Published by VA on August 20, 2015

Open Source Server Security


If you plan to develop and open source software, you must never forget to maintain your web server’s security by executing methods that solidify its pillars. Failure to do so can impose harm to you and your clients, sometimes without you knowing, therefore, can lead to damaged reputation, lost revenue and compromised relationship with existing and potential clients.

Web servers are susceptible to malicious attacks, such as:

  1. SQL, LDAP and XSS injection leading to compromised backend databases.
  2. Inflicted viruses in the web server, operating system or open source software.
  3. Accessed files or folders that should not be publicly viewable due to hacking.

…and many more!

These malicious attacks can be possibly controlled through executing security measures on your open source server.You could get a cheap VPS, but here are some more methods that you have to do in order for you to efficiently solidify your open source server security:

Firewalls are important. If you own a small- to medium-sized business website, you can use a software as it is adequate enough to efficiently handle all the traffics coming to and from your server. But if you have a big business website, firewall hardware is a better option as it can handle massive traffic, thus, guaranteeing you that any malicious attack won’t be missed. Using a simple IPtable can be a huge security upgrade.

Keep passwords private. Choose a password that is hard to decipher, like adding symbols, upper and lower case letters and numbers. Never use generic ones and never write it down as others might be able to see them and hack your account. If possible, never send password resets on email addresses because you don’t know whether it is legitimately used by the person who can access your website, or not.

Deactivate software that is not useful. Also, add software that has been developed by a credible company so that you will be guaranteed that it has been engineered efficiently, decreasing chances of loopholes that hackers can penetrate. Remember, a hacker can scan several websites for minutes, and if he have seen any security vulnerability on your website due to your activated software, he can immediately execute his methods, putting you at great risk.

Use robot_txt file to your admin page. Of course, you must ensure that your admin page will not be indexed by search engines. You can do that by adding robot_txt file so that search engine spiders will not be able to crawl in them. With that, hackers may not be able to see your admin page, making it harder for them to infiltrate your website.

Limit your users file uploads. Hackers can take advantage of this perk, therefore, limit the files that you let your users upload on your website, especially those that are really unnecessary. If needed, store them on the root directory. If you have chosen a good server provider, they will help you manage this security strategy.

These are just among the many security strategies that you must impose on your web server to prevent possible malicious attacks. Never be lax about it if you do not want to be exploited by hackers who will damage your reputation and corrupt your personal information.