In the previous post, we explained how to check your Linux server for the highly publicized Shellshock vulnerability in Bash. Fortunately, most, if not all, major Linux distributions have already uploaded the fix into their package management repositories. All you have to do is install the latest version. Unfortunately, there is some evidence to suggest […]
The hosting world has been hit with yet another highly publicized server vulnerability. This one affects the ubiquitous shell program GNU Bash and is referred to as Shellshock. Most Linux, BSD and Mac OS X operating systems and variants use Bash or derivatives of it. All Bash versions between versions 1.14 and 4.3 are […]
You have likely heard the expression “security through obscurity”, and you may have even considered adopting it as a policy at one point or another. It is convenient to believe that an “obscure” server is secure because no one knows about it, but this is not a very realistic theory.
As a rule, any device attached […]
Unfortunately, the number of potential server security threats is too great for just one post. The following are five more you should definitely be aware of and prepare your server to defend against. Some of them are easy to fix, while others require thought, planning, and special software.
1. Malware – This can be just about […]
Allowing users to run scripts on your dedicated server can be a frightening experience. Not only must you trust in their sincerity, but also trust that they will not be negligent in securing any scripts they run. Furthermore, most scripts these days are complex content management systems that may have thousands of functions. […]