WordPress Security Keys

Using strong security keys is an important part of securing WordPress against external attack. WordPress security Keys refer to four authentication keys and four hashing salts (random bits of data) that work to add an extra layer of security to your cookies and password. The security keys are defined in your WordPress configuration file aka… Read more »

Hardening SSHD for Security

The secure shell daemon should be hardened to prevent unauthorised access before being put into a production environment or exposed to the internet. 1. Verify the /etc/ssh/sshd_config file contains the following lines and that they are not commented out: Protocol 2 IgnoreRhosts yes HostbasedAuthentication no PermitRootLogin no PermitEmptyPasswords no AllowTcpForwarding no (unless needed) X11 Forwarding… Read more »

How to disable root SSH logins

How to disable root SSH logins One of the biggest security holes you could open on your Linux server is to allow directly logging in as root through ssh, because any cracker can attempt to brute force your root password and potentially get access to your system. It’s much better to have separate account that… Read more »

Remove Protection Against Accidental Organizational Unit Deletion

Open “Active Directory Users and Computers” Click “View” and then click “Advanced Features” Right click the OU and click “Properties” In the OU properties, Click on the “Security” tab and then click “Advanced” In “Permission Entries”, select the “Deny” entry for “Everyone” group, and click “Remove” Click “OK” to the close the “Advanced Security Settings”,… Read more »