Tutorial on installing Anti-Rootkit in CentOS 7 1. Connect to your Linux SSH. 2. Now enter the following command to update your CentOS repositories. yum update 3. Enter the following command to install the Chkrootkit prefix. yum install wget gcc-c ++ glibc-static 4. After installing the prerequisites, type the following command to download the compressed chkrootkit file. wget -c ftp://ftp.pangeia.com.br/pub/seg/pac/chkrootkit.tar.gz 5. To ensure that the file is valid and not tampered with, download and check the MD5 hash file to make sure it not compromised. wget...
OpenJDK is a Java implementation and compilation platform that is open source. After installing this platform, you will be able to run or develop software written in Java programming language. It has two different versions that we must first examine before installing:
OpenJDK JRE: The platform acts like a virtual machine on your CentOS, also called JVM, and provides the ability to run Java applications for the CentOS operating system.
OpenJDK JDK: This version of OpenJDK is designed for developers and dual-core developers to provide them with the ability to install Java applications...
Trojan Identification Before doing anything, you need to make sure that the Trojan exists on your system. To do this, first see the CPU status and processes through the TOP tool. If there is a process with a strange name, such as hgmijazsert, running on your server with root access, there is a high chance that this is malware infecting your server and using resources. (Note down all the information of this Trojan, including the PID, name, etc., as you will need it later). Generally, when a server is infected with malware, CPU load will be high and its resources will always be almost...
How to install LEMP on Ubuntu18.04
What is LEMP?
LEMP is an acronym for Linux, Nginx, MySQL, and PHP. LEMP stack, just like LAMP stack (with Apache instead of Nginx), is used for development and deployment of web applications. Nginx in LEMP provides modular event-driven architecture handling requests using asynchronous events. This feature enables it to have high performance under high loads. The MySQL is used to store the website’s data whereas PHP is for processing the dynamic content of the sites.
A Linux VPS.
Username and password for your VPS...
How to connect to Linux Server
Most of the time we don't have access to the physical server and we have to login remotely to the server. In this tutorial we'll learn how to login remotely to a Linux Server using Secure Shell (SSH)
SSH is a very powerful tool that allows you to directly access the command line of your Linux VPS. This will allow you to execute Linux commands to control your VPS Server and manipulate files and directories and applications. By default, SSH runs on port 22 of your VPS. To connect to your VPS using SSH, you will need to use an SSH client.
How to secure the Linux VPS?
Nowadays the use of Linux servers on the Internet has grown enormously and with it, the amount of possible dangers, therefore security is an important factpor we should attend to.
In this article, we are going to study seven key points for security in Linux servers.
7 Key points for Linux Security
Using complex and unpredictable passwords
Disable login with root user
Restricting user login
Disable protocol 1
Use non-standard ports
Filtering SSH connections with the firewall
Use the Security Keys to identify the identity