Tag: Create
Best Practices for Firewall Rules
Posted on by David Richards | Updated:
Category: Getting Started | Tags: Block, ConfigServer Firewall, Configuration, Create, Enable, Firewall, IP, IPTables, Port, Security, Setup
Reading Time: 4 minutes
Basic Firewall Rules
In a firewall rule, the action component decides if it will permit or block traffic. It has an action on match feature. For example, if the traffic matches the components of a rule, then it will be permitted to connect to the network. It is essential to consider the potential security risks when modifying a firewall rule to avoid future issues. Following best practices for configuring firewalls can help you maximize the effectiveness of your solution.
Remove Permissions for a MySQL User on Linux via Command Line
Posted on by Justin Palmer | Updated:
Reading Time: 2 minutes
Previous Series:
MySQL via Command Line 101: Basic Database Interaction
MySQL via Command Line 101: Basic Database Interaction
Preflight Check
- These instructions are intended for revoking a MySQL user permissions on Linux via the command line
- I’ll be working from a Liquid Web Core Managed CentOS 6.5 server, and I'll be logged in as root.
Login to MySQL
First we'll log in to the MySQL server from the command line with the following command:
Categories
Have Some Questions?
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.
1.800.580.4985
1.517.322.0434