Tags » CentOS

First Steps After Getting a CentOS VPS

In this tutorial, we will go through everything you need to do in order to setup your new CentOS VPS. Even though you can start using your server immediately, there are many additional things and tweaks you can do to get the most out of your new server and improve its security. 52 more words

Gtk-WARNING ** cannot open display on CentOS 7 minimal server install

From the title I feel like I don’t need to give any extra background information. But here you have it. I have a server, and I need a minimal installation (that is, … 320 more words

Bits

Changing PHP memory limits

To be noted: Increasing the ‘Php-memory-limit’ is different from increasing the ‘Php-upload’ size.

By default the php memory limits are bare minimum. Sites that run many contrib modules, or particularly memory-intensive ones, will need more. 475 more words

Devops

Standard Configurations and Security hardening: OS level

Linux has in-built security model in place by default and is thus considered very secure. Even better if you tune it up and customize as per your need because that would make your system more secure. 3,008 more words

Devops

Preventing your web server from brute force attacks using fail2ban.

NGINX is the one of the world’s most popular open source web server and load balancer for high-traffic sites, so it is important to protect your website and users from brute-force attacks. 1,108 more words

Cloud

Managing Docker Containers

Docker is world’s leading software container platform and developers use docker to eliminate “it works on my machine” problem , once and for all.

Docker Container is similar to a virtual machine where the application is packed in a container and deployed on any host server standalone. 864 more words

Devops

Preventing brute force attacks against SSH using fail2ban

Keeping secure configurations is obviously needed but using extra technologies and tools to prevent attacks like brute-forcing is much needed at present.

You may worry to monitor the server logs and take required action according to the logs by yourself. 1,355 more words

Devops