Tag: Permissions

Reading Time: 6 minutes

What is Umask in Linux?

Umask (short for user file-creation mode mask) is used by UNIX-based systems to set default permissions for newly created files and directories. It does this by masking or subtracting these permissions. For example, with the usual Umask being set to 022 on most systems all the new files we create will subtract the Umask value from full permissions (for files that would be 666 - 022 = 644). Umask can be expressed in octal or symbolic values. 

Continue reading →
Reading Time: 11 minutes

How Can You Ensure Security on a Server?

It is important to secure your server to prevent data loss or security compromises. Because security is such a challenging subject for many, it often goes unheeded. Many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.

Continue reading →
Reading Time: 3 minutes
How to Remove Permissions for a MySQL user on Linux via Command Line

A fundamental part of managing users in MySQL is removing permissions no longer required for a user. Administrators should ensure that terminated users or those whose roles have changed within the company have had permissions removed from their user profiles. This action secures the system against unlawful access to information.

Continue reading →
Reading Time: 3 minutes

After an administrator creates a MySQL user via the command line on Linux, the next step is to grant permissions to that user. The goal is to ensure that the user is able to log in and access the MySQL server to perform tasks. This article shows you how to grant permissions to a MySQL user on Linux via the command line.

Continue reading →
Reading Time: 5 minutes

When it comes to the preferred operating system for the backend or server-side of web hosting, CentOS (Community Enterprise Operating System) has long occupied the space. Released in 2004, CentOS is derived from Red Hat Enterprise Linux (RHEL) and, through the years, has strived to provide a free enterprise-class platform that has maintained 1:1 compatibility with RHEL. 

Continue reading →
Reading Time: 5 minutes

Introduction

Intrusion detection systems (IDSs) are an ever-present requirement in a cybersecurity infrastructure to ensure a server or internal network is protected. An intrusion detection system is either a hardware device or software program that actively monitors a server or group of servers for network policy violations or malicious activity. Any suspicious activity, attempted attack, or policy violation is reported and logged to a centrally located security information and event management (SIEM) system database, or directly to a security administrator for further review. This article explores Liquid Web’s intrusion detection product called Alert Logic Security and Compliance Suite.

Continue reading →
Reading Time: 5 minutes

Introduction

This article will review some of the more technical aspects of F5 Distributed Cloud AIP. F5 Distributed Cloud AIP is a platform-independent intrusion detection system (IDS) designed to provide users with a unique view into various integrated server security functions. It monitors both Linux and Windows servers as well as Kubernetes or other container-based server infrastructures to observe behaviors and detect malicious, uncommon, and risky activity.

Continue reading →
Reading Time: 4 minutes
SIEM 2

Security Information and Event Management (or SIEM) is a subset of the computer security field, where applications and services join forces with security event management and security information management. When united, these disciplines provide significantly improved real-time statistical data and threat analysis of alerts generated by the related applications. The 2021 Internet Security Threat Report from Sophos denotes that are not only the number of attacks on the rise but also the diverse nature of methodologies and vectors of incursions used. This necessitates the fact that adding a SIEM is especially warranted at this time.

Continue reading →
Reading Time: 5 minutes

What is a Secret? 

A Kubernetes Secret is an object that enables us to store and manage sensitive information. A Secret can contain data like SSH keys, OAuth data, or other user authentication information like passwords. It is typically stored within a cluster in a manner native to Kubernetes. Using a Secret object provides more granular control over how highly sensitive data is used. It also lowers the risk of data exposure to unauthorized parties. 

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434