{"id":4365,"date":"2022-01-03T13:48:36","date_gmt":"2022-01-03T13:48:36","guid":{"rendered":"https:\/\/evoxt.com\/?p=4365"},"modified":"2022-01-03T13:48:36","modified_gmt":"2022-01-03T13:48:36","slug":"securing-a-linux-server","status":"publish","type":"post","link":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/","title":{"rendered":"Securing a Linux server"},"content":{"rendered":"Is your Linux server safe from hackers? Can they get hacked? Freak out about getting your server compromised and getting your data leaked? Take a look at some of the tips you can take to secure and protect your Linux server.<br \/><br \/>\n\n<h2>1. SSH security<\/h2>\nSSH is like a path to connect you to your Linux server. Of course, you will have to secure the passage. Hackers can access your server the same way you access your server.<br \/><br \/>\n\n\t<h4>SSH Port<\/h4>\nEveryone knows that SSH uses the default port 22 to connect to your server. To avoid letting people know that your SSH is open to connection, change the port so hackers that scan port 22 will not know that your server's SSH is active. The best practice is to change your SSH ports to a different port between <strong>10000 and 32767<\/strong>.<br \/><br \/>\n\nTo change your SSH ports, edit SSH config<br \/>\n<div class=\"code\">vi \/etc\/ssh\/sshd_config<\/div>\nFind this line<br \/>\n<div class=\"code\">#Port 22<\/div>\nchange port value\n<div class=\"code\">Port &lt;Random Ports&gt;<\/div>\nDon't forget to restart your ssh server to apply the settings.<br \/>\n\n<div class=\"code\">systemctl restart sshd<\/div><br \/>\n\n\t<h4>2. SSH Keys<\/h4>\nPassword can easily get bruteforced, trying keying in your Password in <a href=\"https:\/\/www.security.org\/how-secure-is-my-password\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.security.org\/how-secure-is-my-password\/<\/a> and find out how long does it take for a hacker to crack your password. Scary isn't it?<br \/><br \/>\nNow, how about cracking a 4096 bits SSH key? Good luck with that, Mr. Hackers.<br \/><br \/>\n\nTo set up an SSH key, use the code to generate a rsa 4096 bit key pair<br \/>\n<div class=\"code\">ssh-keygen -t rsa -b 4096<\/div><br \/>\n\n<img decoding=\"async\" src=\"https:\/\/console.evoxt.com\/img\/windows.svg\" alt=\"\" style=\"width:50px;height:50px\" \/><br \/>\nOn Windows machine (cmd), this will be<br \/>\n<div class=\"cli\">\nC:\\Users\\evoxt&gt;ssh-keygen -t rsa -b 4096\nGenerating public\/private rsa key pair.<br \/>\nEnter file in which to save the key (C:\\Users\\evoxt\/.ssh\/id_rsa):<br \/>\nCreated directory 'C:\\Users\\evoxt\/.ssh'.<br \/>\nEnter passphrase (empty for no passphrase):<br \/>\nEnter same passphrase again:<br \/>\nYour identification has been saved in C:\\Users\\evoxt\/.ssh\/id_rsa.<br \/>\nYour public key has been saved in C:\\Users\\evoxt\/.ssh\/id_rsa.pub.<br \/>\nThe key fingerprint is:<br \/>\nSHA256:RSM1LY13KzUzgSziCz1gLKfTSLs3YtgKBtHdQGdX2SQ evoxt@DESKTOP-DU15VE5<br \/>\nThe key's randomart image is:<br \/>\n+&#8212;[RSA 4096]&#8212;-+<br \/>\n| . oo+o ooEO&#8230;. |<br \/>\n|. . +o*..o=+B *  |<br \/>\n| . . O + ..+ o = |<br \/>\n|.   = o +.  . .  |<br \/>\n|.  o o .So   .   |<br \/>\n|&#8230; = o .        |<br \/>\n|.. o o .         |<br \/>\n|  .              |<br \/>\n|                 |<br \/>\n+&#8212;-[SHA256]&#8212;&#8211;+<br \/>\nC:\\Users\\evoxt&gt;<br \/>\n<\/div><br \/>\n\nThen, you will have to manually copy the ssh public key to your server ( ~\/.ssh\/authorized_keys )<br \/><br \/>\n\nThe formatting will be <br \/>\n<div class=\"code\">ssh-rsa &lt;generated_public_key&gt;<\/div>\nExample:<br \/>\n<div class=\"cli\">\n[root@evoxt .ssh]# cat authorized_keys <br \/>\nssh-rsa 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<br \/>\n\n[root@evoxt ~]# <span class='green-box'> <\/span><br \/>\n<\/div><br \/>\n\n<img decoding=\"async\" src=\"https:\/\/evoxt.com\/img\/linux.svg\" alt=\"\" style=\"height:50px\" \/><br \/>\nOn a Linux machine, this will be <br \/>\n\n<div class=\"cli\">\n[root@evoxt ~]# ssh-keygen -t rsa -b 4096<br \/>\nGenerating public\/private rsa key pair.