I'm writing this on the behalf of our remote administration team, Rackloop. We are a small group of friends working as a Freelancers in Server Security and Linux Server Administrator for past few years. We have been hosting companies and Data centers as a Technical Support Engineer / Team Leader. Our team includes experts with bachelor degree in Computer Science Engineering and MSc Computer Networking with RHCE certification. Currently, we have our techies working in India and UK providing remote support.
Let us give you a basic idea of what we do. A few among the many tasks that we perform are:
Installation, configuration and fine tuning of Apache, Exim, FTP, DNS, mySQL
Installation and configuration of PHP and Perl on the server.
Installation and configuration of extra PHP modules and plugins like IonCube loader, Zend Optimizer etc
Installation and configuration of additional WHM plugins like WHMXtra, RVSkin Manager and RVSite Builder etc
If your server is a target of DDOS attacks or Spam attacks (inbound and outbound) or Brute force attacks, and don't know how to tackle them, then I am the guy you are looking for.
These type of attacks mentioned above can easily cause the server load to rise to such an extend that it goes down. In general, a server once online remains online until there occur a network or hardware failure, or till the sys admin restarts it. If you find yourself submitting reboot tickets with the NOC every other day, then maybe you should harden the server. Here are the things I could help you with:
Installation, configuration and fine tuning of APF, BDF and CSF to prevent DDOS attacks
Install and configure PRM to check load spikes and kill unwanted processes automatically
Configure exim to trace spammers on your server
Create and install shell scripts that automatically delete unwanted mails from the mail queue every hour
Configure exim to reject mails from IPs that are listed in common RBLs. This could reduce a lot of incoming spam issues on the server
Install and configure Apache modules like mod_security, mod_throttle, mod_bandwidth and many more (whichever required) to stop Cross scripting attacks and Remote file inclusion attacks
Fine tuning of FTP and DNS servers
Has your server been hacked recently?? How did he get in? Is the server still vulnerable? Are you receiving abuse reports originating from your server? Well, I may help you with all these:
Tweak built-in Linux parameters to increase security
Search for vulnerable files and directories on the server
Search for common hacker installed shell scripts like c99 and r57
Search and find suspicious processes and ports open on the server
Install and run Rootkit hunters like chkrootkit, rkhunter etc to look for compromised binaries
Nowadays we could find so many websites affected with iframe scripts/codes. These are mainly caused due to the vulnerability in servers. I can clean all the injected iframe scripts from all files of your account using some custom scripts and also make the server more secure and stable :-)
We would be pleased to help you out with your server related issues.
If you have any ticketing system and would like me to support your clients, please let me know. I am also available to look after your helpdesk/ticketing systems :-)
You can contact me via email (firstname.lastname@example.org). Please let me know if you are interested.
Hope to hear from you soon.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide