Category Archives: CentOS

Mounting folders through SSH
avatar

One of the first rules of security is to not have any ports open which you do not need to have open.  That is also pretty common sense.  One problem you run into though is you still need to access … Continue reading

Posted in Arch, CentOS, Fedora, Guides, Linux | Tagged , , , , | Leave a comment

Setting a Lock-out Policy
avatar

Setting a lock out policy in CentOS or Fedora is very easy. edit /etc/pam.d/system-auth auth required pam_tally.so onerr=fail no_magic_root account required pam_tally.so deny=3 unlock_time=3600 no_magic_root reset onerr=fail if there is a problem opening the file for some reason fail login no_magic_root … Continue reading

Posted in CentOS, Fedora, Linux | Tagged , | Leave a comment

Configuring iptables
avatar

In Linux the most basic way of protecting you machine is with iptables.  Iptables is a firewall that comes preinstalled and configured on MOST Linux distros.  I say most because Arch does not preinstall it since that would conflict with their bare-bones … Continue reading

Posted in CentOS, Fedora, Linux | Tagged , , | Leave a comment

Change Password Complexity Requirements
avatar

There are no password requirements by default in CentOS and Fedora, however it is very simple to add them. edit /etc/pam.d/system-auth change the line which says: password requisite pam_cracklib.so try_first_pass retry=3 to password requisite pam_cracklib.so try_first_pass retry=3 minlen=8 ucredit=2 dcredit=3 ocredit=-1 … Continue reading

Posted in CentOS, Fedora, Linux | Tagged , | Leave a comment

Change Password Encryption
avatar

The default password encryption on CentOS or Fedora is pretty weak.  If your shadow file were to be compromised it would not take long to get your passwords.  The command below will allow you to change your encryption to be … Continue reading

Posted in CentOS, Fedora, Linux | Tagged , , | Leave a comment