Increase Server Security by Restricting Cron Jobs

Cron is one of the outstanding features in Linux and Unix-like operating systems that many system administrators love. It provides a full range of automation capabilities by allowing admins to schedule programs, scripts or other processes for any time of any day. Allowing other users to do this, however, can pose a security risk. Therefore, […]

How to Block IP Addresses from Your Server

As we have stressed in earlier posts at Dedicated Server School, regularly checking Linux server log files is a crucial part of server management. Knowing what is going on in your logs is a great way to detect attempts to thwart your security and come up with early prevention methods. The question you […]

SSH Security Tips: Part 1

Any service or software that allows remote users to connect to your server is a potential security risk. Despite its name SSH (Secure Shell) is no exception. Nevertheless, when configured correctly, SSH is the safest ways to connect to your server and one that you will unquestionably need if your server is remote […]