Rkhunter rootkit scanning tool installation

Rkhunter rootkit scanning tool installation

How to install rkhunter rootkit scanning tool ?  

Rkhunter is a rootkit hunter scanning tool, it’s open source  scanner for unix flavors like centos, redhat, fedora and debian.

RKhunter scanner detects the back doors, malware, hidden exploits and other vulnerabilities like suspicious keywords in the kernel.

With our guide we assist you to install and configure the Rkhunter. In the guide we are using Centos6.x

Read more »

How to secure FTP & TELNET?

How to secure FTP & telnet?

 

With our guide, we are going to show you the best practice used to secure the FTP and Telnet. The checklist assists you to protect the server from attackers

 1. FTP

FTP (file transfer protocol) ,

This uses the password in clear text format, this method is unsafe to use for file transfer over the internet, because an attacker can capture the password easily.

We strongly recommend to use Winscp or sftp. With this guide we are going to show you,  how stop FTP service ?.

Read more »

How to protect SSH server

How to secure ssh server from attacks ?

SSH (Secure Shell): 

Secure the ssh server from brute force attack and other vulnerabilities. The checklist for securing the ssh server can mitigate the risk of getting hacked.

The periodical upgrade of ssh package from the repository is always recommended.

With our guide we are going to show you the best practice to secure ssh server.

Read more »

Apache hardening checklist

How to secure Apache web server?

Hardening to the web server is a very challenging in day to day life. Some useful techniques to minimize the risk of being a victim of hacked.

The following checklist to secure Apache web server

1. Upgrade Apache web server
2. Prevent Apache web server version display
3. Prevent Directory Listing
4. Running an Apache web server with non-privileges user and group.
5. Deny directory access
6. Disable unwanted modules in Apache configuration file httpd.conf
7. Protect conf and bin directories
8. Securing web server using Apache modules ” mod_security and mod_evasive”
9. The Apache web server from http request method Protect
10. Disable the  http trace method by adding directive “TraceEnable off” in the httpd.conf file
11. Limit the request size to avoid denial of service attack.
12. Disable Server Side Include
13. Cross Site Scripting protection
14. Timeout value configuration
15. Protect Apache web server using iptables chains
16. Disable / remove Apache web sever test page

Read more »

The file download restriction using squid proxy ACL.

How to restrict file download using squid ?

Squid, file download restriction : Squid acl configuration to restrict file download like .exe, .mp3,& .avi.

With our guide we are going to show how easy to restrict file download using squid acl.

We assume that you have installed squid already, otherwise you can install squid package.

#yum install squid

With our guide we are going to cover :

1. Define an ACL to block file download
2. Activate the ACL.
3. Editing squid.conf

Read more »

How to block URLs using squid proxy

How block websites  using squid proxy?

Squid Proxy, URL blocking

With our guide we are going to show you how to block website URL’s using squid proxy .

We assume that you have installed squid already, if not as you can install squid package.

#yum install squid

With our guide we are going to cover:

1. Define the ACL
2. Activate the ACL.
3. Editing squid.conf

Read more »

Squid as transparent proxy

What is Squid?

Squid is internet (web) cache proxy server to optimize the internet usage by storing frequently accessed data to its cache, which provides faster access to the same contents request of the clients. Also keeps track of user actions in squid.log file which locates in /var/log/squid/access.log

Applying Access Control List to prevent unwanted destinations like yahoo, gmail, YouTube, file download & video streaming.

With our guide we are going to show you how to install and configure squid proxy server and use as a transparent proxy.

Read more »

IPTABLES NAT by using a simple shell script

IPTABLES NAT by using a simple shell script.

The simple shell script to write the NAT rule to allow internet access to the local network.

With this guide we are going to show you how to write shell script for iptables NAT.

In the guide we are using below configuration .

Read more »

IPTABLES (NAT & PAT)

What is IPTABLES NAT and PAT ?

Easy and simple steps to learn about iptables NAT concept and real time NAT rules to build Linux based router / firewall.

Generally, the request received on Public IP, forwarding to a private IP address behind the firewall is called NAT (Network Address Translation).

Ex:

Outside Request -> public IP, eth1 “nat” to a private IP eth0 (internal network)
Inside Request -> private IP, eth0 “nat” to a public IP eth1 (external)

In case, the request received on public IP for a particular port, forwarding the request to private IP behind the firewall on same port or user define port is called PAT (port address translation).

Network Address Translation, there are two types of NAT tables.  With our guide we are going to cover following topics.

Read more »

What is IPTABLES?

What is IPTABLES?

It’s a firewall built into with your Linux box, IPTABLES is very powerful firewall to control network traffic.
The filters can be applied on the source and destination IP address / protocol like TCP, UDP and ICMP.
Following IPTABLES guide will assists you to understand the iptables and it’s chains including NAT

1. IPTABLES  and Chains

1.1 INPUT
1.2 OUTPUT
1.3 FORWARD

2. Advance IPTABLES

3. NAT

3.1 NAT
3.2 PAT

Read more »

About Us


solutionsatexperts.com is a web site that publishes sensible and helpful IT related tips, solutions for all learners and professionals . Our reserach team is engaged to produce help full tutorials to make your life easy .

More
Our Services


As we have a tendency to square measure into IT infrastructure solutions we provide big selection of services like cloud , application services , internet hosting , Portal Development ,Virtualization , Backup Management , Big Data , Email and Collaboration , internet services & IP Telephony .

Vision


As we have a tendency to square measure into IT infrastructure solutions we provide big selection of services like cloud , application services , internet hosting , Portal Development ,Virtualization , Backup Management , Big Data , Email and Collaboration , internet services & IP Telephony .

Copyright ©Solutions@Experts.com
Copyright © NewWpThemes Techmark Solutions - www.techmarksolutions.co.uk