Skip to content
TechSch
  • Blog
  • Reviews
  • Tutorials

Security

Security best practices together with firewall to secure servers and web applications.

Set Up SFTP Chroot Jail using OpenSSH

Set Up SFTP Chroot Jail using OpenSSH

Posted by By Mike Goh July 29, 2022Posted inDevelopers Technical TutorialsTags: Command Line, SecurityNo Comments
Introduction You may want to use one of your existing servers as a SFTP server without subscribing to another EC2 instance. Or you would like to have multiple SFTP users/vendors on a single SFTP server to save on resources and…
Read More
VeraCrypt Drive Encryption to Protect Data

VeraCrypt Drive Encryption to Protect Data

Posted by By Mike Goh June 15, 2020Posted inSoftware and Web Services ReviewsTags: Security, SoftwareNo Comments
Introduction TrueCrypt is the first on-the-fly encryption (OTFE) that I used and when it got discontinued, I switched to VeraCrypt. Similar to TrueCrypt, VeraCrypt is a small encryption software that is used for OTFE and is a fork of the…
Read More
Set Up DKIM, SPF and Reverse DNS to Improve Mail Deliverability

Set Up DKIM, SPF and Reverse DNS to Improve Mail Deliverability

Posted by By Mike Goh May 14, 2020Posted inDevelopers Technical TutorialsTags: Email, SecurityNo Comments
Introduction DomainKeys Identified Mail (DKIM) is a protocol that contributes to DMARC compliance and requests the sender origin to take responsibility for sent messages that can be verified by mailbox providers. Essentially, it enables the outbound domain to digitally sign…
Read More
How to Merge Server-side and Docker iptables Firewall Rules

How to Merge Server-side and Docker iptables Firewall Rules

Posted by By Mike Goh April 30, 2020Posted inDevelopers Technical TutorialsTags: Docker, SecurityNo Comments
Introduction Docker is widely used to place applications in containers. One of the reasons why Docker is so popular is because of security thanks to its isolation capabilities. For example, it allows you to isolate applications from each other. Installing…
Read More
How to Resolve iptables: No chain/target/match by that name

How to Resolve iptables: No chain/target/match by that name

Posted by By Mike Goh April 24, 2020Posted inDevelopers Technical TutorialsTags: Command Line, SecurityNo Comments
Introduction If you encounter such error, it means that the CONFIG_NETFILTER module was not complied in your kernel. All VPS (virtual private server) that I owned from DigitalOcean, AWS, Google Cloud and other lesser-known host providers have it by default…
Read More
Change Port and Disallow Root Login to Secure SSH Server

Change Port and Disallow Root Login to Secure SSH Server

Posted by By Mike Goh April 24, 2020Posted inDevelopers Technical TutorialsTags: Security, ServersNo Comments
When you subscribe to a Linux VPS (Virtual Private Server) from any host providers, the default firewall rule is to accept all incoming connections to any ports hence you can connect via Port 22 using a SSH telnet client like…
Read More
How to Secure Server with Firewall using iptables

How to Secure Server with Firewall using iptables

Posted by By Mike Goh April 23, 2020Posted inDevelopers Technical TutorialsTags: Security, ServersNo Comments
iptables is a command-line firewall utility that allows a system administrator to configure the IP packet filter rules made possible by the Netfilter modules complied into the Linux Kernel. The rules are kept to a bare minimum on the firewall…
Read More
What is Clickjacking and How to Prevent It

What is Clickjacking and How to Prevent It

Posted by By Mike Goh April 18, 2020Posted inDevelopers Technical TutorialsTags: NGINX, SecurityNo Comments
Clickjacking, according to Wikipedia, is a malicious technique of tricking a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly…
Read More
Learned a New Word Today – ‘Clickjacking’

Learned a New Word Today – ‘Clickjacking’

Posted by By Mike Goh April 17, 2020Posted inDaily Rants and Excitement BlogTags: SecurityNo Comments
Recently, I received an email from my supervisor asking me to do an assessment on a bug. The whole story unfolded as I scrolled down the email conversation. It was a web security vulnerability actually and it was originally reported…
Read More
Trending
  • How to Resolve iptables: No chain/target/match by that name
  • Asus Router Setup – Wifi Settings
  • Create Helpdesk Ticketing System with Google Apps Script
  • Host Multiple Websites with jwilder nginx-proxy and letsencrypt-companion
Tags
Backup Cloud Coding Command Line DevOps Docker Domain DNS Email Family Fun Network NGINX Security Servers Software Web WordPress
  • About
  • Contact
  • Terms & Privacy
Copyright 2023 © Techsch.com. All rights reserved. Sinatra theme. Flaticon icons.
Scroll to Top