Click here for "Safe Air Conditioner Repair and Proper Freon Recovery".(Japanese Version)

nuy

Debian12.1_en

Debian12 ;  Suricata , Logwatch , Chkrootkit , Disk Usage Check Script

Suricata SURICATA IDS/IPS is an open source IDS that monitors communications on the network and detects suspicious traffic. The basic mechanism is signature-based, so it can detect predefined unauthorized communications. Suricata is also characterized by its ability to provide protection as well as detection. Logwatch,Chkrootkit,Disk Usage Check Script install
Debian12.1_en

Debian12 ; Nagios Server , Tripwire Install

Open source integrated monitoring software "Nagios Server" installed Nagios is an open source monitoring solution running on Linux. Nagios is designed to periodically check critical network, application, or server parameters. These parameters include microprocessor load, number of running processes, log files, disk and memory usage, as well as many other services such as SMTP (Simple Mail Transfer Protocol), HTTP (Hypertext Transfer Protocol), POP3 (Post Office Protocol 3), etc. can be checked. These parameters require a microprocessor load, a database such as PHP or MySQL to run Nagois, and a web server such as Apache or Nginx. We will proceed under the assumption that all of these have already been configured
Debian12.1_en

Debian12 ; MariaDB , WordPress Install

1. MariaDB 1.1 Install 1.4. MariaDB Server Security Settings MariaDB comes with a default security script, mariadb-secure-installation, which can be used to improve the security of your MariaDB installation, including Set a password for the root account (if necessary). Disable remote root login to the database. Delete anonymous user accounts. Delete the test database to which anonymous users have access by default. 2.WordPress 2.1 Database Creation Create a database for Word Press (for example, in this case, the database name is "wp_db", the user name is "wp_user", and the password is "?Y123456y")
Debian12.1_en

Debian12 ; WEB Server(Apache) Install

Web server Apache2 installation Allow http:80 and https:443 ports in UFW before installation 3.  Apache2; Using Perl Scripts Enable CGI to make Perl scripts available ①Install Perl 4 Apache2 : Using PHP Scripts ①Install PHP 5. Virtual Host Settings Copy the default configuration file (file name is arbitrary, in this case vhost-yourdomain.conf as an example) and configure the virtual host 6. Digest authentication with Apache2 Since Basic Authentication, a well-known authentication authorization method for http, sends authentication information in plain text, there is a risk of ID and password leakage if the packet is intercepted. On the other hand, Digest Authentication encrypts and transmits authentication information, so there is almost no risk of information leakage.
Debian12.5_en

Debian12.5 ; NTP ,FTP Server Installation

1. Install a time synchronization service NTP server # apt -y install chrony # vi /etc/chrony/chrony.conf # Lines 20-23.:Comment the default settings and add the NTP server for your time zone. #pool ntp.ubuntu.com     iburst maxsources 4 #pool 0.ubuntu.pool.ntp.org iburst maxsources 1 #pool 1.ubuntu.pool.ntp.org iburst maxsources 1 #pool 2.ubuntu.pool.ntp.org iburst maxsources 2
AlmaLinux8.8_en

AlmaLinux8.8 ; SSH connection using public key cryptography

Create a key pair Create a public/private key pair for a user connecting to a Linux server using OpenSSH. Use ssh-keygen to create the key pair. The creation of a public/private key pair must be done as a user with remote login privileges. If you do not specify the destination and file name, id_ed25519 and id_ed25519.pub will be created in /home/(user name)/.ssh/. On the way, enter the password for the key.
Ubuntu 20.04 Building a server

Ubuntu Server 20.04 Initial setup

1. Set the root password and use the SU command In the default Ubuntu configuration, the root user is disabled because no password is set. By setting a password for the root user, the traditional [su] command can be used for transitions $ sudo passwd root [sudo] password for ← Current user's password Enter new UNIX password: ← Enter the root user password to be set Retype new UNIX password: ← Enter your password again passwd: password updated successfully Switch to root user $ su - Password: 2. Modernisation of the system
Ubuntu23.04_en