<br \/>\nEnter file in which to save the key (\/root\/.ssh\/id_rsa):<br \/> \nCreated directory '\/root\/.ssh'.<br \/>\nEnter passphrase (empty for no passphrase): <br \/>\nEnter same passphrase again: <br \/>\nYour identification has been saved in \/root\/.ssh\/id_rsa.<br \/>\nYour public key has been saved in \/root\/.ssh\/id_rsa.pub.<br \/>\nThe key fingerprint is:<br \/>\nSHA256:eIS1I1I0YXgvjR9igqAipDp0j3D+CYpyqjuJQ02ugZ8 root@evoxt<br \/>\nThe key's randomart image is:<br \/>\n+&#8212;[RSA 4096]&#8212;-+<br \/>\n|     o*..        |<br \/>\n|..  .o.+ .       |<br \/>\n|+. &#8230;o++        |<br \/>\n|=o.+..=++.       |<br \/>\n|* O oo.+S.       |<br \/>\n|+o * . ..        |<br \/>\n|+++.o .          |<br \/>\n|BoE  o           |<br \/>\n|**               |<br \/>\n+&#8212;-[SHA256]&#8212;&#8211;+<br \/>\n[root@evoxt ~]# <span class='green-box'> <\/span> <br \/>\n<\/div><br \/>\n\nThen, you can use ssh-copy-id command to install the ssh public key.<br \/>\n<div class=\"code\">ssh-copy-id user@your_server_ip<\/div>\n\n<div class=\"cli\">\n[root@evoxt ~]# ssh-copy-id root@xx.xx.xx.xx<br \/>\n\/usr\/bin\/ssh-copy-id: INFO: Source of key(s) to be installed: \"\/root\/.ssh\/id_rsa.pub\"<br \/>\nThe authenticity of host 'xx.xx.xx.xx (xx.xx.xx.xx)' can't be established.<br \/>\nECDSA key fingerprint is SHA256:umf+E\/a0OQe8eRmPdYyCM5kE+ZG\/FCC2MEEn2G81dGA.<br \/>\nAre you sure you want to continue connecting (yes\/no\/[fingerprint])? yes<br \/>\n\/usr\/bin\/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed<br \/>\n\/usr\/bin\/ssh-copy-id: INFO: 1 key(s) remain to be installed &#8212; if you are prompted now it is to install the new keys<br \/>\nroot@xx.xx.xx.xx's password: <br \/><br \/>\n\nNumber of key(s) added: 1<br \/><br \/>\n\nNow try logging into the machine, with \"ssh 'root@xx.xx.xx.xx'\"<br \/>\nand check to make sure that only the key(s) you wanted were added.<br \/><br \/>\n\n[root@evoxt ~]# <span class='green-box'> <\/span>\n<\/div><br \/><br \/>\n\n\t<h4>SSH from Specific IP<\/h4>\nTo allow specific IP to access your server through SSH, configure the firewall only to allow a single IP address to go through the firewall to your SSH port.<br \/><br \/>\n\nMake sure you have a static IP before doing this. Else you can get locked out of your server.<br \/><br \/>\n\n\t<h4>Disable Password Authentication<\/h4>\nOnce SSH key authentication has been set up, disable password authentication.<br \/>\n\n<div class=\"code\">sed -i 's\/PasswordAuthentication yes\/PasswordAuthentication no\/g' \/etc\/ssh\/sshd_config<\/div>\n\nThen restart SSH service<br \/>\n\n<div class=\"code\">systemctl restart sshd<\/div><br \/>\n\n<h2>3. Automatic updates<\/h2>\nZero-day exploits are attacks that you can't react to. The best thing next is to protect yourself from N-day attacks once the zero-day exploit has been discovered. To protect yourself from N-day attacks, enable automatic updates. Keep in mind that automatic updates can potentially mess things up. To reduce the chances, enable automatic security only.<br \/><br \/>\n\nTo enable automatic security updates, <a href=\"https:\/\/evoxt.com\/guides\/enable-automatic-updates-in-linux\/\" rel=\"noopener\" target=\"_blank\">use this guide<\/a>.<br \/><br \/>\n\n<h2>4. Default password<\/h2>\nChange your server's default password. Most default passwords are stored in databases and your email inbox. Change them!<br \/><br \/>\n\nTo change your server's password,<br \/>\n\n<div class=\"code\">passwd &lt;user&gt;<\/div>\n\n<div class=\"cli\">\n[root@TEST ~]# passwd root<br \/>\nChanging password for user root.<br \/>\nNew password: <br \/>\nRetype new password: <br \/>\npasswd: all authentication tokens updated successfully.