HungryMonkey

HungryMonkey's Blog

  • Feb 24 2022

    Securing a linux server.

    Not long after finishing setting up a new server you see from the logs that it is constantly being attacked. If you are not convinced of, or wish to see, how frequent these attacks are take a look at the auth.log file that is usually located in /var/log. There are several very simple steps that can make it almost impossible for the server to be compromised. Once you complete the following steps you will have:

All rights reserved.