security


Uncategorized

Connecting to a Linux Cloud Server
Rackspace Cloud Essentials - Going from Windows to Linux Using PuTTY
Rackspace Cloud Essentials - Going from Mac to Linux using Terminal
Rackspace Cloud Essentials - Rescue Mode on Linux Cloud...
0 Comments
Filed in: Cloud Servers
What do you manage?
We manage security for all servers including PHP, .NET, and the operating systems What do I manage? You are responsible for securing your website code. 

What security do you specifically provide?
Firewalls at...
0 Comments
Filed in: Cloud Sites
Cloud computing in the public cloud has raised some security questions for businesses that have regulatory compliance requirements. Barriers to adopting public cloud for security-sensitive applications have been created because...
0 Comments
Filed in: Cloud Hosting
To the uninitiated, hashing and encryption may seem like similar processes; in reality, they have some important differences. Let's begin by explaining them.
Encryption is the process of transforming information (the plaintext)...
0 Comments
Filed in: Cloud Servers
Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

Security

This document is a brief introduction to Security related topics, regarding Linux hardening processes, based on Red Hat Enterprise Linux 6. All of these concepts can be also applied to CentOS6. With regards to RHEL 5/CenOS 5,...
0 Comments
Filed in: Cloud Hosting, Filed in: Cloud Servers
The first step after creating a Linux cloud server should be to set the security on it. This crucial step must be performed on every server to prevent hackers from obtaining unwanted access. The result is a more secure...
0 Comments
Filed in: Cloud Servers
DISCLAIMER FOR MANAGED OPERATIONS CUSTOMERS
To ensure that we have access to your server when needed, we request that you do not change these configurations. When connecting to your server, Rackspace support will log in as the...
0 Comments
Filed in: Cloud Servers
INTRODUCTION
The conversation of “Why Cloud?” has long since passed for many businesses and the question has transitioned into “How Cloud?” and “Is it safe?” The value the cloud brings to a business is measured in many different...
0 Comments
Filed in: Cloud Hosting
What do you manage?
We manage security for all servers including PHP, .NET, and the operating systems What do I manage? You are responsible for securing your website code. 

What security do you specifically provide?
Firewalls at...
0 Comments
Filed in: Cloud Sites

Security Tools

Two-factor authentication uses a paired device (like a mobile phone) to provide an extra layer of security when accessing your account, and is a significant security improvement over using a password alone. In this article we...
0 Comments
Filed in: Dedicated
INTRODUCTION
The conversation of “Why Cloud?” has long since passed for many businesses and the question has transitioned into “How Cloud?” and “Is it safe?” The value the cloud brings to a business is measured in many different...
0 Comments
Filed in: Cloud Hosting
Introduction
In this article you will learn how to install and configure fail2ban, a security tool that defends against brute force attacks.
Before any attackers can compromise a system they have to find a way in. They might take...
3 Comments
Filed in: Cloud Servers
Sometimes, servers can become compromised through no direct fault of the administrator. There exist what are known as zero-day exploits -- malicious code affecting a particular product or service which is circulated before the...
0 Comments
Filed in: Cloud Servers
Continuing with the scanning for rootkits articles, we now concentrate on installing and configuring rkhunter.
Rkhunter works in the same manner as chkrootkit (see this article) but rkhunter also scans for other types of...
1 Comments
Filed in: Cloud Servers
Up-to-date and secure installations, firewalls, limited ssh access and strong passwords are all basic and essential aspects of security.  However, continued active monitoring of server content for malware is also necessary.
One...
0 Comments
Filed in: Cloud Servers

Windows Firewall


Creating an Inbound Predefined Allow Rule
1. Launch Windows Firewall with Advanced Security by clicking on Start > Administrative Tools > Windows Firewall with Advanced Security.

2. Select Inbound Rules in the left pane...
0 Comments
Filed in: Cloud Servers

Creating an Inbound Port Allow Rule
1. Launch Windows Firewall with Advanced Security by clicking on Start > Administrative Tools > Windows Firewall with Advanced Security.

2. Select Inbound Rules in the left pane and...
0 Comments
Filed in: Cloud Servers

Linux IPTables

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

SSH

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

- Getting Started -

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

CentOS/Fedora/Red Hat Enterprise Linux

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers

Ubuntu/Debian Linux

Although Rackspace Cloud has taken steps to make your default Cloud Server image as secure as possible, the first line of defense lies in the hands of you, our customer.  Follow these steps immediately after creating your Cloud...
25 Comments
Filed in: Cloud Servers