<br \/>\n[root@TEST ~]# <span class='green-box'> <\/span> \n<\/div><br \/>\n\n<h2>5. Private Networks and VPNs<\/h2>\nSet up a server and connect to your servers through a private network. Private network uses private IP to communicate with each other isolating your servers from the public without any exposure to the public.<br \/><br \/>\n\nTo set up a private network or a VPN. Take a look at <a href=\"https:\/\/evoxt.com\/one-click-installation\/pritunl-one-click-installation\/\" rel=\"noopener\" target=\"_blank\">Pritunl<\/a>. They offer many advanced features such as organization management to separate between Private networks, and it also comes with GUI to easily configure the server.<br \/><br \/>\n\n<h2>6. Firewall<\/h2>\nSet up a firewall to block unnecessary open ports.<br \/><br \/>\n\nMost Linux distributions includes Iptables by default.<br \/><br \/>\n\nTo control your Iptables: <br \/>\n\n\t<li>CentOS\/ Fedora uses FirewallD<\/li>\n\t<li>Ubuntu\/ Debian uses UFW.<\/li><br \/>\n\n\nTo take a look for running programs that are currently using specific ports, use netstat<br \/>\n\n<div class=\"code\">netstat -tulpn<\/div>\n\nAlso, block ICMP Ping if not required.<br \/>\n<br \/>\nWith ICMP blocked, hackers have a harder time knowing your server is currently up and running.<br \/><br \/>\n\n<h2>7. Users<\/h2>\n\nRoot access is scary! With root access, the hacker can do almost anything to your servers.<br \/><br \/>\n\nBecause root access is so powerful, hackers tend to try to crack and brute force root accounts. Hackers will usually stay away from other user accounts if you disable root user access due to the lack of permissions.<br \/><br \/>\n\nThe most common practice is to block root access through SSH.<br \/><br \/>\n\nTo disable root access through SSH<br \/>\n<div class=\"code\">vi \/etc\/ssh\/sshd_config<\/div>\n\nChange PermitRootLogin from yes to no and remove the <strong>#<\/strong> comment if there is any<br \/><br \/>\n<div class=\"code\">#PermitRootLogin yes<\/div>\nto\n<div class=\"code\">PermitRootLogin no<\/div>\n\nOr use this simple command to disable root login.\n\n<div class=\"code\">sed -i 's\/#PermitRootLogin yes\/PermitRootLogin no\/g' \/etc\/ssh\/sshd_config<\/div>\n\nDon't forget to restart your ssh service to apply the settings.<br \/>\n\n<div class=\"code\">systemctl restart sshd<\/div><br \/>\n\nNote: Please make sure you have other users account created with sufficient permission to avoid getting locked out of your server.<br \/><br \/>\n\n<h2>8. Backup<\/h2>\nThis is not quite related to server security. However, I believe this is super important to be included.<br \/><br \/>\n\nIt is crucial to have a server backup just in case something goes wrong.<br \/><br \/>\n\nWhen a server is hacked, backup files will be your savior.<br \/><br \/>\n\nStore your backup offsite, so the hacker cannot modify or alter your backup files.<br \/><br \/>\n\nLuckily for you, all servers under Evoxt will be backup weekly on an offsite server. If you are not using Evoxt yet, consider <a href=\"https:\/\/evoxt.com\/deploy\" rel=\"noopener\" target=\"_blank\">upgrading<\/a>!\n","protected":false},"excerpt":{"rendered":"Is your Linux server safe from hackers? Can they get hacked? Freak out about getting your server compromised and getting your data leaked? Take a look at some of the tips you can take to secure and protect your Linux server. 1. SSH security SSH is like a path to connect you to your Linux &#8230; <a title=\"Securing a Linux server\" class=\"read-more\" href=\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/\" aria-label=\"More on Securing a Linux server\">Read more<\/a>","protected":false},"author":1,"featured_media":4978,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,6],"tags":[],"class_list":["post-4365","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides","category-linux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing a Linux server - \u76ca\u6c83\u65af<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing a Linux server - \u76ca\u6c83\u65af\" \/>\n<meta property=\"og:description\" content=\"Is your Linux server safe from hackers? Can they get hacked? Freak out about getting your server compromised and getting your data leaked? Take a look at some of the tips you can take to secure and protect your Linux server. 