
{"id":1453,"date":"2010-05-30T00:00:00","date_gmt":"2010-05-30T00:00:00","guid":{"rendered":"http:\/\/otava.test\/operating-system-security-essentials\/"},"modified":"2010-05-30T00:00:00","modified_gmt":"2010-05-30T00:00:00","slug":"operating-system-security-essentials","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/","title":{"rendered":"Operating System Security Essentials"},"content":{"rendered":"<p>While searching for various server security methods during one of my many journeys through cyberspace I stumbled upon a very interesting document titled LAME\u00a0 or \u201cLinux Administration Made Easy.\u201d<\/p>\n<p>The function of this document is to provide you with an easy guide that describes the day-to-day administration tasks and common maintenance issues facing a system administrator.<\/p>\n<p>Chapter 12 in particular caught my attention because not only does it have very practical advice for Linux security but it can also be applied to security in the Windows OS environment as well. Chapter 12 is titled \u201cStrategies for Keeping a Secure Server\u201d which as you have probably guessed already has tips on maintaining the security of the server as well as the safety of your data.<\/p>\n<p>One of the most commons sense precautions that any administrator can take against unwanted server access is to update system tools, applications, and the kernel or core of the operating system. This can be one of the most crucial if not the essential task in maintaining a server\u2019s security and is often neglected.\u00a0 This is one of the most common causes of server break-ins and can be easily remedied by configuring automatic updates within the operating system or implementing an update process within your organization.<\/p>\n<p>Another important step is to use smart password management especially where multiple users log on to a server remotely. Most often people do not consider the risks they face when implementing an application or webpage that is connected to the internet. There are a multitude of easily available programs that can quickly break a weak password especially if common words or phrases are used. A simple character length and complexity standard can be enough to prevent compromise and can be easily implemented on any OS.<\/p>\n<p>Other good security practices such as restricting IP or host access to external services, turning off or uninstalling unneeded service, installing a security detection system such as Tripwire or OSSEC, and simply monitoring the integrity of your server with random security audits can provide you with tools to combat the looming risk of intrusion.<\/p>\n<p>For more information please visit:<\/p>\n<p><a href=\"https:\/\/tldp.org\/LDP\/lame\/LAME\/linux-admin-made-easy\/index.html\">https:\/\/tldp.org\/LDP\/lame\/LAME\/linux-admin-made-easy\/index.html<\/a><\/p>\n<p><strong> <\/strong><\/p>\n<p>For more information on Security please visit the following:<\/p>\n<p><a href=\"https:\/\/tldp.org\/LDP\/lame\/LAME\/linux-admin-made-easy\/security.html\">https:\/\/tldp.org\/LDP\/lame\/LAME\/linux-admin-made-easy\/security.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While searching for various server security methods during one of my many journeys through cyberspace I stumbled upon a very interesting document titled LAME\u00a0 or \u201cLinux Administration Made Easy.\u201d The function of this document is to provide you with an easy guide that describes the day-to-day administration tasks and common maintenance issues facing a system administrator. Chapter 12 in particular caught my attention because not only does it have very practical advice for Linux security but it can also be applied to security in the Windows OS environment as well. Chapter 12 is titled \u201cStrategies for Keeping a Secure Server\u201d which as you have probably guessed already has tips on maintaining the security of the server as well as the safety of your data. One of the most commons sense precautions that any administrator can take against unwanted server access is to update system tools, applications, and the kernel or core of the operating system. This can be one of the most crucial if not the essential task in maintaining a server\u2019s security and is often neglected.\u00a0 This is one of the most common causes of server break-ins and can be easily remedied by configuring automatic updates within the operating&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"other_category":[],"class_list":["post-1453","post","type-post","status-publish","format-standard","hentry","category-information-technology-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Operating System Security Essentials | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operating System Security Essentials\" \/>\n<meta property=\"og:description\" content=\"While searching for various server security methods during one of my many journeys through cyberspace I stumbled upon a very interesting document titled LAME\u00a0 or \u201cLinux Administration Made Easy.\u201d The function of this document is to provide you with an easy guide that describes the day-to-day administration tasks and common maintenance issues facing a system administrator. Chapter 12 in particular caught my attention because not only does it have very practical advice for Linux security but it can also be applied to security in the Windows OS environment as well. Chapter 12 is titled \u201cStrategies for Keeping a Secure Server\u201d which as you have probably guessed already has tips on maintaining the security of the server as well as the safety of your data. One of the most commons sense precautions that any administrator can take against unwanted server access is to update system tools, applications, and the kernel or core of the operating system. This can be one of the most crucial if not the essential task in maintaining a server\u2019s security and is often neglected.\u00a0 This is one of the most common causes of server break-ins and can be easily remedied by configuring automatic updates within the operating...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2010-05-30T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Operating System Security Essentials\",\"datePublished\":\"2010-05-30T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/\"},\"wordCount\":383,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"articleSection\":[\"Information Technology Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/\",\"url\":\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/\",\"name\":\"Operating System Security Essentials | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2010-05-30T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Operating System Security Essentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Operating System Security Essentials | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/","og_locale":"en_US","og_type":"article","og_title":"Operating System Security Essentials","og_description":"While searching for various server security methods during one of my many journeys through cyberspace I stumbled upon a very interesting document titled LAME\u00a0 or \u201cLinux Administration Made Easy.\u201d The function of this document is to provide you with an easy guide that describes the day-to-day administration tasks and common maintenance issues facing a system administrator. Chapter 12 in particular caught my attention because not only does it have very practical advice for Linux security but it can also be applied to security in the Windows OS environment as well. Chapter 12 is titled \u201cStrategies for Keeping a Secure Server\u201d which as you have probably guessed already has tips on maintaining the security of the server as well as the safety of your data. One of the most commons sense precautions that any administrator can take against unwanted server access is to update system tools, applications, and the kernel or core of the operating system. This can be one of the most crucial if not the essential task in maintaining a server\u2019s security and is often neglected.\u00a0 This is one of the most common causes of server break-ins and can be easily remedied by configuring automatic updates within the operating...","og_url":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/","og_site_name":"OTAVA","article_published_time":"2010-05-30T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Operating System Security Essentials","datePublished":"2010-05-30T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/"},"wordCount":383,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"articleSection":["Information Technology Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/","url":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/","name":"Operating System Security Essentials | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2010-05-30T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Operating System Security Essentials"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=1453"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1453\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=1453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=1453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=1453"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=1453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}