> Nothing safe 100% but some tricks make you more secure:
1) update && upgrade the all packages on the server;
2) Install ufw - plain firewall;
3) close all server's ports besides SSH, HTTP(s) ports;
4) Install and config fail2ban utility. It helps to analyze the /var/log/auth.log and ban some IPs if they make some wrong activity;
5) change sshd config to accept the authorization only by private key.
🦑What if Your linux server is infected ?
your server is infected, and you need to know how to research and clean it.
> The best way - recreating the VPS.
> From their dashboard, it is possible to recreate (drop and create new) VPS with the same IP in one click.
> After that on local PC, was generated SSH keys with an ssh-keygen utility (is a part of standard OpenSSH package).
1) update && upgrade the all packages on the server;
2) Install ufw - plain firewall;
3) close all server's ports besides SSH, HTTP(s) ports;
4) Install and config fail2ban utility. It helps to analyze the /var/log/auth.log and ban some IPs if they make some wrong activity;
5) change sshd config to accept the authorization only by private key.
🦑What if Your linux server is infected ?
your server is infected, and you need to know how to research and clean it.
> The best way - recreating the VPS.
> From their dashboard, it is possible to recreate (drop and create new) VPS with the same IP in one click.
> After that on local PC, was generated SSH keys with an ssh-keygen utility (is a part of standard OpenSSH package).
No comments:
Post a Comment