1. SSH security SSH is like a path to connect you to your Linux ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/\" \/>\n<meta property=\"og:site_name\" content=\"\u76ca\u6c83\u65af\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-03T13:48:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"337\" \/>\n\t<meta property=\"og:image:height\" content=\"180\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Evoxt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evoxt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/\"},\"author\":{\"name\":\"Evoxt\",\"@id\":\"https:\/\/evoxt.com\/zh\/#\/schema\/person\/33542421ee27f984d55fa9ed8f191432\"},\"headline\":\"Securing a Linux server\",\"datePublished\":\"2022-01-03T13:48:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/\"},\"wordCount\":1384,\"publisher\":{\"@id\":\"https:\/\/evoxt.com\/zh\/#organization\"},\"image\":{\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png\",\"articleSection\":[\"Guides\",\"Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/\",\"url\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/\",\"name\":\"Securing a Linux server - \u76ca\u6c83\u65af\",\"isPartOf\":{\"@id\":\"https:\/\/evoxt.com\/zh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png\",\"datePublished\":\"2022-01-03T13:48:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#primaryimage\",\"url\":\"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png\",\"contentUrl\":\"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png\",\"width\":337,\"height\":180},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/evoxt.com\/zh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing a Linux server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/evoxt.com\/zh\/#website\",\"url\":\"https:\/\/evoxt.com\/zh\/\",\"name\":\"\u76ca\u6c83\u65af\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/evoxt.com\/zh\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/evoxt.com\/zh\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/evoxt.com\/zh\/#organization\",\"name\":\"\u76ca\u6c83\u65af\",\"url\":\"https:\/\/evoxt.com\/zh\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evoxt.com\/zh\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2023\/04\/Evoxt-Logo-Final-Chinese-.svg\",\"contentUrl\":\"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2023\/04\/Evoxt-Logo-Final-Chinese-.svg\",\"caption\":\"\u76ca\u6c83\u65af\"},\"image\":{\"@id\":\"https:\/\/evoxt.com\/zh\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/evoxt.com\/zh\/#\/schema\/person\/33542421ee27f984d55fa9ed8f191432\",\"name\":\"Evoxt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93544d95eb090f5bda9e766f878c2f608dc6f3fc56943c156e0841c62551fa90?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93544d95eb090f5bda9e766f878c2f608dc6f3fc56943c156e0841c62551fa90?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93544d95eb090f5bda9e766f878c2f608dc6f3fc56943c156e0841c62551fa90?s=96&d=mm&r=g\",\"caption\":\"Evoxt\"},\"sameAs\":[\"https:\/\/www.evoxt.com\/wordpress\"],\"url\":\"https:\/\/evoxt.com\/zh\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing a Linux server - \u76ca\u6c83\u65af","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/","og_locale":"en_US","og_type":"article","og_title":"Securing a Linux server - \u76ca\u6c83\u65af","og_description":"Is your Linux server safe from hackers? Can they get hacked? Freak out about getting your server compromised and getting your data leaked? Take a look at some of the tips you can take to secure and protect your Linux server. 