How to Install and Use Git-Secret

Reading Time: 3 minutes

What is Git-Secret?

Git-secret is a bash tool that is used to store your private files and information inside of a git repo on your server. The git-secret tool allows us to encrypt sensitive files that are stored inside a secure, encrypted repository. In this article, we will be examining the process of installing and working with git-secret on an 18.04 Ubuntu Server.

Continue reading “How to Install and Use Git-Secret”

Lynis: A Security Auditing Tool For Linux

Reading Time: 20 minutes

What is Lynis?

Lynis is a well known, seasoned security tool for Linux based systems (including macOS and/or other Unix-based operating systems. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open-source software with the GPL license and available since 2007.

Continue reading “Lynis: A Security Auditing Tool For Linux”

How Do I Use GPG?

Reading Time: 10 minutes

What is GPG?

GnuPG (or Gnu Privacy Guard) is an adaptation of an earlier encryption standard known as PGP (or Pretty Good Privacy). GPG uses the method of “public” and “private” keys for the encryption and signing of messages or data.

In this article, we’re going to be discussing the following topics: 

  • Why is GPG needed?
  • How Does Public Key Encryption Work?
  • How do I Setup GPG Keys?
  • How do I Find Other Users’ Public Keys?
  • How do I Make My Public Key Available To Others?
  • How do I Encrypt and Decrypt Messages with GPG?
Continue reading “How Do I Use GPG?”

Install Fail2Ban On CentOS 7

Reading Time: 3 minutes

What Is Fail2Ban?

Fail2ban is an open-source software that actively scans the servers log files in real-time for any brute force login attempts, and if found, summarily blocks the attack using the servers firewall software (firewalld or iptables). Fail2Ban runs as a background process and continuously scans the log files for unusual login patterns and security breach attempts.

Continue reading “Install Fail2Ban On CentOS 7”

Top 15 Server Security Practices for 2020

Reading Time: 16 minutes

In this article, we will denote the security best practices for 2020 and beyond. Because security is such a challenging subject for many, it often goes unheeded, and as such, many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.

Continue reading “Top 15 Server Security Practices for 2020”

How to Start and Enable Firewalld on CentOS 7

Reading Time: < 1 minute

In this article, we discuss how to start and enable firewalld. It is highly recommended that you have a firewall protecting your server.
Pre-Flight Check
  • These instructions are intended specifically for enabling and starting Firewalld CentOS 7.
  • I’ll be working from a Liquid Web Self Managed CentOS 7 server, and I’ll be logged in as root.

Continue reading “How to Start and Enable Firewalld on CentOS 7”

Top 5 Reasons To Use CentOS 7

Reading Time: 4 minutesWhen you’re considering which Operating System to use for web hosting, there are many options available to you. We’re going to discuss 5 reasons you should choose CentOS 7 and the strengths of the platform. CentOS has been the preferred Linux distribution in the hosting industry for many years, and it was only recently that this distro was overtaken by Ubuntu Server as the primary OS used for web hosting.

Continue reading “Top 5 Reasons To Use CentOS 7”

Using The One-Time Secret Tool In Manage

Reading Time: 2 minutesIn order for one of our clients to start using the ‘one time secret’ tool within manage, you will need to login to the Manage portal to get started. Typically, passwords are not meant to be shared. Unfortunately, sometimes you will need to share a password or other sensitive data with the support admin you are working with. Regrettably, trying to pass along individuals character over the phone can be frustrating, annoying, and overly time consuming, and more so when a password is long and if the phone has a bad connection.

Continue reading “Using The One-Time Secret Tool In Manage”