Skip to main content

Content Resources > Security

33 resources

How to use Multiple SSH Keys | Managing Different SSH Keys on your System

There’s a good chance you’ve been using SSH (Secure Shell) to access your Linode from your computer. In this video, we’ll cover how to generate and use SSH Key Pairs for easily and securely logging into your server.


Self Signed Certificates | Top Docs with Jay LaCroix

Self-signed TLS certificates are suitable for personal use or for applications that are used internally within an organization. In the absence of an ability to get a real certificate, using a self-signed certificate internally is typically more secure than nothing.


Red Team Security Series

HackerSploit presents a new security series focused on “Red Team” best practices. Take a closer look at red team activities and learn techniques to effectively test your security defenses by conducting internal attacks on your organizations infrastructure to identify and close vulnerabilities.

Linode Cloud Firewall | Simple Scalable Network Security

Linode Cloud Firewall makes it simple to control network traffic to and from your Linodes. In this video, you'll see how to customize firewall rule sets and secure a Linode’s traffic based on trusted IP addresses, ports, and protocols.
Suneet Shah

InfoSec Innovation and Collaboration

OpenIAM's partnership with Linode began after a mishap with another provider. In half an hour, its infrastructure was up and running on Linode.
HackerSploit: Docker Security Essentials

Hackersploit: Docker Security Essentials

Hackersploit: Docker Security Essentials is a guide to auditing and securing the Docker platform and containers.
HackerSploit Docker Security Webinar Series

HackerSploit: Docker Security Series

Gain the necessary skills to be able to audit, secure and manage Docker in the context of an organization or in their own personal projects.

Recovering from a System Compromise | Top Docs

If you suspect that an unauthorized user has gained access to your Linode, your system could be considered compromised. Unfortunately, it’s virtually impossible to determine the full scope of an attacker’s reach into a compromised system. This video shows several methods to recover from a system compromise.

What Is Linode Doing To Strengthen Cybersecurity Of Its Users

Learn more:

Discover Docker Security Essentials

New Docker ebook, Kubernetes v1.21.1 support, Terraform resources

Bitwarden | Manage And Secure Your Passwords

Bitwarden is an open source password management application that can be self-hosted and run on your infrastructure. In this video, well use Cloudron to easily install and host your own Bitwarden instance.

Securing Nginx Web Server | Hackersploit Linux Security

NGINX is an open source web server with powerful load balancing, reverse proxy, and caching features. In this video, HackerSploit will show you how to better secure your Nginx server by disabling the default Nginx header and adding password authentication.