The Internet has increasingly become a hostile environment to
operate your server. Every day and every hour a hacker breaks into a dedicated
server somewhere and wreaks havoc. Companies can lose their entire business in
an instant! Years of work can be wiped out, not to mention the damage to your
business reputation. In less severe cases, an unauthorized user can gain access
to an unprotected server to take control of the email functions to relay spam
activities. The server's IP address may get recorded into anti-spam databases
if these damaging activities go unnoticed for an extended period.
From the moment a server goes online it is vulnerable and immediately becomes
a potential target for attack by hackers, script kiddies, and other malicious
criminals. Once a server is compromised there is not much choice left but to
reformat and re-install the entire operating system, which is a very costly
and time-consuming process.
The basic security precautions described in subsequent pages are absolutely required
to secure a Linux-based dedicated server. Once your new dedicated server is set up
by your hosting provider and ready to use, there are often three to five static
(public) IP addresses assigned to a network interface card (NIC) installed on
your server. Your hosting provider will supply the initial user name and password
to log in with root administration privilege and the server's IP address.
Automate 2.1 configures these steps automatically without any manual intervention.