On a basic Linux system, passwords are stored in the /etc/passwd file. This is usually OK for a single-user system, but on a multi-user system, such as a server, the passwords should be hidden and encrypted. Shadow passwords allow you to do just that . On Red Hat Enterprise Linux and CentOS, the shadow-utils package […]
On a Linux server, root is the administrator of everything, the king of the hill. Root can do whatever he wants, whenever he wants. With full access and full privileges, root is the most powerful user on the server. While it may be convenient to login to your server as root and get to work, […]
A Brute force attack is a particularly sinister way for those with malicious intent to gain access to your server. The premise of this type of attack is to ultimately have root access in order to accomplish whatever goal the attacker may have. To do this, the attacker typically uses software that attempts to guess […]
BFD (Brute Force Detection) is a free software tool to help you prevent brute force attacks on your dedicated server. A brute force attack is most commonly used to gain root access to the server by using password-guessing technology. BFD will detect multiple login attempts and prevent the attackers from escalating into a brute force […]
Lurking around every corner is a potential threat to your server. If your server is to survive threats to its security, you have to prepare it and harden its protective safeguards. The following are just a few of the threats that you should be aware of and be able to prevent or fight.
1. Botnet – […]
Server security can be complex and time consuming. Therefore, even if you are not responsible for your server’s security, it is a good idea to know security terminology. A brute force attack occurs when a hacker attempts to gain access to a dedicated server or VPS using a standard login (SSH, mail server, […]