Category: Redhat Enterprise Linux 6

0

Password protecting an Apache directory

Apache is known for being fast, secure & extremely customization. We can modify apache as per our needs & requirements with its various modules & configurations. One such file that is used to modify configurations of the website is ‘.htaccess’ file. .htaccess .htaccess is short for hyper...

0

Creating a mail server with Postfix, Dovecot & Squirrelmail

One of the most widely used services around the world is EMail. Whether its any organization or individual, email is used by everyone. Anyone can create an Email account with ease on any of the email servers like gmail, outlook etc but for an organization, it...

0

Securing Apache web server with SSL Certificate

When accessing a website, user sends its request to server & server than responds to user with the requested data.  During this process data gets passed on from one computer to another until it reaches to its destination and data during transit can be intercepted leading to...

0

Comprehensive guide to creating an APACHE Web server

Apache web server is the most popular & widely used web server. It is open source software that is maintained by apache foundation & according to a data , it is being used on two-third (almost 67%) of total web servers to host websites. It is...

0

RHEL6 Installation and Security Bench Marking Recommendations – Part8

Configuring System Information and Warning Banners Presenting a warning message prior to the normal user login may assist the prosecution of trespassers on the computer system. Changing some of these login banners also has the side effect of hiding OS version information and other detailed system...

0

RHEL6 Installation and Security Bench Marking Recommendations – Part7

Configuring User Accounts and Environment This section provides guidance on setting up secure defaults for system and user accounts and their environment. Guidance for monitoring these settings and others that may change over time is provided in Section 10 System Maintenance.

0

RHEL6 Installation and Security Bench Marking Recommendations – Part5

Logging and Auditing The items in this section describe how to configure logging, log monitoring, and auditing, using tools included with RHEL6. It is recommended that rsyslog be used for logging (with logwatch providing summarization) and auditd be used for auditing (with aureport providing summarization) to...

Close
  Our next learning article is ready, subscribe it in your email

What is your Learning Goal for Next Six Months ? Talk to us