In this tutorial, we will go through everything you need to do in order to setup your new CentOS VPS. Even though you can start using your server immediately, there are many additional things and tweaks you can do to get the most out of your new server and improve its security. 52 more words
Tags » CentOS
From the title I feel like I don’t need to give any extra background information. But here you have it. I have a server, and I need a minimal installation (that is, … 320 more words
Linux has in-built security model in place by default and is thus considered very secure. Even better if you tune it up and customize as per your need because that would make your system more secure. 3,008 more words
NGINX is the one of the world’s most popular open source web server and load balancer for high-traffic sites, so it is important to protect your website and users from brute-force attacks. 1,108 more words
Docker is world’s leading software container platform and developers use docker to eliminate “it works on my machine” problem , once and for all.
Docker Container is similar to a virtual machine where the application is packed in a container and deployed on any host server standalone. 864 more words
Keeping secure configurations is obviously needed but using extra technologies and tools to prevent attacks like brute-forcing is much needed at present.
You may worry to monitor the server logs and take required action according to the logs by yourself. 1,355 more words