How to secure SSH on Remote server ?

Simple strategies to secure ssh server. Ssh is perhaps the most secure remote shell around, and at the same time the most abused one too. I have like a thousand attempts on my servers on default ssh port no 22. The tries are mostly dictionary attacks and brute forcing. Default security of ssh to delay the logins and use of strong passwords usually suffice to tackle this. How attackers plan and execute a dictionary attack ? First of all "nmap" is used to check if port 22 is open and is serving, then script execute dictionary attack on the port. This attack may run for years trying out various passwords…
Read More
kenpoliran_1328761468_95

How to set up a transparent proxy server on Linux, FreeBSD and NetBSD

This is how you configure a transparent caching proxy server (squid) on Linux. Make sure you have the required package installed Squid-stable : Use the standard package manager to install squid. On rpm bases systems use the command rpm -q squid to find out if it is installed Iptables : Usually installed on most linux systems Edit the squid config file: # vim /etc/squid/squild.conf We will be setting up a Transparent Caching web proxy server -- under editing.
Read More
kenpoliran_1328761468_95

Move or migrate users, data and services to a new Linux server

This article explains how to move or migrate the following from old Linux server to new Linux server. A few days ago I purchased a new system and I wanted to migrate a working server system to this new system. Rather than reinstalling the server or swapping the hard drive, I transferred only a small amount of files and I was up and running with a functional server in a matter of minutes !! The following is to be moved/migrated to new system Existing user accounts Service data with configurations (in my case apache, sshd and vsftpd) Application data with permissions (in my case /home and /srv/www) I am using…
Read More