux System Hardening Guide for Production Environments
MaGe Linux Operations
MaGe Linux Operations
Jul 25, 2023 · Operations

Master Linux Process, User Queries and System Hardening with Bash

This guide provides Bash scripts to filter process details by PID or name, retrieve comprehensive user information, and apply a series of system hardening configurations—including password policies, login restrictions, and file attribute locks—to improve Linux server security and manageability.

BashOperationsSystem Hardening
0 likes · 11 min read
Master Linux Process, User Queries and System Hardening with Bash
Java High-Performance Architecture
Java High-Performance Architecture
Mar 21, 2023 · Information Security

How to Detect and Recover from a Compromised Linux Server: Step‑by‑Step Guide

A detailed walkthrough of a recent Linux server breach shows how attackers hijacked system utilities, inserted hidden scripts, and leveraged LD_PRELOAD, while the remediation steps cover log analysis, SSH hardening, file attribute restoration, cron cleanup, and key lessons for future hardening.

Rootkit RemovalServer SecuritySystem Hardening
0 likes · 15 min read
How to Detect and Recover from a Compromised Linux Server: Step‑by‑Step Guide
Ops Development Stories
Ops Development Stories
Oct 31, 2022 · Information Security

Essential Security Checklist for Ops: From Port Hardening to Data Protection

This article shares practical security best practices for operations teams, covering why security is often overlooked, real incident examples, and detailed guidelines on port hardening, system hardening (login management, vulnerability scanning, baseline checks), application, network, and data protection, emphasizing continuous investment and simple safeguards.

OperationsSystem Hardeningbest practices
0 likes · 8 min read
Essential Security Checklist for Ops: From Port Hardening to Data Protection
Liangxu Linux
Liangxu Linux
Aug 21, 2022 · Information Security

Master Linux Incident Response: Detect, Remove, and Harden Malware Infections

This guide walks you through a complete Linux incident‑response workflow—identifying suspicious behavior, locating and terminating malicious processes, eliminating virus files, closing persistence mechanisms, and hardening the system to prevent future compromises—using practical shell commands and real‑world examples.

Malware RemovalSecuritySystem Hardening
0 likes · 9 min read
Master Linux Incident Response: Detect, Remove, and Harden Malware Infections
MaGe Linux Operations
MaGe Linux Operations
Aug 12, 2022 · Information Security

Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step

This guide presents a practical four‑stage Linux incident‑response workflow—identifying suspicious behavior, terminating and deleting malicious processes, sealing persistence mechanisms, and hardening the system—complete with essential shell commands and verification steps to efficiently neutralize Linux‑based malware.

Malware RemovalSecurityShell Commands
0 likes · 10 min read
Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step
Open Source Linux
Open Source Linux
Jan 17, 2022 · Information Security

Mastering Incident Response: A Step‑by‑Step Guide for Security Professionals

This comprehensive guide walks security engineers through every phase of an incident response—from initial information gathering, containment, and vulnerability scanning to detailed log, process, and account analysis, culminating in recovery steps and post‑incident hardening recommendations.

ForensicsSecurity OperationsSystem Hardening
0 likes · 28 min read
Mastering Incident Response: A Step‑by‑Step Guide for Security Professionals
Open Source Linux
Open Source Linux
Jan 8, 2021 · Information Security

Linux Account Security Checklist: Detect Intrusions & Harden Your System

This guide details how to examine Linux user and shadow files, monitor login activity, investigate suspicious processes, review startup scripts, audit cron jobs, search for altered files, and analyze system logs to detect and mitigate potential intrusions.

System Hardeningaccount securityintrusion detection
0 likes · 16 min read
Linux Account Security Checklist: Detect Intrusions & Harden Your System
DevOps
DevOps
Jun 2, 2020 · Information Security

How to Enhance the Security of JumpServer: Best Practices and Recommendations

This article outlines ten essential steps to strengthen JumpServer security, including upgrading the operating system and JumpServer software, updating dependencies, avoiding weak passwords, enabling OS security components, minimizing open ports, securing public access, configuring SSL, enforcing strong passwords, and enabling multi‑factor authentication.

Bastion HostJumpServerSystem Hardening
0 likes · 5 min read
How to Enhance the Security of JumpServer: Best Practices and Recommendations
Ops Development Stories
Ops Development Stories
Apr 26, 2020 · Information Security

Essential Linux & Windows System Hardening Steps for Strong Security

This guide details practical hardening techniques for Linux and Windows servers, covering SSH configuration, password policies, account lockout, su restrictions, ICMP suppression, firewall rules, RDP port changes, security policies, and disabling vulnerable services to significantly improve system security.

Password policySSHSecurity
0 likes · 10 min read
Essential Linux & Windows System Hardening Steps for Strong Security
Liangxu Linux
Liangxu Linux
Dec 10, 2019 · Information Security

Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step

This guide walks you through a complete Linux incident‑response workflow—identifying suspicious behavior, terminating malicious processes, eradicating virus files, closing persistence mechanisms, and hardening the system—while providing concrete shell commands and practical tips for each stage.

