5 Easy Tweaks to increase your Linux Server's Security

  Рет қаралды 23,383

Learn Linux TV

Learn Linux TV

Күн бұрын

Пікірлер: 40
@nightmarenova6748
@nightmarenova6748 3 жыл бұрын
Great video Jay, i think this should be somewhat of a series if possible "Securing Linux servers 101"
@TheBlues1961
@TheBlues1961 3 жыл бұрын
Great video as always. It is amazing the amount of information you are able to deliver on the topics and surrounding the topics on such a clear manner. For the same reason, to me, the third edition of your book "mastering ubuntu server" is a master piece.
@camerontgore
@camerontgore 3 жыл бұрын
Love the security content! Keep it coming!
@cstephan7
@cstephan7 3 жыл бұрын
Back on track again :) Thanks for all that you do, Jay.
@unbekannter_Nutzer
@unbekannter_Nutzer 3 жыл бұрын
7:00 I doubt `sudo ls /etc` is a good command, to test, whether the sudo command works, since normally, you can do `ls /etc` without sudo with the same result. `sudo ls /etc/ssl/*` would be fine, which normally gives you a mixed output of files you are allowed to see and an error message for /etc/ssl/private. Imho it is a bad practice, to constantly clear the screen while teaching. I'm often still reading in the output or the last command. At 9:40 for instance, you clear the screen and talk until 10:15, without typing anything at the prompt. If you do a double enter when starting a new point, it is easy to follow and to find the breaks while being able to read commands and output and think about them.
@Bogomil76
@Bogomil76 3 жыл бұрын
18:05 Is „false“ right there? (Unattended-Upgrade::Remove-Unused_Dependencies)?
@d00dEEE
@d00dEEE 3 жыл бұрын
Hmm, good question! Does the setting above that (remove-NEW...) get rid of enough, or should they both be true? Seems to me they should both be true, but let's see what Jay says.
@sirsuse
@sirsuse 3 жыл бұрын
I have the same question. I decided to go ahead and change this to "true" because it makes sense, but I'm no expert.
@jkommisar
@jkommisar 3 жыл бұрын
So, but leaving the "False" Commented as before, It was true then...??.?.?.?
@FedecraftITALIA
@FedecraftITALIA 3 жыл бұрын
5 easy tweaks, 40 minutes long video 😵 JK, now I will watch it.
@jamiej.2365
@jamiej.2365 3 жыл бұрын
Good info. Thanks Jay!! If u get a chance i would love to see a video showing how to manually set up an open lightspeed server with wordpress and SSL config.
@grahammccann8554
@grahammccann8554 3 жыл бұрын
Hi Jay, Thank you for the video, very helpful.
@hoterychannel
@hoterychannel 3 жыл бұрын
if sudo still can be considered secure and more, recommended fo use? And if we going to use sudo, we can disable root account completely. or use “su” and have separate password (for root user)? Dont understand, if we can add our ip (or ip range) in ignoreip in fail2ban, why we cant just allow only that ips with firewall?
@Ranblv
@Ranblv 3 жыл бұрын
excellent video as always
@MrPDC-jr5yl
@MrPDC-jr5yl 3 жыл бұрын
Super video Jay. Is there an ansible playbook for this? :) Also, do you create a separate sudo user for ansible commands or same non-root user can be used? as well separate key for this without a pass?
@schriebfehler
@schriebfehler Жыл бұрын
Good questions. did you find your anwsers youre self? I was wondering the same
@chillpill7348
@chillpill7348 6 ай бұрын
Wonderful video as usual brother , thanks a lot for ur rfforts & work. I m ew to linux, request you to pleaase make such tweaks & security things for desktop distros too. I m on LinuxMint 21.3 Cinemon. Really appreciate u, thanks once again. TC.
@vordreller6428
@vordreller6428 3 жыл бұрын
Personally I'd advise against unattended upgrades. Don't want an upgrade to docker being installed on a live system, potentially restarting all containers. At the very least, specific packages should be put on hold when they're operation critical and cannot be restarted under normal circumstances.
@ziggyspaz
@ziggyspaz 3 жыл бұрын
This video is geared towards linux distros that use `apt`
@JeanPaulB
@JeanPaulB 2 жыл бұрын
