CentOS Security

This bundle of guides shows how to securely connect to a CentOS compute instance and how to harden it from attacks using public SSH keys, firewalls, AV software, and other tools.
images/placeholder.jpg

How to Use nftables

nftablesreplaces the successful iptablesand its related frameworks built on Netfilter. With nftables come improvements to performance and usability, but also significant changes to syntax and usage.

SecureMySQLserver.png

How to Secure MySQL Server

MySQL MySQL is an open-source relational database management system. This guide will show you how to secure and audit a MySQL server.

AntiVirus_Rootkitprotec_ClamAV_rkkunter.png

Anti-Virus and Rootkit Protection with ClamAV and rkhunter

Anti-virus and Rootkit Detection This guide teaches you how to use ClamAV, ClamTK, and rkhunter for anti-virus and rootkit detection to secure your server.

feature.svg

Cloud Firewall

Linode’s Cloud Firewall is a robust cloud-based firewall solution available at no additional charge for Linode customers.

Getting_Started_with_SELinux_on_CentOS_8_1200x631.png

A Beginner's Guide to SELinux on CentOS 8

SELinux is a Mandatory Access Control (MAC) system, developed by the NSA. SELinux was developed as a replacement for Discretionary Access Control (DAC) that ships with most Linux distributions.

fail2ban_tg.png

How to Use Fail2ban to Secure Your Server (A Tutorial)

What is Fail2Ban Fail2ban is a log-parsing application that monitors system logs for symptoms of an automated attack on your Linode.

introduction-to-firewalld-on-centos.png

Configure FirewallD on CentOS (Create and List Rules)

FirewallDis frontend controller for iptables used to implement persistent network traffic rules. It provides command line and graphical interfaces and is available in the repositories of most Linux distributions.

create-instance-details.png

How to Set Up and Secure a Linode Compute Instance

After you have successfully created a Compute Instance, there are a few initial configuration steps you should perform within your new Linux system.

1461-SSH-Passphrase.png

Creating an SSH Key Pair and Configuring Public Key Authentication

Password authentication is the default method most SSH (Secure Shell) clients use to authenticate with remote servers, but it suffers from potential security vulnerabilities like brute-force login attempts.

1721-ipv4-rules.png

Controlling Network Traffic with iptables - A Tutorial

iptables is an application that allows users to configure specific rules that will be enforced by the kernel’s netfilter framework.

modify_file_permissions_with_chmod_smg.png

Modify File Permissions with chmod

Modify File Permissions with chmod The chmod command allows users to change read and write permissions in Unix systems.

1487-numeric-permissions.png

Linux Users and Groups

If you are new to Linux/Unix, then the concept of permissions may be confusing. This guide provides you with an explanation of what permissions are, how they work, and how to manage them.