NOC Help Documentation
  • CDN
  • WAF
  • Pricing
  • Login
  1. Home
  2. Security Hardening
  3. Linux
Searching...

Linux

  • 10 Steps to Securing SSH on a Linux Server

    Secure Shell SSH) is the preferred method for connecting to a remote server securely. It’s also one of top reasons...
  • Basic Linux Security Checklist

    Before deploying a Linux server it’s imperative you take time to think about security. The following article helps provide a...
  • How to Enable SFTP on Ubuntu

    SFTP is a file transfer protocol. It wraps the File Transfer Protocol (FTP) inside the Secure Shell (SSH) protocol. This...
  • Working with UFW on Ubuntu

    This is a basic orientation for the UFW application. This should provide insights you’re probably not aware of, but many...
  • Auto-Update CentOS 7 Packages with Yum-Cron

    If you’re looking for a quick way to keep your CentOS machine patched at all times, become friends with yum-cron....

🔍 DNSArchive

Investigate domains with passive DNS, IP reputation, and web metadata. Built for analysts and researchers.

Explore →

📦 Trunc SIEM

Forward your DNS logs to a secure, cloud-hosted SIEM in minutes. Ideal for threat detection and compliance.

Learn More →

🛡️ CleanBrowsing DNS Filtering

Block adult content, malware, and unwanted websites with fast, privacy-first DNS filtering—trusted by families, schools, and businesses.

Explore CleanBrowsing →
© Copyright NOC Help Documentation.
  • CDN
  • WAF
  • Pricing
  • Login