A collection of 123 tips that come in real handy when you need them. Originally posted as tweets on
my Twitter account,
and now gathered here so you can browse them easily.
Find Vulnerabilities in Your Nginx Configuration
💡 Server security is hard. Moreso if you're still learning your way around. Luckily there are tools to guide us.
👉🏼 Gixy is one such tool for Nginx. It analyzes your configuration for security vulnerabilities.
💡 Nginx on Linux makes use of symlinks in a smart way to enable site configurations.
👉🏼 "sites-available" folder holds all your site configurations. In the "sites-enabled" folder you create symlinks to the previous folder for the sites you wish to enable.
💡 Using a non-root user and requiring a password for sudo is a security best practice. However, in scripts you often need to use sudo without a password.
👉🏼 Run:
➡️ sudo visudo
And add this line to "/etc/sudoers" to disable password req: