Debian Security

This bundle of guides shows how to securely connect to a Debian compute instance and how to harden it from attacks using public SSH keys, firewalls, AV software, and other tools.
create-instance-details.png

Setting Up and Securing a Compute Instance

After you have successfully created a Compute Instance, there are a few initial configuration steps you should perform within your new Linux system.

/images/placeholder.jpg

Get Started with nftables

nftables replaces the successful iptables and its related frameworks built on Netfilter. With nftables come improvements to performance and usability, but also significant changes to syntax and usage.

SecureMySQLserver.png

Securing MySQL Server

MySQLMySQL is an open-source relational database management system. This guide will show you how to secure and audit a MySQL server.

feature.svg

Cloud Firewall

Linode’s Cloud Firewall service is a robust cloud-based firewall solution available at no additional charge for Linode customers.

AntiVirus_Rootkitprotec_ClamAV_rkkunter.png

Anti-Virus and Rootkit Protection with ClamAV and rkhunter

Anti-virus and Rootkit DetectionThis guide teaches you how to use ClamAV, ClamTK, and rkhunter for anti-virus and rootkit detection to secure your server.

InstallSELinux_Deb10.png

Install SELinux on Debian 10

Ubuntu has a Mandatory Access Control (MAC) system similar to SELinux, named AppArmor. Both SELinux and AppArmor provide a set of tools to isolate applications from each other to protect the host system from being compromised.

ufw_tg.png

How to Configure a Firewall with UFW

What is UFW?UFW, or uncomplicated firewall, is a frontend for managing firewall rules in Arch Linux, Debian, or Ubuntu.

fail2ban_tg.png

Using Fail2ban to Secure Your Server

What is Fail2Ban Fail2ban is a log-parsing application that monitors system logs for symptoms of an automated attack on your Linode.

1461-SSH-Passphrase.png

Use SSH Public Key Authentication on Linux, macOS, and Windows

Public key authentication with SSH (Secure Shell) is a method in which you generate and store on your computer a pair of cryptographic keys and then configure your server to recognize and accept your keys.

1721-ipv4-rules.png

A Tutorial for Controlling Network Traffic with iptables

iptables is an application that allows users to configure specific rules that will be enforced by the kernel’s netfilter framework.

modify_file_permissions_with_chmod_smg.png

Modify File Permissions with chmod

Modify File Permissions with chmodThe chmod command allows users to change read and write permissions in Unix systems.

1487-numeric-permissions.png

Linux Users and Groups

If you are new to Linux/Unix, then the concept of permissions may be confusing. This guide provides you with an explanation of what permissions are, how they work, and how to manage them.