02Geek HTML5 and JavaScript, TypeScript, React, Flash, ActionScript online School
Previous VideoPrevious Video

Securing a Linux Server Intro

In our last few lessons we talked about permissions and users. At this stage you need to have a user and we are assuming you created one as well. The next few lessons we will install configure and protect our server against common attacks and improve the default security configurations of linux.

Securing a Linux Server Intro

The next few lessons we will install configure and protect our server against common attacks and improve the default security configurations of linux.

00:49

Sudo instead of using the root user

Before we do anything else we need to meet the sudo command. We talked about the importance of not using the root user and as such from now on we won't use that user. To access the rights of that user

04:32

Installing packages using the yum command

In this session we will see how we add a new package into our server using the yum command.

07:33

Securing our User from Attacks with Public and Private Keys

The idea behind public and private keys is removing the need for passwords. It automates the process of logging in but more then that it makes it literally impossible to hack.

01:29

Creating Public/Private Keys on a Mac

In this lesson we create a public private key that will be used to protect our access to our server. Our first step will be to create a new private/public key using the mac terminal

06:42

Protecting your Keys on your Mac

What we want to do is change the access level of the file itself to validate no one but you can access it.

02:08

Creating Public and Private Keys on Windows

We are back to the toolset of Putty and this time we are creating a key using the Putty Key generator (PuTTYgen). Follow the steps in our video to create your new public and private keys.

08:22

Connecting our Key in our Server User

It's time for us to connect this new key pair with our server so it can be used as the main way we validate the user and to log in.

15:23

Creating a Secure Password free login

Now that we validated our key works we are ready to disable the password and enable logins only via a public and private key.

02:57

5 Security tips you want to enforce

This is my 5 tips to help protect your server from attacks.

13:59

How to SSH with a non standard port

How to SSH with a non standard port. We will see how this is done both on windows and mac.

06:17

How to prevent brute force attacks

In this session we will talk about how you can avoid brute force attacks and keep your server fast and secure.

10:42

Wrapping up Our Talk about Security

Wrapping up Our Talk about Security

00:22

Bonus - Understanding YUM repos

We are about two hours into our server configurations but before we move into the next topic that will involve installing many applications using the YUM repo.

03:17

Update Packages to be more secure

We talk about keeping our server up to date using the yum command.

03:15