kernel-hardening-checker VS How-To-Secure-A-Linux-Serve

Compare kernel-hardening-checker vs How-To-Secure-A-Linux-Serve and see what are their differences.

kernel-hardening-checker

A tool for checking the security hardening options of the Linux kernel (by a13xp0p0v)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
kernel-hardening-checker How-To-Secure-A-Linux-Serve
8 2
1,500 -
- -
9.2 -
8 days ago -
Python
GNU General Public License v3.0 only -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

kernel-hardening-checker

Posts with mentions or reviews of kernel-hardening-checker. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-09-29.

How-To-Secure-A-Linux-Serve

Posts with mentions or reviews of How-To-Secure-A-Linux-Serve. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-10-05.
  • Ask HN: How can a total beginner start with self-hosting
    21 projects | news.ycombinator.com | 5 Oct 2022
    > In short it’s all about control, privacy, and security, in that order.

    I am going to strongly urge you to consider changing that order and move *security* to the first priority. I have long run my own servers, it is much easier to setup a server with strong security foundation, than to clean up afterwards.

    As a beginner, you should stick to a well known and documented Linux server distribution such as Ubuntu Server LTS or Fedora. Only install the programs you need. Do not install a windowing system on it. Do everything for the server from the command line.

    Here are a few blog posts I have bookmarked over the years that I think are geared to beginners:

    "My First 5 Minutes On A Server; Or, Essential Security for Linux Servers": An quick walk through of how to do basic server security manually [1]. There was a good Hacker News discussion about this article, most of the response suggests using tools to automate these types of security tasks [2], however the short tutorial will teach you a great deal, and automation mostly only makes sense when you are deploying a number of similar servers. I definitely take a more manual hands-on approach to managing my personal servers compared to the ones I professionally deploy.

    "How To Secure A Linux Server": An evolving how-to guide for securing a Linux server that, hopefully, also teaches you a little about security and why it matters. [3]

    Both Linode[4] and Digital Ocean[5] have created good sets of Tutorials and documentation that are generally trustworthy and kept up-to-date

    Good luck and have fun

    [1]: https://sollove.com/2013/03/03/my-first-5-minutes-on-a-serve...

    [2]: https://news.ycombinator.com/item?id=5316093

    [3]: https://github.com/imthenachoman/How-To-Secure-A-Linux-Serve...

    [4]: https://www.linode.com/docs/guides/

    [5]: https://www.digitalocean.com/community/tutorials

  • Ask HN: What Linux setup/hardening guide do you use?
    4 projects | news.ycombinator.com | 8 Sep 2022
    I can't claim to have been through it but this is sitting on my bookmarks folder and looks very useful: https://github.com/imthenachoman/How-To-Secure-A-Linux-Serve...

    My only tip I haven't seen mentioned here is be very careful using docker with ufw, as by default docker will effectively override ufw port restrictions if it is told to expose a port.

What are some alternatives?

When comparing kernel-hardening-checker and How-To-Secure-A-Linux-Serve you can also consider the following projects:

linux-hardened - Minimal supplement to upstream Kernel Self Protection Project changes. Features already provided by SELinux + Yama and archs other than multiarch arm64 / x86_64 aren't in scope. Only tags have stable history. Shared IRC channel with KSPP: irc.libera.chat #linux-hardening

provision - Script to setup a new server.

checksec.sh - Checksec.sh

Pi-hole - A black hole for Internet advertisements

syncthing-android - Wrapper of syncthing for Android.

How-To-Secure-A-Linux-Server - An evolving how-to guide for securing a Linux server.

droid-native - Next Generation Android x86 Desktop - Anbox, Lineage, WayDroid, BlissOS, Dock-Droid