BIP KB Tag: Security

How To Configure SSH Key-Based Authentication On A FreeBSD Server

Introduction to SSH Key Based Authentication This tutorial is part 3 of 7 in the series: Getting Started with FreeBSD. In general SSH, or secure shell, is a network protocol that provides a secure, encrypted way to communicate with and administer your servers. As SSH is the most common way of working with a FreeBSD server, you will want to familiarize yourself with the different ways that you can authenticate and log in to your server. W...
By jack, January 23, 2015


An Introduction To Basic FreeBSD Maintenance

This tutorial is part 5 of 7 in the series: Getting Started with FreeBSDIntroduction When administering FreeBSD 10.1 servers, it is important to understand the basic maintenance procedures that will help you keep your systems in good shape. In this guide, we will be covering the basic processes needed to keep your server up-to-date and functioning properly. We will be covering how to update the base operating system that the Fre...
By fredric, January 23, 2015


How To Harden Your TCP/IP Stack Against SYN Floods

SYN Floods Denial of service (DoS) attacks launch via SYN floods can be very problematic for servers that are not properly configured to handle them. Proper firewall filtering policies are certainly usually the first line of defense, however, the Linux kernel can also be hardened against these types of attacks. This type of hardening is useful for SYN floods that attempt to overload a particular service with requests (such a...
By jessica, January 24, 2015


How To Harden Your WordPress Security

Listed below are many changes that can be implemented on any host and will greatly increase the security of your WordPress installations. If your WordPress is already hacked, please send an e-mail to support@BIPmedia.com and we can assist you. Limit Read Access with SuPHP You must have the SuPHP module in apache installed to use this SuPHP allows you to run your processes as your User ID, which restricts access t...
By fredric, January 24, 2015


How To Set Up SSH Keys With Linux Command Line

Introduction To Setting Up SSH Keys In this tutorial we are going to setup encrypted SSH Keys for authentication. There are many benefits to this type of setup which include: No longer needing to enter a password (unless you encrypt your keys with password protection *recommended*) Once public/private key pair authentication is configured, you can disable password authentication completely and only allow access via the key. Sto...
By jack, March 17, 2015


How To Add Your SSH Public Key To CentOS

Introduction to SSH Public Key In this tutorial we are going to add our public key for authentication through SSH. There are many benefits to this type of setup which include: No longer needing to enter a password (unless you encrypt your keys with password protection *recommended*) Once public/private key pair authentication is configured, you can disable password authentication completely and only allow access via the key. St...
By samantha, March 17, 2015


How To Configure SSH Key Access Authentication Only On Your CentOS SSH Server

Introduction to SSH Key pairs This how to assumes you have SSH Key installed on your server. If you do not you can follow either of the how to’s below: How to Set Up SSH Keys with Linux Commandline In this tutorial we will be: Changing The SSH Servers Po1rt Allowing connections only va PubkeyAuthentication. We will begin by editing your SSH servers configuration file: /etc/ssh/sshd_config vi /etc/ss...
By samantha, March 17, 2015


How To Install Ruby On Rails On Ubuntu 12.04 LTS

Install Ruby Introduction This tutorial will show you how to install Ruby Version Manager (RVM) which can be used to install Ruby, and then RubyGems, which can be used to install the Ruby on Rails framework. Finally, we’ll create an empty application and see it run: SSH to your Pod as root, and then run the following: root@rubyserver:~# \curl -L https://get.rvm.io | bash -s stable root@rubyserver:~# source /etc/profile.d...
By chris, March 18, 2015


How To Lock Down Your Linux Server For Additional Security

Introduction to Linux Security Linux Security. Most people rarely secure a freshly installed server right off the bat, but in the world we live in this is an absolute must. So if it’s so important to, why do so many people wait and do it last, if at all? I’m as guilty as the next person. It often comes down to just wanting to to start developing and doing the fun stuff. Hopefully this tutorial will show that it is far better se...
By chris, March 21, 2015


How To Install ClamAV And Configure Daily Scanning On CentOS

Install ClamAV Introduction This tutorial will guide you through the install ClamAV on CentOS process. Once installed, we will also configure a daily scan on our CentOS server. ClamAV is an open source (GPL) antivirus engine designed for detecting Trojans, viruses, malware and other malicious threats on Linux. In this article, we will only be configuring ClamAV to run scheduled/on-demand scans; not resident scans. ...
By jill, May 9, 2015


How to Secure Your WordPress Websites

WordPress is by far the most popular CMS Content Management System used on the internet. 1 out of 6 websites use WordPress. In this tutorial you will learn how to secure your WordPress website but first lets go over some of the myths circling the interest about WordPress. Top 10 WordPress Security Myths Source: http://www.problogger.net/archives/2012/08/29/top-10-wordpress-security-myths/ Here are the myths...
By sabinshrestha, September 24, 2015


How To Setup CentOS WebPanel On A VPS

WebPanel Abstract This article will show you how to setup CentOS WebPanel on your Virtual Private Server -VPS. There are multiple alternatives available but I will focus on an easy approach and let you inspect the other options on your own. This article does not show you what to do after you deployed the WebPanel. It will only point you to the next steps. Intro On the internet you will be able to find out th...
By george02, December 19, 2015


How to Install the latest OpenSSL 1.0.2h Version on CentOS 6/7

latest OpenSSL is an open source project that provides a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library. The latest OpenSSL 1.0.2h was released on 03-rd of May 2016. If you are worried about your server security you should update the OpenSSl package to the latest version. Unfortunately all ...
By ivan, May 4, 2016