939266168

Data and server protection from hackers

By running your own server, you may feel more secure against s. While cyber security requires constant vigilance, it can become an easy routine by knowing some useful procedures to protect your server from attacks.

 

In this article, we will look at some methods you can start applying for your server security, and to improve its protection as soon as possible.

Hide all information in your server software versions

If hackers can identify the software version your server is running, they can use this information to exploit any known bugs and security vulnerabilities in this version. You need to look for specific steps for this software, however some common software and services you want to check are:

Mail servers: Various mail servers can communicate their version to banners, which are sent after connecting via SMPT, IMAP and POP3, as a form of security handshake. It is known as grab attacks.

Web servers: Analyze your server's HTTP headers if you are using Apache, NGINX, Microsoft IIS, or anything else.

  • WordPress: You will check almost everything, including plugins, forms, galleries, themes and filenames, including CSS and JavaScript. Here are some good tips for securing your WordPress site.
  • SSH: OpenSSH communicates with the OS version by default.
  • Fillet servers: Your FTP, SFTP, WebDav, and other file servers could share their release information at login, before authentication.
  • Website languages: Frameworks for PHP, Java, .NET, and other web languages ​​can sometimes include HTTP headers with version information, such as "Powered by x".

Consider virtualizing the SQL environment

Virtualizing SQL Server was once considered too resource-intensive to be practical in day-to-day use, but times have changed as server hardware has grown significantly in power in recent years. Some good practices to remember are to always try to use SLAT compatible hardware and to monitor server performance using a tool performance tools such as SentryOne.

Install only the absolutely necessary software

If your server has a lot of services, add-ons and software, you have a fairly broad attack vector. Your server should contain the essentials, with only the most critical tools and software you need to install.

You should also make it a software dependency check, as this can lead to problems with installing additional software. You should try to get software with the lowest possible dependency level.

Protect yourself from brute force attacks

Instead of allowing password connections, consider SSH key authentication. However, there are advantages to using SSH keys, such as tools for breaking weak SSH key passwords to recover the SSH key. It is a much stronger form of security than regular passwords in many cases.

Other things you need to do is set limits on the authentication rate so that the automated one access and key control to slow down significantly and automatically block IP addresses with failed connection rate.

Additionally, you should close as many network ports as possible while filtering out those that cannot be blocked. Your firewall configuration should have a default blocking policy and you should filter open ports allowing only traffic with the actual expected origin (IP address, location, etc.);

Update your software regularly

Many breach attempts nowadays are either aided or abetted entirely by bot tools, which scan your network for critical access points. You can mitigate many potential risks by keeping your software up to date, not only with security code updates for your operating system, but also any packages and dependencies.

You should also check your server logs regularly for signs of problems, such as errors or strange events.

Conclusion

This is just a short list of immediate steps you can take to secure your server from hackers, but there are much more in-depth strategies you can take as you delve deeper into cyber security. If you're running a server at home, you might also want to consider protecting yourself from theft and identity.

 

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).