Skip to content
ITFROMZERO - Share tobe shared!
  • Home
  • AI
  • Database
  • Docker
  • Git
  • Linux
  • Network
  • Virtualization
  • Home
  • AI
  • Database
  • Docker
  • Git
  • Linux
  • Network
  • Virtualization
  • Facebook

server security

Security tutorial - IT technology blog
Posted inSecurity

Installing and Configuring CrowdSec on Ubuntu: A New Generation Community Server Protection Solution

Posted by By admin March 19, 2026
Protecting servers from cyberattacks is a top priority. CrowdSec offers a novel, community-based approach to detect and prevent threats. This article guides you through installing and configuring CrowdSec on Ubuntu.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Linux Server Security Audit with Lynis: From Installation to a Hardening Index of 80+

Posted by By admin March 8, 2026
Lynis runs directly inside your server and checks over 200 configuration points that remote scanners simply can't see. This guide walks through installation, interpreting results, and fixing real-world warnings — from SSH to kernel hardening — to push your hardening index from 55 up to 80+.
Read More
Ubuntu tutorial - IT technology blog
Posted inUbuntu

Configuring Fail2ban to Protect Your Ubuntu Server from Brute-Force Attacks

Posted by By admin March 6, 2026
Fail2ban automatically blocks brute-force IPs targeting SSH, Nginx, and WordPress by reading logs and adding iptables rules. This guide covers installation, practical jail configuration, and common troubleshooting scenarios on Ubuntu 22.04.
Read More
CentOS tutorial - IT technology blog
Posted inCentos

Managing Services with firewalld on CentOS/RHEL: A Practical Guide

Posted by By admin March 6, 2026
firewalld is the default firewall management tool on CentOS/RHEL, offering flexible zone-based policies that are easier to manage than plain iptables. This article covers practical usage from quick start to rich rules, port forwarding, and tips drawn from real production server management.
Read More
CentOS tutorial - IT technology blog
Posted inCentos

Configuring SELinux on Rocky Linux: Don’t Disable It Before You Understand What It Does

Posted by By admin March 6, 2026
From firsthand experience migrating 5 servers off CentOS 8 EOL to Rocky Linux, this guide covers how to configure SELinux properly — from Permissive for debugging to Enforcing on production — with practical audit2allow, sealert, and semanage examples.
Read More
Linux tutorial - IT technology blog
Posted inLinux

Securing Your SSH Server: Essential Steps to Prevent Getting Hacked

Posted by By admin March 4, 2026
A hands-on guide to SSH server security: comparing 4 common approaches, analyzing their trade-offs, and concrete configuration steps from SSH keys to Fail2ban. Prioritize in the right order to protect your server as effectively as possible.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Linux Disk Encryption with LUKS: Protecting Data When Your Server Is Lost or Stolen

Posted by By admin March 1, 2026
LUKS enables AES-256 encryption on Linux partitions, ensuring data remains unreadable even if the drive is physically removed from the server. This guide walks through the full workflow — from formatting and mounting, to auto-mount on boot, LUKS header backup, and passphrase management.
Read More
Ubuntu tutorial - IT technology blog
Posted inUbuntu

Things to Do After Installing Ubuntu Server 22.04 to Avoid 2 AM Disasters

Posted by By admin February 28, 2026
A practical checklist of what to do right after installing Ubuntu Server 22.04: secure SSH with key-based authentication, enable UFW firewall, create a swap file, configure timezone, and set up Fail2ban — all distilled from real-world production incident experience.
Read More
Copyright 2026 — ITFROMZERO. All rights reserved.
Privacy Policy | Terms of Service | Contact: [email protected] DMCA.com Protection Status
Scroll to Top