• Services
    • Web App Penetration Testing
    • Mobile App Penetration Testing
    • Web 3 Penetration Testing
    • Cyber Investigation Services
    • Tech Audit (Due Diligence)
    • GDPR Tech Assessment
    • Pentesting-as-a-Service
    • Security Testing Training
    • Phishing Simulation
  • About us
  • Partnership
  • Resources
    • Blog
    • Case Studies
    • FAQ
    • WHOIS
    • Knowledge Center
MENU
  • How to use dhound IDS
    • Installation
      • Linux
        • Supported platforms
        • Install dhound-agent
        • Additional server configuration
        • Upgrade dhound-agent
        • Uninstall dhound-agent
        • Installation changes
        • Troubleshooting
      • Windows
        • Supported platforms
      • Dhound WordPress plugin
        • Install the plugin
        • Installing from WP store
        • Manual installation
        • Installation using the FTP client
        • How to configure the plugin
        • Uninstall the plugin
      • Cloud AWS
        • Configure Amazon Cloud
        • Configure Amazon CloudTrail S3 Logs Parsing
        • Configure Amazon CloudTrail
    • Security Events
      • Security groups and events
      • Predefined security events
    • Custom Security Events
      • Configure collecting custom events
    • API Reference
      • Collect Events
  • Security Practices
    • Transport Security
      • SSL Configuration Testing
      • Configure SSL for nginx
      • Configure SSL for Windows
    • Firewalls
      • Attack Surface Reduction
      • Configure iptables on Linux
    • Brute force protection
      • Brute force attacks
      • Fail2ban
      • Test Protection
    • Android & APK Analysis
      • Nmap Cheatsheet
      • Tcpdump Cheatsheet
      • Lsof Cheatsheet
    • Cheatsheets
      • Nmap Cheatsheet
      • Tcpdump Cheatsheet
      • Lsof Cheatsheet

Security practices

This block is an attempt to share our security expertize to make the cyber world more safely. Don't hesitate to ask our help if any questions or issues.

In this section you can find how to:

  • Secure SSL/TLS on your servers
  • Configure firewalls
  • Protect against brute-force attacks
  • Cheatsheets
  • etc...