Security is one of the most important concerns that server administrators face. These guides will help you harden your system’s security, addressing topics that include configuring a firewall, creating and administering SSL certificates for transport layer security, offering secured SFTP user access to your Linode, and blocking malicious probes, among others.
This guide shows how to use dm-crypt in plain mode or with LUKS to encrypt your data disk, partition or file container.
This guide covers basic best practices for securing a production server, including setting up user accounts, configuring a firewall, securing SSH, and disabling unused network services.
This guide outlines steps to protect your data and recover your system in the event of a suspected system compromise.
Tips to improve the security of your SSH server
This guide shows you how to set up Fail2Ban, a log-parsing application, to monitor system logs and detect automated attacks on your Linode.
This guide shows how to use the Elastic Stack (Elasticsearch, Logstash, and Kibana) to collect, log, and visualize security data and threat alerts through Wazuh, part of OSSEC Intrusion Detection.
Intel recently disclosed two vulnerabilities that affect processors in most devices over the last 23 years. Here's how that affects you and what you can do about it.