
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Operating System Security Essentials","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ZgJdFX1eot\"><a href=\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/\">Operating System Security Essentials<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/operating-system-security-essentials\/embed\/#?secret=ZgJdFX1eot\" width=\"600\" height=\"338\" title=\"&#8220;Operating System Security Essentials&#8221; &#8212; OTAVA\" data-secret=\"ZgJdFX1eot\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"While searching for various server security methods during one of my many journeys through cyberspace I stumbled upon a very interesting document titled LAME\u00a0 or \u201cLinux Administration Made Easy.\u201d The function of this document is to provide you with an easy guide that describes the day-to-day administration tasks and common maintenance issues facing a system administrator. Chapter 12 in particular caught my attention because not only does it have very practical advice for Linux security but it can also be applied to security in the Windows OS environment as well. Chapter 12 is titled \u201cStrategies for Keeping a Secure Server\u201d which as you have probably guessed already has tips on maintaining the security of the server as well as the safety of your data. One of the most commons sense precautions that any administrator can take against unwanted server access is to update system tools, applications, and the kernel or core of the operating system. This can be one of the most crucial if not the essential task in maintaining a server\u2019s security and is often neglected.\u00a0 This is one of the most common causes of server break-ins and can be easily remedied by configuring automatic updates within the operating..."}