Malware RemovalSecuritySystem Hardening
0 likes · 10 min read
Master Linux Incident Response: Detect, Remove, and Harden Malware Step‑by‑Step
MaGe Linux Operations
MaGe Linux Operations
Nov 3, 2019 · Information Security

Essential Linux Security Hardening: From Account Safety to Rootkit Detection

This comprehensive guide walks operations engineers through Linux security hardening—covering account and login protection, service minimization, password and key authentication, proper use of su/sudo, banner trimming, remote access safeguards, file system security, rootkit detection tools, and step‑by‑step post‑attack response—to build resilient servers against modern threats.

Rootkit DetectionSystem Hardeninginformation security
0 likes · 24 min read
Essential Linux Security Hardening: From Account Safety to Rootkit Detection
Efficient Ops
Efficient Ops
Aug 28, 2019 · Operations

How to Harden Linux Server Security: Account, Login, and Boot Controls

This guide details practical Linux server hardening techniques—including account cleanup, password policies, su/sudo restrictions, login controls, and BIOS/GRUB protection—while providing exact command examples for operations teams to quickly improve system security.

Account ManagementOperationsSecurity
0 likes · 12 min read
How to Harden Linux Server Security: Account, Login, and Boot Controls
MaGe Linux Operations
MaGe Linux Operations
Jul 22, 2017 · Information Security

8 Proven Ways to Harden Linux System Security

This article outlines eight practical techniques—including using shadow passwords, disabling unnecessary services, keeping the kernel up‑to‑date, enforcing strong login passwords, managing user privileges, limiting root access, employing SSH, and removing risky r‑commands—to significantly improve the security of a Linux system.

Root AccessSecuritySystem Hardening
0 likes · 11 min read
8 Proven Ways to Harden Linux System Security
ITPUB
ITPUB
Jul 19, 2017 · Information Security

Essential Linux Hardening: Minimalism, Port Tweaks, and Kernel Optimizations

This guide walks through practical Linux hardening steps—including minimal installation, SSH port changes, sudo privilege tailoring, extensive kernel sysctl tuning, firewall adjustments, system version hiding, file protection, and package installation strategies—to boost security and performance while keeping the system lean.

SSHSudoSystem Hardening
0 likes · 6 min read
Essential Linux Hardening: Minimalism, Port Tweaks, and Kernel Optimizations
Efficient Ops
Efficient Ops
Jul 2, 2017 · Operations

How to Build a Multi‑Layered Security Defense: Practical Ops Strategies

This article outlines a comprehensive, multi‑layered security framework for operations teams, covering policy design, dual‑account permission separation, grid‑based vulnerability management, topology and network safeguards, OS and database hardening, common misconceptions, and actionable principles for maintaining robust protection.

OperationsSecuritySystem Hardening
0 likes · 31 min read
How to Build a Multi‑Layered Security Defense: Practical Ops Strategies
MaGe Linux Operations
MaGe Linux Operations
Mar 31, 2017 · Information Security

How to Harden CentOS 6.7: A Complete Account and System Security Guide

This article walks through a step‑by‑step hardening of a CentOS 6.7 host, covering password lockout policies, password aging and complexity, removal of unused accounts, file‑system permissions, log protection, SSH restrictions, NFS limits, and network‑level safeguards to achieve a compliance score of 90 points.

System Hardeninglinuxpam
0 likes · 14 min read
How to Harden CentOS 6.7: A Complete Account and System Security Guide
Big Data and Microservices
Big Data and Microservices
May 5, 2016 · Information Security

Essential Linux Security Audit Checklist: 11 Steps to Detect Compromise

This guide walks you through eleven systematic Linux security checks—including account inspection, log review, process analysis, file integrity, RPM verification, network monitoring, scheduled tasks, backdoor detection, kernel modules, services, and rootkit scans—to help identify potential system compromises.

ForensicsRootkitSecurity
0 likes · 6 min read
Essential Linux Security Audit Checklist: 11 Steps to Detect Compromise
ITPUB
ITPUB
Mar 14, 2016 · Information Security

How to Diagnose and Remove Hidden Malware Causing Network Flood on a Linux Server

A step‑by‑step guide shows how to identify abnormal NIC traffic, locate malicious init scripts and hidden processes, use simple shell scripts and netstat to pinpoint the offending connection, and clean a compromised Linux server to restore normal network performance.

SecuritySystem Hardeninglinux
0 likes · 10 min read
How to Diagnose and Remove Hidden Malware Causing Network Flood on a Linux Server
Efficient Ops
Efficient Ops
Jul 30, 2015 · Information Security

Designing a Multi‑Layer Ops Security Tower: Network, System & Permission Strategies

This article summarizes a comprehensive ops security talk that breaks down network segmentation, system hardening, and permission management into layered defenses, offering practical guidance on VLANs, ACLs, least‑privilege principles, and account auditing for robust enterprise protection.

System Hardeningaccess controlinformation security
0 likes · 11 min read
Designing a Multi‑Layer Ops Security Tower: Network, System & Permission Strategies
MaGe Linux Operations
MaGe Linux Operations
Jul 8, 2014 · Information Security

Top 9 Essential Linux Security Practices Every Admin Should Implement

Securing Linux systems requires more than a single anti‑malware tool; this guide outlines nine practical measures—including SELinux, vulnerability alerts, service hardening, log monitoring, port knocking, iptables, default‑deny policies, IDS, and full‑disk encryption—to strengthen system defenses against attacks.

IDSPort KnockingSELinux
0 likes · 6 min read
Top 9 Essential Linux Security Practices Every Admin Should Implement