LowEndBox - Cheap VPS, Hosting and Dedicated Server Deals

RHEL 9 Goes Beta

Now that (hopefully?) the CentOS Stream debacle and the subsequent rise of Alma and Rocky Linux is behind us, there's news from RedHat that RHEL 9 has gone beta.  Is this the love child that will finally heal the warring RPM tribes? No, but what you're looking at here is the future Alma and Rocky Linux, once this goes GA.  Or the future RHEL if you prefer to run that under the free 16-system license. Looking at the releas...

Read More
RHEL 9 Goes Beta

Locking Down Access to Your VPS

There are a number of ways you can restrict access to your VPS. Passwords (specifically, good passwords) is the most basic method. Restricting access to ssh keys only is better. You can use Google Aut...

Read More
Locking Down Access to Your VPS

How to Audit Every Command Run on Your Linux System

Periodically I've had auditors come to me and say "can you tell me what this user on this system did between such-and-such dates/times" and my answer is usually no. By default, Linux systems don't log...

Read More
How to Audit Every  Command Run on Your Linux System

The Syniverse Hack: Why Using SMS for 2FA is a Bad Idea

Security gurus have suggested for years that relying on SMS for two-factor authentication is a bad idea.   Reasons include Your phone may be stolen Many people allow SMS messages to be displayed on lo...

Read More
The Syniverse Hack: Why Using SMS for 2FA is a Bad Idea

Microsoft Says Passwords are Passé

Are passwords a dying breed? In a blog post published September 15, Microsoft Vice President of Security, Compliance, and Identity Vasu Jakkal entitled "The passwordless future is here for your Micros...

Read More
Microsoft Says Passwords are Passé

Easy Operating System Detection with nmap

Recently I was doing some discovery at work of some systems we inherited.  I didn't yet have access but wanted to determine what type of OS was involved so I could coordinate with the proper teams. Yo...

Read More
Easy Operating System Detection with nmap

T-Mobile Leaks Almost 50 Million People's SSNs and Driver's Licenses

T-Mobile announced on Wednesday that a "a bad actor had compromised T-Mobile systems": "Some of the data accessed did include customers’ first and last names, date of birth, SSN, and driver’s license/...

Read More
T-Mobile Leaks Almost 50 Million People's SSNs and Driver's Licenses

Report Reveals cPanel/WHM Suffers "Multiple Vulnerabilities"

Security research firm Fortbridge has released a report claiming to have discovered "multiple vulnerabilities in cPanel/WHM". The report states: "Our team has found multiple vulnerabilities in cPanel/...

Read More
Report Reveals cPanel/WHM Suffers

Get Notified via Email Whenever Someone Logs In To Your VPS

In this tutorial we'll show you how to configure your VPS so that every time someone logs in, you receive an email alerting you to this fact. This is kind of a "lowend intrusion detection system" thou...

Read More
Get Notified via Email Whenever Someone Logs In To Your VPS

Comment Free For All: Hacking in the Movies

I once watched an episode of Law & Order with a friend who is an attorney. From the moment the action switched from the police to the prosecutors, he was tied up in knots, shouting at the screen a...

Read More
Comment Free For All: Hacking in the Movies

How to Stiff-Arm Brutes and Protect Your Server with Fail2Ban

Bruce force attacks are attempts to guess common passwords by repeatedly trying to login to your server.  SSH is the most common target but FTP, IMAP, POP3, and other password-based systems can be tar...

Read More
How to Stiff-Arm Brutes and Protect Your Server with Fail2Ban

Insurers Tire of Paying Ransom to Cyber Crooks

Loss ratios in the cyber insurance world have skyrocketed in recent years - surging 400% year over year.  They have hit 70% of paid premiums, which some industry commentators are saying is unsustainab...

Read More
Insurers Tire of Paying Ransom to Cyber Crooks

Beware Black Hat Cookie Stuffing Affiliate Marketing

Hey, you just browsed my site And this is a crazy Here's a cookie you didn't ask for So make me some money maybe! -- Cookie Monster, Share It Maybe (sort of) In the LowEnd hosting world, many provider...

Read More
Beware Black Hat Cookie Stuffing Affiliate Marketing

Seven Years in the Making: Interview with Jordan Smith of BillingServ

Our interview series has featured a lot of industry leaders and we continue today by talking with Jordan Smith, founder and director of BillingServ.  He's also known as @Jord on LowEndTalk where he is...

