Tag: Security
Enhance the security of your server by reading through our easy to follow tutorials. From installing firewalls to auto-renewing SSLs, our expansive library is sure to be your bookmark favorite.
Threat Stack Intrusion Detection System
Introduction
This article will review some of the more technical aspects of Threat Stack. Threat Stack is a platform-independent intrusion detection system (IDS) designed to provide users with a unique view into various integrated server security functions. It monitors both Linux and Windows servers as well as Kubernetes or other container-based server infrastructures to observe behaviors and detect malicious, uncommon, and risky activity.
Microsoft Exchange Server Security Update
Introduction
In this article, we provide updated information concerning the ongoing threat posed by the malware directed at Microsoft Exchange Servers noted in CVE-2021-26855. We also furnish the steps needed to update and secure your Microsoft Exchange Server. In a recent post, the Cybersecurity & Infrastructure Security Agency posted a priority security advisory regarding the recent Microsoft Exchange Server vulnerability. They state:
What is SIEM?
Security Information and Event Management (or SIEM) is a subset of the computer security field, where applications and services join forces with security event management and security information management. When united, these disciplines provide significantly improved real-time statistical data and threat analysis of alerts generated by the related applications. The 2021 Internet Security Threat Report from Sophos denotes that are not only the number of attacks on the rise but also the diverse nature of methodologies and vectors of incursions used. This necessitates the fact that adding a SIEM is especially warranted at this time.
KernelCare Retirement
The KernelCare Linux kernel patching service is a system offered by CloudLinux. This product provides ongoing security patches for many Linux kernel versions. Updates are installed live without requiring a system reboot, which is a tremendous incentive when running an active server. Because CloudLinux offers a free symlink (symbolic link) protection patch for servers running CentOS 6 and 7, Liquid Web is replacing existing versions of KernelCare with this free version.
Is GPG Still Useful In Today’s Insecure World?
Introduction
In this article, we will be exploring GnuPG or GPG as it is more commonly known. We will discuss if this software platform is still needed, if it will still be useful in the future, and how to install and utilize it.
How to Store Secrets in Kubernetes
What is a Secret?
A Kubernetes Secret is an object that enables us to store and manage sensitive information. A Secret can contain data like SSH keys, OAuth data, or other user authentication information like passwords. It is typically stored within a cluster in a manner native to Kubernetes. Using a Secret object provides more granular control over how highly sensitive data is used. It also lowers the risk of data exposure to unauthorized parties.
What is Blockchain? A Tutorial
The idea of blockchain itself may sound complicated, but the premise is simple. Blockchain is a zero-trust, fully decentralized peer-to-peer data storage system that spreads verified information across participants in the chain, referred to as nodes. Blockchain stores this information in blocks that are chained together. As new data arrives, it is recorded into a block. Once a block has been filled with information, it is linked to the previous block. This process allows the data to be bound together in sequential and chronological order.
How to Install and Configure KubeKey
What is KubeKey?
KubeKey is the newest Kubernetes installer for KubeSphere. KubeSphere is a distributed OS management system for cloud-native applications using Kubernetes as its kernel. It provides a plug-and-play structure for seamless integration of many third-party applications. It is somewhat similar in nature to MiniKube for installing Kubernetes.
Introduction
Just as regular visitors reach our server every day, so do others with more nefarious intentions. It is simply not reasonable to run an online service without some layer of protection. To protect against some of these attacks, Ubuntu ships with ufw (Uncomplicated Firewall). This is a tool designed to make Ubuntu firewall management as easy and user-friendly as possible. Specifically, ufw provides a cleaner interface for the core firewall tools netfilter and iptables, which, while robust, can be challenging to master.
How to Locate Open Ports in Linux
What is a Port?
First, let’s define what a port is. According to the IEFT, a port is:
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.