{"id":144,"date":"2012-05-05T14:33:47","date_gmt":"2012-05-05T14:33:47","guid":{"rendered":"https:\/\/www.rosehosting.com\/blog\/?p=144"},"modified":"2022-12-19T06:44:32","modified_gmt":"2022-12-19T12:44:32","slug":"security-tips-for-your-server","status":"publish","type":"post","link":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/","title":{"rendered":"Security Tips for Your Server"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><p><img decoding=\"async\" class=\"alignleft wp-image-4599 size-thumbnail\" src=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2012\/05\/security-150x150.png\" alt=\"security\" width=\"150\" height=\"150\" \/>One of the first things you should do when running a <a title=\"Virtual Private Server (VPS)\" href=\"https:\/\/www.rosehosting.com\/managed-vps-hosting.html\">Virtual Private Server (VPS)<\/a> is to secure your server as much as possible. This way you will protect your server against various security attacks which may harm or even destroy your data.<\/p>\n<p>Here are a few easy tips on how to improve the stability and security of your Virtual Private Server:<!--more--><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69dfd90d33848\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69dfd90d33848\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#1-Keep-Your-Software-Up-To-Date\" >1. Keep Your Software Up-To-Date<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#2-Use-Strong-Passwords\" >2. Use Strong Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#3-Use-Correct-File-and-Directory-Permissions\" >3. Use Correct File and Directory Permissions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#4-StopDisable-Unnecessary-Services\" >4. Stop\/Disable Unnecessary Services<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#5-Disable-%E2%80%98root-login-via-SSH\" >5. Disable &#8216;root&#8217; login via SSH<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#6-Remove-Inactive-Accounts\" >6. Remove Inactive Accounts<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"1-Keep-Your-Software-Up-To-Date\"><\/span>1. Keep Your Software Up-To-Date<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Keeping the software up-to-date is one of the most important tasks of securing your server. Everyday, numerous vulnerabilities are found in various Linux applications, services and scripts and new fixed versions of them are being released very quickly. Installing the updates on your server is crucial and strongly recommended. You can keep your server up-to-date using your distribution&#8217;s package manager such as &#8216;yum&#8217;\u00a0 or &#8216;apt-get&#8217;.<\/p>\n<p>RPM based distros:<br \/>\n<code># yum update<\/code><\/p>\n<p>Debian based distros<br \/>\n<code># apt-get update &amp;&amp; apt-get upgrade<\/code><\/p>\n<h2 id=\"password\"><span class=\"ez-toc-section\" id=\"2-Use-Strong-Passwords\"><\/span>2. Use Strong Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Passwords are the front line defense for your server. When setting up new accounts on your virtual server, you should create strong passwords. The stronger the password is, the less likely it is to be guessed and your server compromised. Never use passwords that are easily guessable, such as passwords based upon names, street addresses, dictionary words, significant dates, etc&#8230; A strong password consists of a combination of letters (both upper and lower case), numbers and special characters and it should be at least 8 characters long.<\/p>\n<p><strong>To change your &#8216;root&#8217; password use the following on the Linux command line:<\/strong><br \/>\n<code># passwd<\/code><\/p>\n<p><strong>To change a user&#8217;s password use the following instead:<\/strong><br \/>\n<code># passwd &lt;username&gt;<\/code><\/p>\n<h2><span class=\"ez-toc-section\" id=\"3-Use-Correct-File-and-Directory-Permissions\"><\/span>3. Use Correct File and Directory Permissions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Three types of access permissions: read, write and execute are available for three different categories of users: owner, group and others. With these permissions you can determine who can access or modify the files. This makes them very important for the security of your server. You should ensure that all files and directories have the correct permissions. You can check the permissions of a file by executing the &#8216;ls -l&#8217; command. The very first line of the given output shows the files\/directories permissions: &#8216;r&#8217; = read permission; &#8216;w&#8217; = write permission; &#8216;x&#8217; = execute permission; &#8216;-&#8216; = no permission. You can change the permissions with the &#8216;chmod&#8217; command.<\/p>\n<p>The following commands can help you find any world writable files and directories which\u00a0 may be a security risk:<\/p>\n<p>To find world writable files type:<br \/>\n<code># find \/ -type f -perm -o+w -exec ls -l {} \\;<\/code><\/p>\n<p>To find world writable directories type:<br \/>\n<code># find \/ -type d -perm -o+w -exec ls -ld {} \\;<\/code><\/p>\n<h2><span class=\"ez-toc-section\" id=\"4-StopDisable-Unnecessary-Services\"><\/span>4. Stop\/Disable Unnecessary Services<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>All Linux distributions usually have many services\/daemons configured to start every time you start the server. The more services running on your server, the more ports are being open to potential external break-ins. Disabling unnecessary services can improve the security of your server and even the overall server performance.<\/p>\n<p>To check which services are running on your server execute:<br \/>\n<code># chkconfig --list<\/code><\/p>\n<p>The above command will show the startup status of all services.