Low risk Linux IP blocking

Posted on January 3rd, 2009

When a brute force scanner is trying to push its way in to your server you need to firewall the offending IP. The offending server attacking you maybe more powerful than you think, leading to your server to become stressed due to the high number of connections continuing to try connecting to your server after […]



Securing user command line logging.

Posted on January 3rd, 2009

Keeping logs of user activity is sometimes important. Here is a method of locking down ways of escaping from command line logging in bash. This can be done in a few simple steps as followed: add the following to the bottom of your /etc/profile script. readonly HISTFILE next you need to remove the suid bit […]