1. SSH security SSH is like a path to connect you to your Linux ... Read more","og_url":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/","og_site_name":"\u76ca\u6c83\u65af","article_published_time":"2022-01-03T13:48:36+00:00","og_image":[{"width":337,"height":180,"url":"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png","type":"image\/png"}],"author":"Evoxt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evoxt","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#article","isPartOf":{"@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/"},"author":{"name":"Evoxt","@id":"https:\/\/evoxt.com\/zh\/#\/schema\/person\/33542421ee27f984d55fa9ed8f191432"},"headline":"Securing a Linux server","datePublished":"2022-01-03T13:48:36+00:00","mainEntityOfPage":{"@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/"},"wordCount":1384,"publisher":{"@id":"https:\/\/evoxt.com\/zh\/#organization"},"image":{"@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#primaryimage"},"thumbnailUrl":"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png","articleSection":["Guides","Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/","url":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/","name":"Securing a Linux server - \u76ca\u6c83\u65af","isPartOf":{"@id":"https:\/\/evoxt.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#primaryimage"},"image":{"@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#primaryimage"},"thumbnailUrl":"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png","datePublished":"2022-01-03T13:48:36+00:00","breadcrumb":{"@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#primaryimage","url":"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png","contentUrl":"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2022\/01\/secure-150x150-1.png","width":337,"height":180},{"@type":"BreadcrumbList","@id":"https:\/\/evoxt.com\/zh\/2022\/01\/03\/securing-a-linux-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/evoxt.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Securing a Linux server"}]},{"@type":"WebSite","@id":"https:\/\/evoxt.com\/zh\/#website","url":"https:\/\/evoxt.com\/zh\/","name":"\u76ca\u6c83\u65af","description":"","publisher":{"@id":"https:\/\/evoxt.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evoxt.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evoxt.com\/zh\/#organization","name":"\u76ca\u6c83\u65af","url":"https:\/\/evoxt.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evoxt.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2023\/04\/Evoxt-Logo-Final-Chinese-.svg","contentUrl":"https:\/\/evoxt.com\/zh\/wp-content\/uploads\/sites\/2\/2023\/04\/Evoxt-Logo-Final-Chinese-.svg","caption":"\u76ca\u6c83\u65af"},"image":{"@id":"https:\/\/evoxt.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/evoxt.com\/zh\/#\/schema\/person\/33542421ee27f984d55fa9ed8f191432","name":"Evoxt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93544d95eb090f5bda9e766f878c2f608dc6f3fc56943c156e0841c62551fa90?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93544d95eb090f5bda9e766f878c2f608dc6f3fc56943c156e0841c62551fa90?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93544d95eb090f5bda9e766f878c2f608dc6f3fc56943c156e0841c62551fa90?s=96&d=mm&r=g","caption":"Evoxt"},"sameAs":["https:\/\/www.evoxt.com\/wordpress"],"url":"https:\/\/evoxt.com\/zh\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/posts\/4365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/comments?post=4365"}],"version-history":[{"count":0,"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/posts\/4365\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/media\/4978"}],"wp:attachment":[{"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/media?parent=4365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/categories?post=4365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evoxt.com\/zh\/wp-json\/wp\/v2\/tags?post=4365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}