Service Prices vary by time, scope and warranty.

What the heck is a LAMP or a LEMP?

It's essentially the two primary methods of configuring a base linux server to have web hosting capabilities.
The key difference between LEMP and LAMP is the web server: LEMP uses Nginx, while LAMP uses Apache.
LAMP
LAMP is software stack for web hosting, which includes Linux as the operating system (we use Ubuntu or Debian), uses Apache as the web server, MySQL as the database, and PHP as the scripting language.
Apache is highly configurable and has a wide range of modules available for various functionalities.


HowToForge guide on building a LAMP server.

LEMP
LEMP is a software stack used for serving web applications and websites, consisting of Linux as the operating system, Nginx as the web server, MySQL as the database server, and PHP as the scripting language.
Nginx is known for its high performance and ability to handle large numbers of simultaneous connections.
LEMP is often used for applications that require efficient resource utilization and fast response times.

HowToForge guide on building a LEMP server.



What do you do differently?

We try to find the server application combination for your system We start by using a stable LTS build of a Debian based operating system.
Debian based (Ubuntu) operating systems operate without a root user, but instead a root service by default, accessed via the prefix to commands. The next step we take is using MariaDB over MySQL. MariaDB is often considered better than other MySQL solutions due to its open-source nature, enhanced security features, and a broader set of storage engines.

The final step we take is to try to enable Clam Antivirus to try to run a daily scan... if you run into issues let us know!
There is a trick to


before your scheduled virus scan time... so good it doesn't trust itself holding it's own logs sometimes! Learn more about scheduled tasks or Cron Jobs which we explain on that page!


Debian and Ubuntu

Debian and Ubuntu
both prioritize security by offering timely security updates and patches, often sharing security advisories.
Both distributions also benefit from the extensive testing and vetting that open-source software generally undergoes, making them robust against various kinds of vulnerabilities.
While Ubuntu is technically a commercial product backed by Canonical Ltd., it inherits a lot of its security features and practices from Debian, its parent distribution.
Ubuntu 20.04 and 22.04 (April '20 and '22 respectively) have a 6 year LTS cycle, in which updates are provided until 6 years after the initial release!
One notable security feature in Debian-based systems is the absence of an enabled root account by default, which minimizes the risk of unauthorized root-level access to the system.

The Tab Key

In Linux, the Tab key serves as an invaluable tool for both beginners and experts, streamlining the command-line experience through autocompletion and syntax suggestion. By pressing the Tab key while typing a command, file name, or directory path, the terminal attempts to automatically complete the input or list possible options, saving the user time and reducing the likelihood of errors. This is particularly useful when working with long or complex commands and paths. The feature not only speeds up the navigation and operation processes but also aids in avoiding typographical mistakes that could lead to undesired outcomes. Overall, mastering the Tab key and autocompletion can significantly enhance efficiency and accuracy in Linux usage. Go from what was the auth file for ssh to
to

in one button push!


Children of the Cron

Cron jobs can be particularly beneficial for running automated security scans, like virus scans or rootkit scans, on a regular basis.
Setting up these types of scans to run automatically helps to ensure the continuous security of a system.
Once configured, the scans operate without manual intervention, allowing for consistent monitoring of potential security threats.
This is ideal for server environments or individual machines where constant uptime and security are crucial.

To open user (sudo) crontabs on the system

Here's an example of a cron job that runs a ClamAV virus scan on the /home directory every Sunday at 3:00 AM:



MariaDB

If you're considering using MariaDB for a Wix or WordPress site, you're taking a step towards enhanced security and performance. MariaDB serves as a robust alternative to traditional MySQL databases, offering advanced security features like role-based access controls and data encryption. This makes it a reliable option for safeguarding sensitive information. Additionally, its performance optimizations make it highly capable of handling a large volume of concurrent users without compromising on speed. By opting for MariaDB, you can elevate the reliability and security of your website without requiring a steep learning curve, as it's designed to be compatible with MySQL. To install MariaDB on a Debian or Ubuntu-based server, execute the following commands:






Upon completion, MariaDB will be installed and ready for final configuration.


MAKE SURE TO RUN
to complete installation by adding a passphrase to the DATABASE root (different from system root).

ClamAV

ClamAV is an open-source antivirus engine designed for detecting viruses, trojans, malware, and other malicious threats.
It is commonly used in a variety of settings, including email scanning, web scanning, and endpoint security.
Highly versatile, ClamAV supports multiple file formats and is often integrated into custom solutions.
ClamAV offers command-line utilities and is extensible with third-party add-ons.
It is widely used across Linux-based systems for its low resource usage and effective scanning capabilities.
and who doesn't love
Freshclam
s
This command is used to install clamAV and the clamAV service


This command forces clam AV to look at new virus definitions



If you run into an issue with the logs being in control of a different ClamAV process, try

followed by
or

To either restart the definition search, or to start a full scan of the system.

Follow with
to restart the clamAV service after it starts behaving.
To perform a virus scan on a particular directory and it's contents, you can use

Drop the -r and point to a file to scan an individual file!


RKhunter

Rootkit Hunter (rkhunter) is a Unix-based tool that scans for rootkits, backdoors, and other possible local exploits.
It compares the SHA-1 hashes of important files with known good ones in online databases, checks for default directories of rootkits, wrong permissions, hidden files, suspicious strings in kernel modules, and various tests to determine whether the machine has been compromised.
It's a valuable tool for system administrators to monitor and verify the security of their systems.

To Install, run

To consistently have this run, create a Cron Job with

Then Add a line for
to run a 03:29 UTC Update
Followed by a 03:31 scan


To send yourself daily updates on it's scan results!
"Null message body; hope that's ok"


Text Copied!