<\/p>\n<p>To stop a service at startup time you can execute:<br \/>\n<code># chkconfig --levels &lt;name_of_service&gt; off<\/code><\/p>\n<h2><span class=\"ez-toc-section\" id=\"5-Disable-%E2%80%98root-login-via-SSH\"><\/span>5. Disable &#8216;root&#8217; login via SSH<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The &#8216;root&#8217; account has full control over the entire server, so allowing direct logins as &#8216;root&#8217; via SSH is one of the biggest security risks. Hackers can brute force a server&#8217;s &#8216;root&#8217; password and when they succeed, they will gain full control over your entire server. Despite this, even one small mistake made while logged in as &#8216;root&#8217; can cause a big\u00a0 problem on your server. It&#8217;s strongly recommended to use your &#8216;root&#8217; user only when it is really necessary.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"6-Remove-Inactive-Accounts\"><\/span>6. Remove Inactive Accounts<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>User accounts that are not used for a long time are potentially security risks for your server. Since no one is using them, they can be compromised and used to harm your server or other servers on the network.<\/p>\n<p>To delete user account from the Linux command line execute:<br \/>\n<code># userdel &lt;username&gt;<\/code><\/p>\n<p><span style=\"color: #ff0000;\"><strong>PS.<\/strong><\/span> If you liked this post please share it with your friends on the social networks using the buttons on the left or simply leave a reply below. Thanks.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"zemanta-pixie\" style=\"margin-top: 10px; height: 15px;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>One of the first things you should do when running a Virtual Private Server (VPS) is to secure your server &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Security Tips for Your Server\" class=\"read-more button\" href=\"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#more-144\" aria-label=\"Read more about Security Tips for Your Server\">Read More<\/a><\/p>\n","protected":false},"author":4,"featured_media":1141,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1703,21],"tags":[31,27,33,22,26,32,1152,25,29,24,23,30,28,18],"class_list":["post-144","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tips-and-tricks","tag-filesystem-permissions","tag-linux","tag-linux-distribution","tag-linux-security","tag-linux-server-security","tag-password","tag-rosehosting","tag-secure-server","tag-secure-shell","tag-secure-your-server","tag-security-tips","tag-user-computing","tag-virtual-private-server","tag-vps","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security Tips for Your Server | RoseHosting<\/title>\n<meta name=\"description\" content=\"Security Tips for Your Server | RoseHosting\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Tips for Your Server\" \/>\n<meta property=\"og:description\" content=\"Security Tips for Your Server | RoseHosting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/\" \/>\n<meta property=\"og:site_name\" content=\"RoseHosting\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RoseHosting\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/rosehosting.helpdesk\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-05T14:33:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-19T12:44:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2012\/05\/Monitor_padlock.svg_.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"275\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:site\" content=\"@rosehosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/\"},\"author\":{\"name\":\"Jeff Wilson\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#\\\/schema\\\/person\\\/7ce77a842fa6a9a7f8efa186f2353713\"},\"headline\":\"Security Tips for Your Server\",\"datePublished\":\"2012-05-05T14:33:47+00:00\",\"dateModified\":\"2022-12-19T12:44:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/\"},\"wordCount\":651,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/Monitor_padlock.svg_.png\",\"keywords\":[\"Filesystem permissions\",\"Linux\",\"Linux distribution\",\"linux security\",\"linux server security\",\"Password\",\"rosehosting\",\"secure server\",\"Secure Shell\",\"secure your server\",\"security tips\",\"User (computing)\",\"Virtual Private Server\",\"vps\"],\"articleSection\":[\"Security\",\"Tips and Tricks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/\",\"name\":\"Security Tips for Your Server | RoseHosting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/Monitor_padlock.svg_.png\",\"datePublished\":\"2012-05-05T14:33:47+00:00\",\"dateModified\":\"2022-12-19T12:44:32+00:00\",\"description\":\"Security Tips for Your Server | RoseHosting\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/Monitor_padlock.svg_.png\",\"contentUrl\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2012\\\/05\\\/Monitor_padlock.svg_.png\",\"width\":\"300\",\"height\":\"275\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/security-tips-for-your-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Tips for Your Server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/\",\"name\":\"RoseHosting.com\",\"description\":\"Premium Linux Tutorials Since 2001\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#organization\",\"name\":\"RoseHosting\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/android-chrome-192x192-1.png\",\"contentUrl\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/android-chrome-192x192-1.png\",\"width\":192,\"height\":192,\"caption\":\"RoseHosting\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RoseHosting\",\"https:\\\/\\\/x.com\\\/rosehosting\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/rosehosting\\\/\"],\"description\":\"RoseHosting is a leading Linux hosting provider, serving thousands of clients world-wide since 2001.