Security, Upgrades & Backups

Security is one of the most important concerns that server administrators face. These guides will help you harden your system’s security, addressing topics that include configuring a firewall, creating and administering SSL certificates for transport layer security, offering secured SFTP user access to your Linode, and blocking malicious probes, among others.

How to Scan for Vulnerabilties with ClamAV

ClamAV lets you scan your system for malware while your Linode is running in rescue mode.

Visualize Server Security on CentOS 7 with an Elastic Stack and Wazuh

This guide shows how to use the Elastic Stack (Elasticsearch, Logstash, and Kibana) to collect, log, and visualize security data and threat alerts through Wazuh, part of OSSEC Intrusion Detection.

How to Set up tinc, a Peer-to-Peer VPN

This guide details how to set up tinc, an open-source, peer-to-peer VPN on your Linode.

How to use a YubiKey for Two-Factor Secure Shell Authentication

This guide shows you how to use a YubiKey for Two-Factor secure shell authentication - or make it the primary access method.

Getting Started with SELinux

This guide will walk you through the basics of installing and running SELinux.

Use Advanced OpenSSH Features to Harden Access to Your Linode

Tips to improve the security of your SSH server

Install OpenVAS 8 on Ubuntu 16.04

Install OpenVAS 8 to scan your system for vulnerabilities.

Use One-Time Passwords for Two-Factor Authentication with SSH on CentOS 7

Use OATH to enable two-factor authentication for SSH connections.

Use One-Time Passwords for Two-Factor Authentication with SSH on Ubuntu 16.04 and Debian 8

Use Google Authenticator to enable two-factor authentication for SSH connections.

How to Use LUKS for Full Disk Encryption on Linux

This tutorial will guide you through creating a secure, LUKS-encrypted Debian installation.

How to use a GPG key for SSH authentication

Generate a GPG key-pair, and convert it to an SSH key for authentication with your Linode.

Use Fail2ban to Secure Your Server

This guide shows how to set up Fail2Ban, a log-parsing application, to monitor system logs and detect automated attacks on your Linode.

Full Disk Encryption

Full Disk Encryption.

Linode Manager Security Controls

How to use two-factor authentication and other security controls in the Linode Manager.

How to Secure Your Server

This guide covers basic best practices for securing a production server, including setting up user accounts, configuring a firewall, securing SSH, and disabling unused network services.

Use Public Key Authentication with SSH

Access your Linode via SSH using Public Key Authentication.

Recovering from a System Compromise

Steps to take if your Linode becomes compromised by unauthorized parties.