Configuring Root Access | HackerSploit Linux Security
In this follow up video to securing your SSH, HackerSploit shows how to add users to the sudo group. Taking security a step further, we’ll disable the root user so that it can’t be accessed remotely or locally.
0:00 – Intro
1:17 – Working With The Sudoers File
5:40 – Adding New Users To Groups
7:50 – Disabling root by Locking
11:05 – Disabling root with chsh
15:44 – Outro
New to Linode? Get started here with a $100 credit!
Read the doc for more information on securing your server.
Learn more about Linode Cloud Manager Security.
Subscribe to get notified of new episodes as they come out.
#Linode #Security #HackerSploit #Linux
Product: Linode, Security, Root Access; HackerSploit;
Brute Force Protection | Linux Security with HackerSploit
In part 2 of the Linux Security series, HackerSploit shows how to set up fail2ban on a server to prevent brute force SSH attacks.
You might also like…
Splunk Security Event Monitoring – Blue Team Series with HackersploitSplunk is the first data-to-everything platform powered by artificial intelligence, advanced data search, and optimized data streaming.
Intrusion Detection with Suricata – Blue Team Series with HackersploitIn this video, we'll cover the process of installing, configuring, and using Suricata for intrusion detection.
Disk Analysis with Autopsy | HackerSploit Blue Team TrainingIn this video, HackerSploit will cover using the tool Autopsy® for disk analysis which can reveal what happened to a computer.
How to use Multiple SSH Keys | Managing Different SSH Keys on your SystemIn this video, we’ll cover how to generate and use SSH Key Pairs for easily and securely logging into your server.