security


Security

Contents

Package manager security on CentOS, Fedora, and Red Hat
Using Pam to manage accounts
Managing password policies
GRUB boot loader security
This guide provides an introduction to security-related topics about Linux...
0 Comments
Filed in: Cloud Servers
Red Hat Enterprise Linux uses a centralized authentication tool called Pluggable Authentication Modules (PAM). PAM is an option available to you to set up another layer of security to your server through user authentication....
0 Comments
Filed in: Cloud Hosting, Filed in: Cloud Servers
This article outlines security considerations and options when applying system updates on CentOS, Fedora, and Red Hat Enterprise Linux using yum.

System update considerations
Vulnerabilities and security fixes in the Red Hat...
0 Comments
Filed in: Cloud Servers
The first step after creating a Linux cloud server should be to set the security on it. This crucial step must be performed on every server to prevent hackers from obtaining unwanted access. The result is a more secure...
0 Comments
Filed in: Cloud Servers
DISCLAIMER FOR MANAGED OPERATIONS CUSTOMERS

To ensure that we have access to your server when needed, we request that you do not change these configurations. When connecting to your server, Rackspace support will log in as the...
0 Comments
Filed in: Cloud Servers
INTRODUCTION
The conversation of “Why Cloud?” has long since passed for many businesses and the question has transitioned into “How Cloud?” and “Is it safe?” The value the cloud brings to a business is measured in many different...
0 Comments
Filed in: Cloud Hosting
What do you manage?We manage security for all servers including PHP, .NET, and the operating systems What do I manage? You are responsible for securing your website code. What security do you specifically provide?Firewalls at the...
0 Comments
Filed in: Cloud Sites

Uncategorized

Connecting to a Linux Cloud Server

Going from Windows to Linux Using PuTTY
Going from Mac to Linux using Terminal
Rescue Mode on Linux Cloud Servers
Linux Security

Checking a server’s SSH host fingerprint with the web...
0 Comments
Filed in: Cloud Servers
What do you manage?We manage security for all servers including PHP, .NET, and the operating systems What do I manage? You are responsible for securing your website code. What security do you specifically provide?Firewalls at the...
0 Comments
Filed in: Cloud Sites
Cloud computing in the public cloud has raised some security questions for businesses that have regulatory compliance requirements. Barriers to adopting public cloud for security-sensitive applications have been created because...
0 Comments
Filed in: Cloud Hosting
To the uninitiated, hashing and encryption may seem like similar processes; in reality, they have some important differences. Let's begin by explaining them.Encryption is the process of transforming information (the plaintext)...
0 Comments
Filed in: Cloud Servers
Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

Security Tools

Prerequisites: Configuring Interface Based Firewall on the Vyatta Network Appliance

This article demonstrates how to block an IP in the vRouter's configuration.

Add an IP address to a DENY group

Log in to the vRouter and add...
0 Comments
Filed in: Cloud Servers
Red Hat Enterprise Linux uses a centralized authentication tool called Pluggable Authentication Modules (PAM). PAM is an option available to you to set up another layer of security to your server through user authentication....
0 Comments
Filed in: Cloud Hosting, Filed in: Cloud Servers
This article outlines security considerations and options when applying system updates on CentOS, Fedora, and Red Hat Enterprise Linux using yum.

System update considerations
Vulnerabilities and security fixes in the Red Hat...
0 Comments
Filed in: Cloud Servers
Two-factor authentication uses a paired device (like a mobile phone) to provide an extra layer of security when accessing your account, and is a significant security improvement over using a password alone. In this article we...
0 Comments
Filed in: Dedicated
INTRODUCTION
The conversation of “Why Cloud?” has long since passed for many businesses and the question has transitioned into “How Cloud?” and “Is it safe?” The value the cloud brings to a business is measured in many different...
0 Comments
Filed in: Cloud Hosting
IntroductionIn this article you will learn how to install and configure fail2ban, a security tool that defends against brute force attacks.Before any attackers can compromise a system they have to find a way in. They might take a...
3 Comments
Filed in: Cloud Servers
Up-to-date and secure installations, firewalls, limited ssh access and strong passwords are all basic and essential aspects of security.  However, continued active monitoring of server content for malware is also necessary.

One...
0 Comments
Filed in: Cloud Servers
Continuing with the scanning for rootkits articles, we now concentrate on installing and configuring rkhunter.

Rkhunter works in the same manner as chkrootkit (see this article) but rkhunter also scans for other types of...
1 Comments
Filed in: Cloud Servers
Sometimes, servers can become compromised through no direct fault of the administrator. There exist what are known as zero-day exploits -- malicious code affecting a particular product or service which is circulated before the...
0 Comments
Filed in: Cloud Servers

Windows Firewall

Creating an Inbound Port Allow Rule 1. Launch Windows Firewall with Advanced Security by clicking on Start > Administrative Tools > Windows Firewall with Advanced Security.2. Select Inbound Rules in the left pane and click...
0 Comments
Filed in: Cloud Servers
Creating an Inbound Predefined Allow Rule 1. Launch Windows Firewall with Advanced Security by clicking on Start > Administrative Tools > Windows Firewall with Advanced Security.2. Select Inbound Rules in the left pane and...
0 Comments
Filed in: Cloud Servers

Linux IPTables

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

SSH

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

- Getting Started -

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

CentOS/Fedora/Red Hat Enterprise Linux

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

Ubuntu/Debian Linux

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers