Security Guides

Hardening, firewalls, SSH, 2FA, Anti-DDoS and security best practices.

Basic Linux hardening

Secure SSH configuration, fail2ban, automatic updates and non-root user setup.

6 minSSHfail2banLinux

Configure firewall with UFW

Basic UFW rules to protect your server: allow only necessary ports and block the rest.

4 minUFWFirewallPorts

Enable 2FA authentication on your account

How to enable two-step verification to protect your Baires Host account.

2 min2FASecurityAccount

Install SSL certificates with Let's Encrypt

Obtain and install free SSL certificates with Certbot for your domain on a VPS.

5 minSSLLet's EncryptCertbot

Protect your server against DDoS attacks

DDoS attack types, Baires Host Anti-DDoS protection, Cloudflare setup and Nginx rate limiting.

6 minDDoSAnti-DDoSCloudflare

Configure SSH key authentication

Generate ed25519 keys, copy to server, disable password auth and manage multiple keys.

4 minSSHKeysAuthentication

Advanced WordPress security

Security plugins, wp-admin protection, login attempt limits, file permissions and wp-config hardening.

6 minWordPressPluginsHardening

Configure VPN with WireGuard

WireGuard installation, key generation, server and client configuration, and multi-device connection.

7 minVPNWireGuardPrivacy

Scan your server for vulnerabilities

Lynis audit, Nmap port scanning, ClamAV antivirus and rkhunter rootkit detection.

5 minVulnerabilitiesLynisNmap

Secure MySQL/PostgreSQL databases

Bind to localhost, strong passwords, least privilege, encrypted connections and backup encryption.

5 minMySQLPostgreSQLDatabase

Configure HTTP security headers

Content-Security-Policy, X-Frame-Options, HSTS, Referrer-Policy and Nginx/Apache configuration.

5 minHeadersCSPHSTS

Monitor security logs

Analyzing auth.log, syslog, fail2ban, journalctl, logwatch and alerting on suspicious activity.

5 minLogsMonitoringAlerts

Security incident response

Detect compromises, isolate server, basic forensics, cleanup and post-incident hardening.

6 minIncidentsForensicsRecovery

Docker container security

Non-root containers, read-only filesystems, resource limits, network isolation and image scanning.

5 minDockerContainersIsolation

Encrypted and secure backups

Backups with restic, automated scripts, offsite storage, verification and the 3-2-1 rule.

5 minBackupsEncryptionrestic