{"id":1108,"date":"2012-11-01T10:30:28","date_gmt":"2012-11-01T10:30:28","guid":{"rendered":"http:\/\/kb.esds.co.in\/?p=1108"},"modified":"2018-02-21T04:51:58","modified_gmt":"2018-02-21T04:51:58","slug":"a-basic-safety-guide-on-securing-linux-servers","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/","title":{"rendered":"A Basic Safety Guide On Securing Linux Servers"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-1109\" title=\"Linux_Security\" src=\"https:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2012\/11\/Linux_Security.jpg\" alt=\"\" width=\"675\" height=\"195\" \/>The Linux system offers its users great usability advantages, all those who have used it say so, but one of the main sights with those who do not know about the system is the assurance on <strong>Linux Servers<\/strong>, ie which are those aspects for which Linux is considered as a safe and reliable system. In this article we will try to point out what are the key elements of this concept.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/#Advantages_of_Linux_Dedicated_Servers\" >Advantages of Linux Dedicated Servers<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/#How_can_it_be_done_on_Linux_Servers\" >How can it be done on Linux Servers?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/#Formerly_called_IP_chains_used_another_option_but_now_this_is_already_obsolete\" >Formerly called IP chains used another option, but now this is already obsolete.<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Advantages_of_Linux_Dedicated_Servers\"><\/span><strong>Advantages of Linux Dedicated Servers<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Undoubtedly there are great advantages in securing <strong>Linux servers<\/strong>, the main one is that the vast majority of computer attacks that are made, are targeted at servers and desktops that are based on Windows, ie There are a variety of risks that were created with the purpose of attacking that particular system.<\/p>\n<p>Another advantage with the counting system to Linux on Windows system is that the latter is not administered in the most optimal user privileges, so that a <strong>Windows server<\/strong> can be made much more reliable, however carrying out this work involves doing a lot of work and yet there is very little information for Windows administrators that can be carried out.<\/p>\n<p>This happened because it was not expected that <strong>Windows servers<\/strong> may suffer some kind of problem, however the real problem arose when servers suffered some drawbacks, in this case the usual treatment is to recover files and reinstall.<\/p>\n<p>As you can see this is united with the main advantages of Linux, besides this, Linux server has almost no viruses like Trojans and worms, or any other that can really affect, however this does not mean that this type of virus cannot exist, so we should always take the necessary preventive measures.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_can_it_be_done_on_Linux_Servers\"><\/span><strong>How can it be done on Linux Servers?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The design of the <strong>Linux servers<\/strong> within their modules have one kernel that is known as the NetFilter, this module allows you to manage both access and connections to TCP \/ IP, so you can say, through the Kernel, that is something that should not be done in some cases, almost always ends with designing a Netfilter Firewall, this will come across a tool called IP tables that exists since version 2.4 of the Linux Kernel.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Formerly_called_IP_chains_used_another_option_but_now_this_is_already_obsolete\"><\/span><strong>Formerly called IP chains used another option, but now this is already obsolete.<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The best thing you can do to make a <strong>Linux Server<\/strong> basic, is to close all ports of TCP \/ IP, then you may need to open only; servers, as the name implies, provide users with specific tasks, it is recommended for protecting the system, close everything and provide access to the outside, only those services you want to offer to the world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Linux system offers its users great usability advantages, all those who have used it say so, but one of the main sights with those who do not know about the system is the assurance on Linux Servers, ie which are those aspects for which Linux is considered as a safe and reliable system. In&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[69],"tags":[141,511,512,792],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.9.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Basic Safety Guide On Securing Linux Servers | Server Security<\/title>\n<meta name=\"description\" content=\"This KB Includes Safety Guide On Linux Servers Security And Also Speak About Advantages Of Linux Servers, What Things Can Be Done With Linux Server and etc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Basic Safety Guide On Securing Linux Servers | Server Security\" \/>\n<meta property=\"og:description\" content=\"This KB Includes Safety Guide On Linux Servers Security And Also Speak About Advantages Of Linux Servers, What Things Can Be Done With Linux Server and etc.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"ESDS Official Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESDSdc\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-11-01T10:30:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-02-21T04:51:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2012\/11\/Linux_Security.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ESDSDataCenter\" \/>\n<meta name=\"twitter:site\" content=\"@ESDSDataCenter\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"2 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#website\",\"url\":\"https:\/\/www.esds.co.in\/kb\/\",\"name\":\"ESDS Official Knowledgebase\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.esds.co.in\/kb\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2012\/11\/Linux_Security.jpg\",\"width\":\"711\",\"height\":\"244\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/#webpage\",\"url\":\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/\",\"name\":\"A Basic Safety Guide On Securing Linux Servers | Server Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/#primaryimage\"},\"datePublished\":\"2012-11-01T10:30:28+00:00\",\"dateModified\":\"2018-02-21T04:51:58+00:00\",\"author\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/#\/schema\/person\/d951a1b6843822458f3c5f5ee02a74e8\"},\"description\":\"This KB Includes Safety Guide On Linux Servers Security And Also Speak About Advantages Of Linux Servers, What Things Can Be Done With Linux Server and etc.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/\",\"url\":\"https:\/\/www.esds.co.in\/kb\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/\",\"url\":\"https:\/\/www.esds.co.in\/kb\/a-basic-safety-guide-on-securing-linux-servers\/\",\"name\":\"A Basic Safety Guide On Securing Linux Servers\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#\/schema\/person\/d951a1b6843822458f3c5f5ee02a74e8\",\"name\":\"ESDS ADMIN\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5618393df3c15e5b6b3b9ef917e83827?s=96&d=mm&r=g\",\"caption\":\"ESDS ADMIN\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/1108"}],"collection":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/comments?post=1108"}],"version-history":[{"count":8,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/1108\/revisions"}],"predecessor-version":[{"id":3531,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/1108\/revisions\/3531"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/media?parent=1108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/categories?post=1108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/tags?post=1108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}