• About PinoyLinux
    • PinoyLinux.org
    • Documentation
    • Support
    • Feedback
Skip to content
PinoyLinux
Menu
  • HOME
  • EBOOKS
  • TOPICS+
    • Artificial Intelligence
    • Containers
    • Desktop
    • DevOps
    • Linux Kernel
    • Mobile
    • Network Administration
    • Programing
    • Privacy and Security
    • Servers
    • Storage
    • System Adminstration
Menu

Category: Privacy and Security

How To Install FREE SSL (Let’s Encrypt) With Apache2.4 On CentOS7

Posted on August 24, 2023

This article explains how to install free ssl certificate (Let’s Encrypt) under CentOS and running on Apache Web Server. All other command outputs or results were excluded to simplify the process and…

Security Alert: Privilege Escalation Vulnerability Impacts Over 10,000 Charitable WordPress Sites

Posted on August 22, 2023

Privilege Escalation vulnerability was identified on August 10, 2023 by Wordfence Threat Intelligence team in the Donation Forms by Charitable plugin, which is actively deployed across more than 10,000 WordPress websites. This…

Securing a Fresh CentOS 7 Server

Posted on February 13, 2019

Strengthening Security on CentOS 7: Building a Resilient Digital Fortress A fresh CentOS 7 installation provides a clean slate, a canvas on which you can paint a robust fortress of security. In…

The Beginner’s Guide to iptables, the Linux Firewall

Posted on February 22, 2017

A firewall is a system that provides network security by filtering incoming and outgoing network traffic based on a set of user-defined rules.

Enhancing Security through Auditd

Posted on February 21, 2017

If you are running a mission critical web server, or maintaining a storage server loaded with sensitive data, you probably want to closely monitor file access activities within the server. For example, you want to track any unauthorized change in system configuration files such as /etc/passwd.

Harden Ubuntu Server Security

Posted on February 21, 2017

This guide is intended as a relatively easy  guide to harden the security on an Ubuntu Server. Although it is not recommended to follow everything in this article, as it is always…

10 Useful Sudoers Configurations for Setting ‘sudo’ in Linux

Posted on February 14, 2017

A system administrator who assumes the role of the root user can permit other normal system users with the help of sudo command and a few configurations to run some commands as well as carry out a number of vital system operations including the ones mentioned above.

Alternatively, the system administrator can share the root user password (which is not a recommended method) so that normal system users have access to the root user account via su command.

Breaking News

  • New 'Mirrored' Network Mode Introduced in Windows Subsystem for Linux
  • Linux Threat Report: Earth Lusca Deploys Novel SprySOCKS Backdoor in Attacks on Government Entities
  • Linux Kernel Faces Reduction in Long-Term Support Due to Maintenance Challenges
  • Linux Celebrates 32 Years with the Release of 6.6-rc2 Version
  • Introducing Bavarder: A User-Friendly Linux Desktop App for Quick ChatGPT Interaction

Site Stats

  • 1
  • 1
  • 38
  • 216
  • 19,174
©2023 PinoyLinux | All Rights Reserved
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}