Checking a server’s SSH host fingerprint with the web console

Before you dismiss that error message about your server’s SSH host key changing, follow this simple procedure to make sure all is as it should be.

Introducing iptables part 3

This article provides an overview of how to configure the Linux kernel firewall for ipv4 using iptables and the Filter table. It is intended for beginners to intermediate linux users and provides launch at startup configurations and also useful examples.


Introducing iptables part 2

This article provides an overview of how to configure the Linux kernel firewall for ipv4 using iptables and the Filter table. It is intended for beginners to intermediate linux users and provides an insight on syntax, adding and deleting rules.


Introducing iptables part 1

This article provides an overview of how to understand the Linux kernel firewall for ipv4 using iptables and the Filter table. It is intended for beginners to intermediate linux users and provides an insight on basic configuration concepts.


Security Checks During Possible Compromise - Part 2

Continuing from the previous article on checking your slice for possible security compromises, this entry will discuss using the Slice Manager's rescue mode to take a closer look at your system.


Security Checks During Possible Compromise - Part 1

We are not living in a perfect world, and it is possible for a slice to get hacked. However, we can find the culprit and make sure it won't happen again. In this article we will learn some techniques and tools we can use to investigate our slices if we suspect they've been compromised.


Scanning for rootkits with rkhunter

Continuing with the scanning for rootkits articles, we now concentrate on installing and configuring rkhunter.

Rkhunter works in the same manner as chkrootkit (see this article) but rkhunter also scans for other types of exploits.


Scanning for rootkits with chkrootkit

Up-to-date and secure installations, firewalls, limited ssh access and strong passwords are all basic and essential aspects of security.

But what about the content of your Slice? One method of monitoring content is to scan for rootkits.


Scanning for rootkits with Rootcheck

Rootcheck is another great rootkit-checking tool for your Slice. You can never have too many.


Managing SSL Certificates #2

Verifying that SSL certificates match their date, domain and even their key file before making them live on a web-server will reduce site down-time. This article will explain how to do that.

We'll then finish up with the answer to a common problem: how to un-password protect an SSL certificate file so that your web server starts on boot without human intervention.


Capturing Packets with Tcpdump

Tcpdump is a powerful network debugging tool which can be used for intercepting and displaying packets on a network interface. Moreover, only interested packets can be displayed by using its filtering feature.


Fail2ban

In this article you will learn how to install and configure fail2ban, a security tool that can help protecting your slice from brute force attacks.


Scanning for rootkits with rkhunter (DEPRECATED)

NOTE: This article has been updated. The new version can be reached via this link.

Continuing with the scanning for rootkits articles, we now concentrate on installing and configuring rkhunter.

Rkhunter works in the same manner as chkrootkit (see this article) but rkhunter also scans for other types of exploits.


Scanning for rootkits with chkrootkit (DEPRECATED)

NOTE: This article has been updated. The new version can be reached via this link.

Up-to-date and secure installations, firewalls, limited ssh access and strong passwords are all basic and essential aspects of security.

But what about the content of your Slice? One method of monitoring content is to scan for rootkits.