Read More
Seven Years in the Making: Interview with Jordan Smith of BillingServ

Guide to Understanding File Permissions in Linux

Since very early in its history, Unix systems have supported file and directory permissions. This security mechanism allow users to make their files private from other users, and for administrators to...

Read More
Guide to Understanding File Permissions in Linux

STU Telecom is Launching an IP Reputation Service

Stuart Elvish from STU Telecom reached out to us to tell us a little about a new IP reputation service they're rolling out.  They submitted a nice writeup and invitation to LEB members to try out the...

Read More
STU Telecom is Launching an IP Reputation Service

Patch Your Exim Installs: "21 Nails" Vulnerability

Thanks to LowEndTalk administrator emeritus @jar for alerting the community to a range of exim vulnerabilities published by Qualys.  There is a family of both local and remote vulnerabilities. tl;dr:...

Read More
Patch Your Exim Installs:

DigitalOcean Customer Billing Data Exposed in Security Breach

DigitalOcean (DOCN) acknowledged today that it has informed some customers that DO had “confirmed an unauthorized exposure of details associated with the billing profile on your DigitalOcean account.”...

Read More
DigitalOcean Customer Billing Data Exposed in Security Breach

A Group of Friends Making One of the World's Most Popular Panels: Interview with DirectAdmin's Co-Owner, Martynas Bendorius

Our interview series has featured some of the true titans of the hosting industry.  We're very excited to interview Martynas Bendorius, one of the owners of DirectAdmin.  As one of the most popular an...

Read More
A Group of Friends Making One of the World's Most Popular Panels: Interview with DirectAdmin's Co-Owner, Martynas Bendorius

Automating mysql_secure_installation in MariaDB Setup

Lots of people want to automate their system setup, and this is frequently done by either using the provider's new VM hooks to run a script at setup time or later using something like Ansible. If you...

Read More
Automating mysql_secure_installation in MariaDB Setup

Running Your Own OpenVPN VPN Server

Setting up your own OpenVPN VPN on both server and client is very easy to do.  In this tutorial, we'll walk through setting up an OpenVPN server on a VPS you own, and then configuring Windows and macO...

Read More
Running Your Own OpenVPN VPN Server

Vulnerability in Debian 10 SolusVM Templates - You Need to Take Action

SolusVM is a popular virtualization management solution used by many VPS providers.  It's a familiar control panel for end users, who use it to setup their VPSes.  Most providers offer templates, whic...

Read More
Vulnerability in Debian 10 SolusVM Templates - You Need to Take Action

Huge sudo Security Issue - Update Your Systems Now!

News broke today of a new security vulnerability in sudo, a widely used Linux/BSD/Unix utility that allows regular users to execute commands with elevated privileges. Typically, a user may need elevat...

Read More
Huge sudo Security Issue - Update Your Systems Now!

How to Keep Your Wordpress Site Secure

This article was contributed by Dustin B. Cisneros of RackNerd - LowEndBox appreciates your contribution as always! Be sure to check out RackNerd’s latest LowEndBox specials if you are looking for a K...

Read More
How to Keep Your Wordpress Site Secure

LowEndProtection: Homemade Raspberry Pi Security Cloud Camera Setup

If you are looking to setup some professional security cameras in your home and put the content in the cloud for remote storage/access, I would recommend looking at the wide range of solutions in the...

Read More
LowEndProtection: Homemade Raspberry Pi Security Cloud Camera Setup

Shields Up! Protecting Your Wordpress Site with Wordfence

Server and application security are important factors to consider when running a website -- especially a website based on Wordpress. This easy to use guide will help take you through the steps of ensu...

Read More
Shields Up! Protecting Your Wordpress Site with Wordfence

Increasing Security on Your Linux VPS

The internet is the source of income for millions of people, and it could be considered one of the best creations of technology. However, with time, the internet has become vulnerable to security thre...

Read More
Increasing Security on Your Linux VPS

Generating and Using SSH Keys, Part 3

In previous tutorials in this series, we went over generating SSH keys and how to use them.  We'll wrap up the series by showing you how to turn off password authentication on your server. Why Configu...

Read More
Generating and Using SSH Keys, Part 3
« Newer PostsOlder Posts »

Latest LowEndTalk Hosting Offers

View More