Linux FTP Server
Server Administration

Install, Configure, and Secure FTP Server in Linux

FTP or File Transfer Protocol is a commonly-used protocol for transferring files between computers; one act as a client, the other act as a server. In this post, we will talk about the FTP server in Linux systems, specifically Very Secure FTP Daemon (vsftpd). The vsftpd program is a very popular FTP server that many […]

Linux Syslog Server
Server Administration

Linux Syslog Server and Log Management

In this post, we will talk about Linux Syslog Server and how to manage your logs. If you want to secure your system, you have to know what’s going on in that system; you can do that using logs. With logs, you can diagnose problems and determine the health of your system and applications. In […]

LDAP Server
Server Administration

Install and Configure Linux LDAP Server

Two days ago, one of the website visitors was searching on the website for LDAP and found nothing, that drives me to make a post about the LDAP server, so we fill the gaps and bring the loved content to the visitors.     What is LDAP? We know that Linux keeps registered users on […]

Módulos Linux-PAM
Server Administration

Configure and Use Linux-PAM

In the previous post, we talked about the Linux iptables firewall, and some people asked about authentication. Today, we will talk about the powerful framework in Linux used for authentication, which is Linux-PAM. PAM or Pluggable Authentication Modules are the management layer that sits between Linux applications and the Linux native authentication system.     Linux-PAM […]

Linux iptables firewall
Server Administration

Linux iptables Firewall Simplified Examples

In the previous post, we talked about how to Secure Linux Server Using Hardening Best Practices. Some people asked me about the firewall section, which was a brief introduction to the iptables firewall. Today we will discuss in detail the Linux iptables firewall and how to secure your server traffic using that awesome firewall.   […]

secure Linux Server using Hardening Best Practices
Server Administration

Secure Linux Server Using Hardening Best Practices

In the previous post, we talked about some Linux security tricks, and as I said, we can’t cover everything about Linux hardening in one post, but we are exploring some tricks to secure Linux server instead of searching for ready Linux hardening scripts to do the job without understanding what’s going on. However, the checklist […]

Linux security tricks
Server Administration

Useful Linux Security Tricks to Harden Your System

In the previous post, we talked about Linux network commands, and we saw some useful examples used to troubleshoot your network, today we will talk about some Linux security commands that you will need to harden your system. Researchers and hackers discover new vulnerabilities every hour. They build exploits on top of these vulnerabilities. Maybe […]