Archive for the ‘Security’ Category

Rkhunter rootkit scanning tool installation

Rkhunter rootkit scanning tool installation How to install rkhunter rootkit scanning tool ?   Rkhunter is a rootkit hunter scanning tool, it’s open source  scanner for unix flavors like centos, redhat, fedora and debian. RKhunter scanner detects the back doors, malware, hidden exploits and other vulnerabilities like suspicious keywords in the kernel. With our guide […]

How to secure FTP & TELNET?

How to secure FTP & telnet?   With our guide, we are going to show you the best practice used to secure the FTP and Telnet. The checklist assists you to protect the server from attackers  1. FTP FTP (file transfer protocol) , This uses the password in clear text format, this method is unsafe […]

How to protect SSH server

How to secure ssh server from attacks ? SSH (Secure Shell):  Secure the ssh server from brute force attack and other vulnerabilities. The checklist for securing the ssh server can mitigate the risk of getting hacked. The periodical upgrade of ssh package from the repository is always recommended. With our guide we are going to […]

Apache hardening checklist

How to secure Apache web server? Hardening to the web server is a very challenging in day to day life. Some useful techniques to minimize the risk of being a victim of hacked. The following checklist to secure Apache web server 1. Upgrade Apache web server 2. Prevent Apache web server version display 3. Prevent Directory […]

The file download restriction using squid proxy ACL.

How to restrict file download using squid ? Squid, file download restriction : Squid acl configuration to restrict file download like .exe, .mp3,& .avi. With our guide we are going to show how easy to restrict file download using squid acl. We assume that you have installed squid already, otherwise you can install squid package. […]

How to block URLs using squid proxy

How block websites  using squid proxy? Squid Proxy, URL blocking With our guide we are going to show you how to block website URL’s using squid proxy . We assume that you have installed squid already, if not as you can install squid package. #yum install squid With our guide we are going to cover: […]

Squid as transparent proxy

What is Squid? Squid is internet (web) cache proxy server to optimize the internet usage by storing frequently accessed data to its cache, which provides faster access to the same contents request of the clients. Also keeps track of user actions in squid.log file which locates in /var/log/squid/access.log Applying Access Control List to prevent unwanted […]

IPTABLES NAT by using a simple shell script

IPTABLES NAT by using a simple shell script. The simple shell script to write the NAT rule to allow internet access to the local network. With this guide we are going to show you how to write shell script for iptables NAT. In the guide we are using below configuration .

IPTABLES (NAT & PAT)

What is IPTABLES NAT and PAT ? Easy and simple steps to learn about iptables NAT concept and real time NAT rules to build Linux based router / firewall. Generally, the request received on Public IP, forwarding to a private IP address behind the firewall is called NAT (Network Address Translation). Ex: Outside Request -> […]

What is IPTABLES?

What is IPTABLES? It’s a firewall built into with your Linux box, IPTABLES is very powerful firewall to control network traffic. The filters can be applied on the source and destination IP address / protocol like TCP, UDP and ICMP. Following IPTABLES guide will assists you to understand the iptables and it’s chains including NAT […]

Copyright ©Solutions@Experts.com
Copyright © NewWpThemes Techmark Solutions - www.techmarksolutions.co.uk