PortSpoof - An interesting anti-snooping tool for Linux

PortSpoof – An interesting anti-snooping tool for Linux

Fool those who try to portscan your system! The Portspoof program is designed to enhance OS security through emulation of legitimate service signatures on otherwise closed ports. It is meant to be a lightweight, fast, portable and secure addition to the any firewall system or security infrastructure. The general goal of the program is to […]

How to Really Secure Your Linux VPS SSH Service

Article By Stanton Levens Let face it, the Secure Shell (SSH) daemon running on your VPS is the most sensitive service open to attack on your system. Any hacker worth their salt will first try to gain access to your VPS via SSH and 99.9% of all VPS connected to the internet run this service by […]

How to protect Apache with Fail2ban

Around 2 years ago I wrote an article about fail2ban. Fail2ban is an intrusion prevention framework written in the Python programming language. It is able to run on POSIX systems that have an interface to a packet-control system or firewall installed locally (such as, iptables or TCP Wrapper). Fail2ban’s main function is to block selected […]

How to scan Linux for vulnerabilities with lynis

How to scan Linux for vulnerabilities with lynis

Article by Dan Nanni first published on xmodulo.com As a system administrator, Linux security technician or system auditor, your responsibility can involve any combination of these: software patch management, malware scanning, file integrity checks, security audit, configuration error checking, etc. If there is an automatic vulnerability scanning tool, it can save you a lot of […]

The Importance of Securing a Linux Web Server

The Importance of Securing a Linux Web Server

Today I present a really interesting article by  Scott Miller first published on Infosecinstitute.com. With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable […]