Category: Security

  • How to protect your CentOS server from the Shellshock exploit

    How to protect your CentOS server from the Shellshock exploit

    Shellshock is quite a serious security hole found a couple of days ago in Bash; to check whether your CentOS server is vulnerable run the following in a terminal: env VAR='() { :;}; echo Shellshock vulnerable!’ bash -c “echo Bash Testing” If your system is vulnerable, you will see: Shellshock vulnerable! Bash testing If it…

  • How to protect Debian from the Shellshock exploit

    Shellshock is quite a serious security hole found a couple of days ago in Bash; to check whether your Debian server is vulnerable run the following in a terminal: env VAR='() { :;}; echo Shellshock vulnerable!‘ bash -c “echo Bash Testing” If your system is vulnerable, you will see: Shellshock vulnerable! Bash testing If it…

  • How to protect Ubuntu against the Shellshock exploit

    How to protect Ubuntu against the Shellshock exploit

    Shellshock is quite a serious security hole found a couple of days ago in Bash; to check whether your Ubuntu server is vulnerable run the following in a terminal:   env VAR='() { :;}; echo Shellshock vulnerable!‘ bash -c “echo Bash Testing”   If your system is vulnerable, you will see:   Shellshock vulnerable! Bash…

  • Ubuntu: Securing your remote SSH logins with Denyhosts

    Ubuntu: Securing your remote SSH logins with Denyhosts

    Being able to log in to your server remotely via SSH is an incredibly powerful way of remotely managing your system. With so many devices now able to support consoles (just about any current smartphone or current OS, really) you can check on things, update or make changes from just about anywhere.   One of…