How to secure my webserver

Find the HOWTO or step-by-step guide that you need right here.

 

Discover How To Secure My Webserver HOWTOs

Guide To Installing & Securing MariaDB on Ubuntu 24.04

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

MariaDB is an open-source, relational database system that's widely used as a replacement for MySQL. It is a powerful database management system with strong security features and a flexible design. This makes it suitable for many applications. This tutorial will walk you through the installation of MariaDB on Ubuntu 24, a stable and recent release of one of the most popular Linux Distributions.

How to Install Modsecurity 2, OWASP CRS with Apache on Ubuntu 22.04 or 20.04

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For those seeking to bolster their server’s defenses against web-based threats, understanding “How to Install Modsecurity 2 with Apache on Ubuntu 22.04 Jammy Jellyfish or its older stable release Ubuntu 20.04 Focal Fossa” is paramount. ModSecurity, a leading open-source web application firewall (WAF), seamlessly integrates with the Apache HTTP Server.

How to Change Root Password of MySQL or MariaDB in Linux: Step-by-Step Guide

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

MySQL and MariaDB are popular relational database management systems used for storing and managing data. The root user in MySQL and MariaDB has extensive privileges and control over the databases, making it a prime target for potential security breaches. It is crucial to change the root password regularly to enhance the security of your system. In this article, we will explore the step-by-step process of changing the root password of MySQL or MariaDB in Linux.

How To Configure SELinux for Applications and Services

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

SELinux can make it a challenge to get newly installed or custom applications to run because it blocks them from having access to certain directories in the file system hierarchy. Instead of disabling SELinux, the better option is to configure the security system so applications and services can function as expected. This is especially important when you have an application or service that requires a nonstandard configuration.

On secure-shell security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It is 2020, and we can say for sure, that ssh-server is still one of the most popular services on Linux systems. During various meetings, I was often asked: How to secure SSH?  Even though this question seems trivial, it is not. There are a lot of things to remember to accomplish well-designed service security.

Linux Server Security: 10 Linux Hardening & Security Best Practices

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux is the most popular OS for web-facing computers, running on nearly 75% of servers according to Netcraft’s August 2019 data - making Linux servers an increasingly popular target among cyber criminals. This article offers tips and advice for securing your Linux servers against malware and other dangerous exploits.

How to assess user activity in Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

If you’re managing a Linux server, you'll want to have a selection of commands that you can use to check user activity. This article examines some helpful commands that Linux server admins can use to view user activity.