Ubuntu Server23.04 ; Initial setup after OS installation

1. Set root password and use SU command In the default configuration of Ubuntu, the root user is unavailable because no password has been set. By setting a password for the root user, transitions using the traditional [su] command will be possible. 3. Make locate command available The find command is often used to search for specific files throughout the Linux system, but find is somewhat confusing in terms of specifying options. The locate command can extract all files with a specified filename. 5. Network Settings 5.1 Host Name Settings This procedure is not necessary if you have already set the hostname at the time of Ubuntu installation and wish to use the hostname as it is. To change the hostname, use the "hostnamectl set-hostname" command. As an example, we set "ubuntu-10" as the hostname. 5.2 Set IP address to network interface If a fixed IP address was specified during Ubuntu installation, this section is not necessary. To change the IP address, change the " /etc/netplan/00-installer-config.yaml" file, and then restart the network interface (enp0s3 in this environment). The network interface name will change depending on the environment in which the setup was performed, so check the interface name first.
Ubuntu22.04_en

Ubuntu Server 22.04 : Initialization

1. Set root password and use SU command The root user is unavailable in the default Ubuntu configuration because no password is set. Setting a password for the root user allows transitions using the conventional [su] command. $ sudo passwd root [sudo] password for ← Current user's password Enter new UNIX password: ← Enter the root user password to be set Retype new UNIX password: ← Re-entry force
Ubuntu22.04_en

Ubuntu Server 22.04 : WEB Server(Apache)

Apache2 installation. Allow http:80 port and https:443 port in UFW first. # ufw allow http # ufw allow https # ufw reload 1 Install Apache2 # apt -y install apache2 2 Apache2 Basic Settings
AlmaLinux8.8_en

AlmaLinux8.8 ; Snort3+Snortsnarf , Chkrootkit Install

Snort3+Snortsnarf Install Implement Snort, a network-based IDS, in the unauthorized access detection system. SnortSnarf will also be installed to enable the unauthorized access logs extracted by Snort to be checked on a Web browser. AlmaLinux8 does not have a Snort3 repository, so build, compile and install Snort3 from source code Advance preparation ①Install required build tools and libraries Install the EPEL repository and enable the Powertools repository. chkrootkit ①Download and install chkrootkit # cd /usr/local/src # wget ftp://ftp.chkrootkit.org/pub/seg/pac/chkrootkit.tar.gz # tar xvf chkrootkit.tar.gz ➁Create /root/bin directory and move chkrootkit command to that directory # mkdir -p /root/bin # mv chkrootkit-0.58b/chkrootkit /root/bin ➂Check chkrootkit.
Rocly Linux8.8_en

RockyLinux8.8 ; Snort3+Snortsnarf , Chkrootkit Install

Snort3+Snortsnarf Install Implement Snort, a network-based IDS, in the unauthorized access detection system. SnortSnarf will also be installed to enable the unauthorized access logs extracted by Snort to be checked on a Web browser. RockyLinux8 does not have a Snort3 repository, so build, compile and install Snort3 from source code Advance preparation ①Install required build tools and libraries Install the EPEL repository and enable the Powertools repository. chkrootkit ①Download and install chkrootkit # cd /usr/local/src # wget ftp://ftp.chkrootkit.org/pub/seg/pac/chkrootkit.tar.gz # tar xvf chkrootkit.tar.gz ➁Create /root/bin directory and move chkrootkit command to that directory # mkdir -p /root/bin # mv chkrootkit-0.58b/chkrootkit /root/bin ➂Check chkrootkit.
CentOS9_en

CentOS Stream9 ; Initial settings after installation

1.Disabling SELinux First, disable selinux. selinux is a fea...
OracleLinux9.1-en

OracleLinux9.1 : Initial settings after OS installation

1.Install bash completion extension package # dnf -y install bash-completion # reboot 2.Disabling SELinux First, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it can limit the behavior of services and the contents of the configuration considerably. Therefore, it is basically a case of invalidation in many cases. SELinux operating modes Enforcing : SELinux functionality is enabled and access control is enabled Permissive : SElinux will warn, but no access restrictions will be placed disabled : Both SElinux function and access control are disabled
OracleLinux9.2-en

OracleLinux9.2 ; Initial settings after OS installation

1.Install bash completion extension package # dnf -y install bash-completion # reboot 2.Disabling SELinux First, disable selinux. selinux is a feature that improves auditing and security in Linux, but when enabled, it can limit the behavior of services and the contents of the configuration considerably. Therefore, it is basically a case of invalidation in many cases. SELinux operating modes Enforcing : SELinux functionality is enabled and access control is enabled Permissive : SElinux will warn, but no access restrictions will be placed disabled : Both SElinux function and access control are disabled