How to Install Lynis on Ubuntu 18.04

In this guide, we will explain how to install the Lynis community edition on an Ubuntu 18.04 VPS.

Lynis is an open-source tool for security auditing, compliance testing, and vulnerability detection. Lynis also scan for general system information and possible configuration issues and provide tips for further system hardening.

Lynis comes in two editions, community and enterprise. The enterprise editions include more tests and it is bundled with plugins. When extended with plugins, Lynis will perform additional tests and collect more system information. Lynis runs on all Linux distributions and it is used by thousands of developers, system administrators, IT auditors, and penetration testers all around the world.

This guide should work on other Linux VPS systems as well, but it was tested and written for an Ubuntu 18.04 VPS.

Read moreHow to Install Lynis on Ubuntu 18.04

How to Install OpenVPN on Ubuntu 18.04

In this article, we will go over step-by-step instructions on how to install OpenVPN on an Ubuntu 18.04 VPS.

A Virtual Private Network or VPN for short is a networking service that routes your network traffic through a server. With this, all of your network connections will be disguised as though they originate from the VPN server’s connection. The destination address can’t know your real location, thus providing both privacy and safety online. VPNs are also used by corporations and enterprise environments to enable a secure private network to protect their important data.

OpenVPN is a VPN protocol which defines how the data is transmitted over a VPN. Other common protocols are PTP, L2TP, SSTP, and IKEV2.

OpenVPN provides the most secure connection among other protocols as it provides secure authentication (such as the use of certificates and keys) as well as using up-to-date encryption algorithms. On top of this, OpenVPN is open-source software powered by thousands of developers from different communities. It is distributed under the GNU GPL license. Let’s begin with the installation.

Read moreHow to Install OpenVPN on Ubuntu 18.04

How to Configure a Firewall with UFW on Ubuntu 18.04

In this article, we will show you how to install and configure UFW on an Ubuntu 18.04 VPS. First, we will take a moment to introduce and explain what firewalls are, and then we’ll show you how to use UFW and how to make the appropriate UFW configuration.

A firewall is a software program that monitors the network traffic and prevents unauthorized access to or from a private network. In regards to the Linux kernel, a Netfilter subsystem is implemented, which is used to manipulate the network traffic. Almost all modern Linux firewall solutions use this system to filter network packets. Additionally ‘iptables’ – a firewall utility accessible from the command line – is also part of the Netfilter framework. To simplify the process of creating firewall rules, Canonical (the creators of Ubuntu) developed an iptables interface called Uncomplicated Firewall (UFW).

If you are using Ubuntu 18.04 and want to secure your network without having to deal with learning how to use iptables, then UFW may be the appropriate solution you are looking for.

Read moreHow to Configure a Firewall with UFW on Ubuntu 18.04

How to Use a Private Key and PuTTY to Log into Your Server Securely

Improve Login Security Using Private Keys and PuTTY

With security becoming increasingly important in today’s modern world of information theft and privacy concerns, keeping your server safe and secure has almost become a necessity. While several methods exist to properly secure your server, from using a long password to two-factor authentication, they can be quite a hassle to set up and use on a day-to-day basis. However, private keys offer a good balance between convenience and security.

Read moreHow to Use a Private Key and PuTTY to Log into Your Server Securely

How to Install the CSF Firewall on CentOS 7

Install CSF on CentOS 7

One of the first things you should do after installing CentOS 7 is to configure a decent firewall. The normal firewall that comes preinstalled on CentOS is called iptables – and even though that is a very thorough solution, it’s usually targeted towards more experienced users, and because of its steeper learning curve, it can feel unintuitive to get started with. This is why we recommend a 3rd party solution called ConfigServer Security & Firewall (CSF). It’s free, open-source, and is one of the best ways to manage your firewall needs on CentOS.

Read moreHow to Install the CSF Firewall on CentOS 7

How to Generate a Self-Signed SSL Certificate on Linux

how to generate a self signed ssl certificate on linux

In today’s guide, we will discuss how to generate a self-signed SSL certificate on Linux as well as how to implement them in Apache. SSL is becoming more and more important as the internet becomes more popular. With free Let’s Encrypt certificates becoming a commodity that anyone can use, there’s no reason for anyone to not use SSL – not to mention the search ranking benefits, and the fact that browsers and search engines will trust your site.

However, you can also generate your own self-signed SSL certificate for private use on your server. One big reason to do this is encryption. While your personal certificate won’t mean anything to browsers, and visitors will still get a warning message if they visit your site directly, you can at least be sure that you’re protected against “man-in-the-middle” attacks. A self-signed certificate is a good first step when you’re just testing things out on your server, and perhaps don’t even have a domain name yet.

Let’s start with our step by step procedure on how to create a self-signed SSL certificate on Linux.

Read moreHow to Generate a Self-Signed SSL Certificate on Linux

How to Recover from an Accidental SSH Disconnection on Linux

How to Recover from an Accidental SSH Disconnection on Linux
How to Recover from an Accidental SSH Disconnection on Linux

SSH remains the most common way by which we access our Linux servers. Most people don’t manually log into the server console itself. Through SSH, you can do almost everything except for certain low-level operations. However, this leaves us open to the possibility of disconnection. It might be unexpected but is a very real possibility. A sudden fluctuation on the Internet, a power surge, and your SSH session are immediately terminated. Along with that, any processes that might have been running are typically terminated as well. Not just the ones active, but all the background processes as well. If you were doing something important that shouldn’t be interrupted in the middle – like a complex installation, this can completely mess up your system.

Read moreHow to Recover from an Accidental SSH Disconnection on Linux

How to Enforce Password Quality in Linux

How to Enforce Password Quality in Linux

One of the easiest ways to improve the security of your server is to ensure that everyone’s password meets a certain minimum length. There are, of course, other considerations like the mix of small and capital letters, numbers, and special characters. But a minimum password length gives you the most “bang for the buck”. Each additional character in a password increases its strength exponentially. In this article, we’ll show you how to enforce a minimum password length for all your users in Linux.

Read moreHow to Enforce Password Quality in Linux