\",\"email\":\"info@rosehosting.com\",\"telephone\":\"(314) 275-0414\",\"legalName\":\"Rose Web Services LLC\",\"foundingDate\":\"2001-04-02\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/#\\\/schema\\\/person\\\/7ce77a842fa6a9a7f8efa186f2353713\",\"name\":\"Jeff Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g\",\"caption\":\"Jeff Wilson\"},\"description\":\"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.\",\"sameAs\":[\"https:\\\/\\\/www.rosehosting.com\",\"https:\\\/\\\/www.facebook.com\\\/rosehosting.helpdesk\"],\"url\":\"https:\\\/\\\/www.rosehosting.com\\\/blog\\\/author\\\/jwilson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Tips for Your Server | RoseHosting","description":"Security Tips for Your Server | RoseHosting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/","og_locale":"en_US","og_type":"article","og_title":"Security Tips for Your Server","og_description":"Security Tips for Your Server | RoseHosting","og_url":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/","og_site_name":"RoseHosting","article_publisher":"https:\/\/www.facebook.com\/RoseHosting","article_author":"https:\/\/www.facebook.com\/rosehosting.helpdesk","article_published_time":"2012-05-05T14:33:47+00:00","article_modified_time":"2022-12-19T12:44:32+00:00","og_image":[{"width":300,"height":275,"url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2012\/05\/Monitor_padlock.svg_.png","type":"image\/png"}],"author":"Jeff Wilson","twitter_card":"summary_large_image","twitter_creator":"@rosehosting","twitter_site":"@rosehosting","twitter_misc":{"Written by":"Jeff Wilson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#article","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/"},"author":{"name":"Jeff Wilson","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713"},"headline":"Security Tips for Your Server","datePublished":"2012-05-05T14:33:47+00:00","dateModified":"2022-12-19T12:44:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/"},"wordCount":651,"commentCount":0,"publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2012\/05\/Monitor_padlock.svg_.png","keywords":["Filesystem permissions","Linux","Linux distribution","linux security","linux server security","Password","rosehosting","secure server","Secure Shell","secure your server","security tips","User (computing)","Virtual Private Server","vps"],"articleSection":["Security","Tips and Tricks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/","url":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/","name":"Security Tips for Your Server | RoseHosting","isPartOf":{"@id":"https:\/\/www.rosehosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#primaryimage"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2012\/05\/Monitor_padlock.svg_.png","datePublished":"2012-05-05T14:33:47+00:00","dateModified":"2022-12-19T12:44:32+00:00","description":"Security Tips for Your Server | RoseHosting","breadcrumb":{"@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#primaryimage","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2012\/05\/Monitor_padlock.svg_.png","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2012\/05\/Monitor_padlock.svg_.png","width":"300","height":"275"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rosehosting.com\/blog\/security-tips-for-your-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rosehosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Tips for Your Server"}]},{"@type":"WebSite","@id":"https:\/\/www.rosehosting.com\/blog\/#website","url":"https:\/\/www.rosehosting.com\/blog\/","name":"RoseHosting.com","description":"Premium Linux Tutorials Since 2001","publisher":{"@id":"https:\/\/www.rosehosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rosehosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rosehosting.com\/blog\/#organization","name":"RoseHosting","url":"https:\/\/www.rosehosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","contentUrl":"https:\/\/www.rosehosting.com\/blog\/wp-content\/uploads\/2022\/03\/android-chrome-192x192-1.png","width":192,"height":192,"caption":"RoseHosting"},"image":{"@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RoseHosting","https:\/\/x.com\/rosehosting","https:\/\/www.linkedin.com\/in\/rosehosting\/"],"description":"RoseHosting is a leading Linux hosting provider, serving thousands of clients world-wide since 2001.","email":"info@rosehosting.com","telephone":"(314) 275-0414","legalName":"Rose Web Services LLC","foundingDate":"2001-04-02","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/www.rosehosting.com\/blog\/#\/schema\/person\/7ce77a842fa6a9a7f8efa186f2353713","name":"Jeff Wilson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0985fed6af04cc60703d2ecf27c65dfa373e0ca00eb21c0b03477e099ea3f99f?s=96&r=g","caption":"Jeff Wilson"},"description":"An experienced Linux veteran with many years of experience. Helping other Linux admins with frequent Linux and business-related blog posts on the RoseHosting blog. Techie by choice. Loving nature and travel. Happily married and father of two lovely children.","sameAs":["https:\/\/www.rosehosting.com","https:\/\/www.facebook.com\/rosehosting.helpdesk"],"url":"https:\/\/www.rosehosting.com\/blog\/author\/jwilson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":2,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/144\/revisions"}],"predecessor-version":[{"id":44406,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/posts\/144\/revisions\/44406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media\/1141"}],"wp:attachment":[{"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/media?parent=144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/categories?post=144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rosehosting.com\/blog\/wp-json\/wp\/v2\/tags?post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}