Enable Automatic Updates – Fedora/Red Hat/CentOS + Bonus Tip

As a reminder, Red Hat Enterprise Linux is based on Fedora Linux and CentOS is a 100% compatible rebuild of Red Hat Enterprise Linux. With that out of the way, lets move on. Linux server security is crucial to Linux server administration. Part of keeping Linux servers secure, is to install security updates shortly after they […]

How to Enable Unattended Upgrades on Ubuntu/Debian

Linux server security is of critical importance to sysadmins. One central part of keeping Linux servers secure, is by installing security updates in a timely manner. Too often there are compromised servers on the internet due to pending security updates waiting for a manual update. On both Ubuntu and Debian, the unattended-upgrades package can be configured […]

How to Set Up an Nginx Certbot

If you are looking to automate the process of obtaining, installing, and updating TLS/SSL certificates on your web server, then Let’s Encrypt is a very useful tool. It is a certificate authority (CA) that comes packaged with a corresponding software client, Certbot, that will automatically install TLS/SSL certificates. This means that you can run encrypted HTTPS […]

IoT Security: 42 Top Internet of Things Security Solutions

After researching IoT security. I’ve decided to maintain a list of companies which offer IoT (internet of things) security tools and solutions. Feel free to share your solutions, feedback and tips for securing IoT devices. This list will continue to grow in the coming days, week, months and beyond. In the aftermath of the 2016 DDoS […]

Nginx tuning tips: TLS/SSL HTTPS – Improved TTFB/latency

Since 30th June 2018, the PCI Security Standards Council requires that support for SSL 3.0 and TLS 1.0 be disabled. TLS 1.1 or higher must be used and TLS 1.2 is strongly recommended. In addition, as of July 2018, Google Chrome began to mark ‘HTTP’ web sites as “not secure”. Over the past few years, the […]

How to Convert OpenSSH keys to Putty (.ppk) on Linux

PuTTYgen is an key generator for creating SSH keys for PuTTY. PuTTYgen is comparable in certain respects to the ssh-keygen tool. PuTTYgen can be used to create public and private key pairs (in .ppk file format). In addition, PuTTYgen can also be used to convert keys to and from other formats. On Windows PuTTYGen is a graphical tool. A command-line version is available for […]

Replacing Cloudflare with CSF Firewall

November 5th 2018 update: I’ve updated this article (the install URL and other minor fixes/improvements). I replaced Cloudflare and thus also Cloudflare Argo with KeyCDN + local firewall and server hardening for this blog as of June 2018. However, do support clients who use Cloudflare and still highly recommend it.  2017 update: With the recent Cloudflare “Cloudbleed” data leak. […]

Is Cloudflare Argo worth it?

Cloudflare Argo reduces network latency on average by 35% and connection errors by 27%. Traditional network technologies use static routing information which can be slower and often use congested paths. Slow loading times and connection timeouts increase the likelihood of poor user experience. The Cloudflare company routes 10% of all HTTP/HTTPS Internet traffic. This provides […]

Generating Secure Passwords for your Linux Server

Very often sysadmins will have to setup new servers or harden existing server passwords during security audits. As a result, secure passwords have to be chosen for root, cPanel accounts, ftp, etc. There are many composite practices that make a server secure, but often overlooked is using secure passwords. Notice that SSH or MySQL root […]

Using CentOS CR (Continuous Release) Repo

CentOS (Community Enterprise Operating System) is a Linux distribution that attempts to provide free, enterprise-class, community-supported computing platform functionally compatible with its upstream source, Red Hat Enterprise Linux (RHEL). CentOS is run by volunteers who work directly with Red Hat’s RPM source files and pushing them to CentOS for release. At times the project will fall behind […]