Reading Time: 3 minutes
What is Git-Secret?
Git-secret is a bash tool that is used to store your private files and information inside of a git repo on your server. The git-secret tool allows us to encrypt sensitive files that are stored inside a secure, encrypted repository. In this article, we will be examining the process of installing and working with git-secret on an 18.04 Ubuntu Server.
Continue reading “How to Install and Use Git-Secret”
Reading Time: 20 minutes
What is Lynis?
Lynis is a well known, seasoned security tool for Linux based systems (including macOS and/or other Unix-based operating systems. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open-source software with the GPL license and available since 2007.
Continue reading “Lynis: A Security Auditing Tool For Linux”
Reading Time: 10 minutes
What is GPG?
GnuPG (or Gnu Privacy Guard) is an adaptation of an earlier encryption standard known as PGP (or Pretty Good Privacy). GPG uses the method of “public” and “private” keys for the encryption and signing of messages or data.
In this article, we’re going to be discussing the following topics:
Continue reading “How Do I Use GPG?”
- Why is GPG needed?
- How Does Public Key Encryption Work?
- How do I Setup GPG Keys?
- How do I Find Other Users’ Public Keys?
- How do I Make My Public Key Available To Others?
- How do I Encrypt and Decrypt Messages with GPG?
Reading Time: 3 minutes
What Is Fail2Ban?
Fail2ban is an open-source software that actively scans the servers log files in real-time for any brute force login attempts, and if found, summarily blocks the attack using the servers firewall software (firewalld or iptables). Fail2Ban runs as a background process and continuously scans the log files for unusual login patterns and security breach attempts.
Continue reading “Install Fail2Ban On CentOS 7”
Reading Time: 16 minutes
In this article, we will denote the security best practices for 2020 and beyond. Because security is such a challenging subject for many, it often goes unheeded, and as such, many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.
Continue reading “Top 15 Server Security Practices for 2020”
Reading Time: 5 minutes
Why should I change my admin URL?
Most Content Management Systems (CMS’s) have a unique identifying login URL. For example, WordPress uses
for your admin login page. Because of this, hackers assume that is your login and can try to use this info, as well as the default username of admin. If you do not modify either of these, your potential risk for being hacked goes up exponentially. It is important that you select an administrative username that is unique to you or your business and create a secure password.
Continue reading “Securing Your CMS Admin Login”
Reading Time: 6 minutesThis tutorial describes the process of setting up SSH Keys for use when logging in to a remote server via SSH.
File Synchronization 101: The Basics
Continue reading “How to Set Up SSH Keys”
Reading Time: < 1 minute
In this article, we discuss how to start and enable firewalld. It is highly
recommended that you have a firewall
protecting your server.
- These instructions are intended specifically for enabling and starting Firewalld CentOS 7.
- I’ll be working from a Liquid Web Self Managed CentOS 7 server, and I’ll be logged in as root.
Continue reading “How to Start and Enable Firewalld on CentOS 7”
Reading Time: 4 minutesWhen you’re considering which Operating System to use for web hosting, there are many options available to you. We’re going to discuss 5 reasons you should choose CentOS 7 and the strengths of the platform. CentOS has been the preferred Linux distribution in the hosting industry for many years, and it was only recently that this distro was overtaken by Ubuntu Server as the primary OS used for web hosting.
Continue reading “Top 5 Reasons To Use CentOS 7”
Reading Time: 2 minutesIn order for one of our clients to start using the ‘one time secret’ tool within manage, you will need to login to the Manage portal to get started. Typically, passwords are not meant to be shared. Unfortunately, sometimes you will need to share a password or other sensitive data with the support admin you are working with. Regrettably, trying to pass along individuals character over the phone can be frustrating, annoying, and overly time consuming, and more so when a password is long and if the phone has a bad connection.
Continue reading “Using The One-Time Secret Tool In Manage”