Over the years at Dedicated Server School, we have provided you with numerous security tips, often on an individual and specific level. This five-part series will instead give a general overview of Linux server security to serve as a quick reference tool whenever you might need it. Rather than searching for the security topic you […]
By default the Linux SSH server (usually OpenSSH) listens for connections on port 22. Everyone knows this, including hackers. If you have other security measures in place, it may not matter if would-be attackers know your SSH port. Nevertheless, having SSH on another port other than the default may add […]
BFD (Brute Force Detection) is a free software tool to help you prevent brute force attacks on your dedicated server. A brute force attack is most commonly used to gain root access to the server by using password-guessing technology. BFD will detect multiple login attempts and prevent the attackers from escalating into a brute force […]
When you want to ensure absolute security of something, the first thing that you do is that you test the endurance of that thing. This helps you figure out how secure the system currently is and what you need to do to enhance its security. Today, we are gonna talk about something that evaluates the […]
Server security is very important and in recent months has become even more important as hackers have increased their level of education and are becoming a bigger threat to servers of all kinds. One way to combat hackers is to offer them a honeypot.
A honeypot is a server that is set up to look like […]
IIS stands for Internet Information Services. IIS Lockdown is a software package for additional security on a Windows server. Requirements for using the package are Windows 2000, Windows NT, or Windows XP. The software works by turning off unnecessary features, making your system more secure against attackers from outside.
Microsoft earlier this year, January, introduced IIS […]
The security of the dedicated server is one that concerns all website owners who are looking beyond limitations of bandwidth and disk space. However, in lieu of servers dedicated to their needs, they have to take measures to ensure their security. Now, the good news is that a dedicated server is more secure than a […]
Ensuring the security of servers needs a lot of time. What a website needs is a security scheme that helps save both time and resources. Liquid Web has come up with a service that does exactly this while making sure the security is of the highest standard. The service is called ServerSecure.
ServerSecure Web […]
Systems that act as servers on a network become extremely vulnerable. The security of the servers becomes as important as the security of the network. Organizations owning web servers need to keep pace with all the threats that can possibly affect a server. Also, the servers need to be updated with security patches regularly.
One of […]
SSH stands for Secure Shell. OpenSSH is the open source version of SSH. But what is it used for?
Secure Shell is a protocol for securing your network connections to prevent hacking, eavesdropping, and other server attacks. It is used to encrypt data that is passed from one computer to another. It is very important when […]
Having your own server gives you tremendous power and flexibility. It also calls for you to handle all the grueling security tasks. Today, security risks range from hackers and malicious software to unexpected instances such as hard drive failures and data corruption. By using this checklist, you can make yourself familiar with key mechanisms that […]