Common dedicated server VN security flaws

October 20, 2017

There’re many threats that make your dedicated server VN vulnerable, but with a few tips below you can prevent the most common security threats.

These are very basic tips, but they are sometimes overlooked. Doing these things helps you prevent the majority of attacks that are commonly seen against your dedicated server.

Enable and lock down your firewall

The default Linux OS and Windows OS configuration typically includes the extra software which you maybe never use and is accessible over the internet. Sometimes, this software can typically have vulnerabilities that you do not know about. It is best practice to close off any ports that you are not using and only keep ports open for services that your dedicated server is installed to use.

Create strong password

This is a basic issue with a simple tip, yet it needs to be repeated many times. Technical sites put out articles about the worst passwords of the year. It is easy to believe that dedicated Vietnam server administrators are immune to this.

As a minimum, login passwords should contain lower case letters, capital letters, symbols and numbers. They should be no shorter than 8 characters. Having a simple and short password allows brute force attacks to hack the password faster than a more complicated password. Strong passwords are great, of course, first layer deterrent against the attackers.

Server vn

Change the default remote access port

For Windows, the default port for Remote Desktop Access is 3389 and should be changed. For Linux OS, the default port for SSH remote access is 22 and should be changed. Make sure to remember to update any firewall rules so you do not accidentally lock yourself out. Whatever you use Linux OS or Windows server in Vietnam, don’t forget this!

Disable default administrative accounts

For Windows OS, the account name is “Administrator” and should also be disabled to decrease the attack surface area. For Linux OS, the default administrative account is “root”. Most Linux distributions have it enabled after the first setup and the attackers commonly target this account for brute force attacks to gain administrative control. The root account should be disabled.