Question: isn't the 'ignoreip' option in fail2ban irrelevant if we're using a public key to access the server?
@Max95Cohen
@Max95Cohen 3 жыл бұрын
Hi, Jay. What is the music on chapter changing?
@Bluelight82
@Bluelight82 3 жыл бұрын
Is this way of connecting to servers on by default if you install a Linux Mint server at home to connect to? I would prefer to only allow LAN connections.
@n.aminr.7175
@n.aminr.7175 Жыл бұрын
Can I enable VPN on my router to my server? Is this possible?
@ryanbell85
@ryanbell85 3 жыл бұрын
Can you prevent your SSH passphrase from being cached?
@MorphicStates
@MorphicStates 2 жыл бұрын
supersecure as a password? I like it. ;-)
@guilherme5094
@guilherme5094 3 жыл бұрын
Thanks Jay.
@lsdowdle
@lsdowdle 3 жыл бұрын
On RHEL/clones and Fedora, try update-crypto-policies. Really nice tool. It allows for easy, global cyrpto settings changes that previously would have required knowledge of every service and their particular crypto config syntax.
@SkyFly19853
@SkyFly19853 3 жыл бұрын
Thanks for this tutorial! Btw, can these tweaks be used for Linux Desktop environment?
@JeffreyHorn
@JeffreyHorn 3 жыл бұрын
Yep!
@SkyFly19853
@SkyFly19853 3 жыл бұрын
@@JeffreyHorn I see.
@kjakobsen
@kjakobsen 3 жыл бұрын
Just like your rant about using root as primary user. Please don't base 24hr service, on servers never having to reboot. HA means systems stadig up, even is services or servers needs downtime.
@mulletman1705
@mulletman1705 3 жыл бұрын
Rather pointless using a non root user with sudo privileges, root and non root sudo have the exact same privillage, it is completely pointless in terms of increasing security
@JeffreyHorn
@JeffreyHorn 3 жыл бұрын
I don’t believe this is true. Brute force attacks, both external and internal, target the root user. If I set my user to some arbitrary value, it is less likely to be discovered and battered.
@mulletman1705
@mulletman1705 3 жыл бұрын
@@JeffreyHorn for good security you should not be allowing people to brute force usernames and passwords to try gain access, security by obscurity is bad advice
@talktothehand1212
@talktothehand1212 3 жыл бұрын
@@mulletman1705 but this isn't security through obscurity? If more scrips target root than brute forcing, wouldn't disallowing root login just be security, since you're shutting out at least a plurality of threats?
@mulletman1705
@mulletman1705 3 жыл бұрын
@@talktothehand1212 no because your hoping by obscuring a username that the attacker will not be able to brute force access by guessing the username.
@talktothehand1212
@talktothehand1212 3 жыл бұрын
@@mulletman1705 like, I understand that a username and password shouldn't be treated as a line of defense, but I also don't see why using a non-root user is a bad practice. It's not going to make things more secure, but I don't see why you'd discourage the practice, especially on something you expect to be logging into at some point.
@olliefromsteam5219
@olliefromsteam5219 2 жыл бұрын
5 easy things - video is 40 min long
Boosting your Linux Server Security with CrowdSec
26:47
Learn Linux TV
Рет қаралды 19 М.
Linux Crash Course - Symbolic Links
30:07
Learn Linux TV
Рет қаралды 64 М.
小丑教训坏蛋 #小丑 #天使 #shorts
00:49
好人小丑
Рет қаралды 54 МЛН
“Don’t stop the chances.”
00:44
ISSEI / いっせい
Рет қаралды 62 МЛН
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН
How To Protect Your Linux Server From Hackers!
20:38
LiveOverflow
Рет қаралды 307 М.
Linux Crash Course - systemd: Using the systemctl command
26:32
Learn Linux TV
Рет қаралды 102 М.
Securing your Cloud Server with Fail2ban
40:53
Learn Linux TV
Рет қаралды 15 М.
10 Tips for Hardening your Linux Servers
22:48
Learn Linux TV
Рет қаралды 70 М.
Linux Crash Course - The /etc/fstab file
30:29
Learn Linux TV
Рет қаралды 110 М.
12 GREAT command line programs YOU recommended!
16:25
The Linux Experiment
Рет қаралды 300 М.
How to protect Linux from Hackers // My server security strategy!
30:39
Christian Lempa
Рет қаралды 231 М.
Systemd Explained: The Ultimate Deep Dive for Linux Users
47:41
Learn Linux TV
Рет қаралды 203 М.
小丑教训坏蛋 #小丑 #天使 #shorts
00:49
好人小丑
Рет қаралды 54 МЛН