{"id":1260,"date":"2023-10-19T13:00:40","date_gmt":"2023-10-19T13:00:40","guid":{"rendered":"https:\/\/www.devopsfreelancer.com\/blog\/?p=1260"},"modified":"2023-10-19T13:05:36","modified_gmt":"2023-10-19T13:05:36","slug":"top-security-checklist-for-lampp-server","status":"publish","type":"post","link":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/","title":{"rendered":"Define Security Checklist for LAMPP Server with example ?"},"content":{"rendered":"\n<p>In this tutorial we\u2019re going to learn top security checklist for Lampp server. In this tutorial we have to learn lots of security checklist for lampp server, so lets follow this tutorial for lampp security configuration.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Keep Linux Kernel and Software Up to Date<\/h2>\n\n\n\n<p>Make sure you check for&nbsp;regular updates&nbsp;to keep the Linux server secure. New patches can address newly discovered vulnerabilities to evaluate security flaws. Unfortunately, many Linux users cannot implement these updates. As a result, the server can become vulnerable and easy to hack. Consider automating the process if you\u2019re having trouble keeping up with the required security updates.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security thread if i ignore Software Up to Date <\/strong><\/h2>\n\n\n\n<p>Ignoring software updates in Linux can pose a serious security threat to your system. Software updates often include security patches that fix vulnerabilities in the software. If you do not install these updates, attackers can exploit these vulnerabilities to gain access to your system or steal your data.<\/p>\n\n\n\n<p>Here are some specific examples of the security threats that you may face if you ignore software updates in Linux:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware infection:<\/strong>&nbsp;Attackers can exploit vulnerabilities in outdated software to install malware on your system. Malware can steal your data, damage your system, or even take control of your system.<\/li>\n\n\n\n<li><strong>Data breaches:<\/strong>&nbsp;Attackers can exploit vulnerabilities in outdated software to gain access to sensitive data on your system, such as passwords, credit card numbers, and personal information.<\/li>\n\n\n\n<li><strong>Denial-of-service attacks:<\/strong>&nbsp;Attackers can exploit vulnerabilities in outdated software to launch denial-of-service attacks against your system. These attacks can make your system unavailable to you or other users.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example :- <\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt update\nsudo apt-get install unattended-upgrades\n<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"482\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72-1024x482.png\" alt=\"\" class=\"wp-image-1261\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72-1024x482.png 1024w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72-300x141.png 300w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72-768x361.png 768w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72.png 1105w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>2. Add user permissions for privileged operations on the system<\/strong><\/h2>\n\n\n\n<p>The sudo command allows users to run commands with the privileges of another user, typically the root user. To add a user to the sudo group, you can use the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>useradd sumit<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Set password<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>passwd sumit<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"786\" height=\"238\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-73.png\" alt=\"\" class=\"wp-image-1262\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-73.png 786w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-73-300x91.png 300w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-73-768x233.png 768w\" sizes=\"auto, (max-width: 786px) 100vw, 786px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. Disable USB usage<\/strong><\/h2>\n\n\n\n<p>Depending on how critical your system is, sometimes it\u2019s necessary to disable the USB sticks usage on the Linux host. There are multiple ways to deny the usage of USB storage; here\u2019s a popular one:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security reason if i don&#8217;t do Disable USB usage<\/strong><\/h2>\n\n\n\n<p>There are a few security reasons why you might want to disable USB usage in Linux:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>USB drives can be used to spread malware.<\/strong>&nbsp;Attackers can create malicious USB drives that contain malware, such as viruses or trojans. When a user plugs in the USB drive and opens a file on it, the malware can be installed on the user&#8217;s computer.<\/li>\n\n\n\n<li><strong>USB drives can be used to steal data.<\/strong>&nbsp;Attackers can create malicious USB drives that contain code that can steal data from a computer, such as passwords, credit card numbers, or other sensitive information. When a user plugs in the USB drive and opens a file on it, the code can be executed and the data can be stolen.<\/li>\n\n\n\n<li><strong>USB drives can be used to gain unauthorized access to a computer.<\/strong>&nbsp;Attackers can create malicious USB drives that contain code that can give them unauthorized access to a computer. For example, the code could exploit a vulnerability in the computer&#8217;s operating system to give the attacker root privileges.<\/li>\n<\/ul>\n\n\n\n<p>Open the \u201cblacklist.conf\u201d file using your favorite text editor:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>nano \/etc\/modprobe.d\/blacklist.conf<\/code><\/pre>\n\n\n\n<p>When the file opens, then add the following line at the end of the file (save and close):<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>blacklist usb_storage\n<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"441\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-74-1024x441.png\" alt=\"\" class=\"wp-image-1263\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-74-1024x441.png 1024w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-74-300x129.png 300w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-74-768x330.png 768w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-74.png 1197w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>After this, open the rc.local file:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4. Configure firewall<\/strong><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is Firewall and Allow Necessary Ports ?<\/strong><\/h2>\n\n\n\n<p>Enabling a firewall and allowing necessary ports are security measures to control and regulate network traffic to and from your computer or server. Firewalls act as a barrier between your system and the internet or other networks, helping to prevent unauthorized access and securing your system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why We need to do this Firewall Ports ?<\/strong><\/h2>\n\n\n\n<p>Enabling a firewall and managing open ports is a crucial aspect of securing your computer or server. Here\u2019s why managing firewall ports is important:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Security:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Unauthorized Access Prevention:<\/strong>&nbsp;Firewalls help prevent unauthorized access to your system by blocking incoming connections that are not explicitly allowed.<\/li>\n\n\n\n<li><strong>Network Segmentation:<\/strong>&nbsp;By controlling which ports are open, you can segment your network and limit exposure to potential security threats.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Protection Against Exploits:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Exploit Prevention:<\/strong>&nbsp;Firewalls protect your system from potential exploits and attacks by controlling which services and ports are accessible.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Controlled Access to Services:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Service Restriction:<\/strong>&nbsp;You can control which services are accessible from the network. For example, you may allow access to web services (HTTP and HTTPS) but restrict access to certain administrative services.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security thread if i ignore this Firewall and Allow Necessary Ports<\/strong>&nbsp;?<\/h2>\n\n\n\n<p>If you ignore your firewall and allow necessary ports, you could be putting your system at risk of a number of security threats, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware attacks:<\/strong>&nbsp;Malware can exploit open ports to gain access to your system and steal your data, install malware, or launch denial-of-service (DoS) attacks.<\/li>\n\n\n\n<li><strong>Unauthorized access:<\/strong>&nbsp;Attackers can use open ports to gain unauthorized access to your system and steal your data, or launch attacks against other systems on the network.<\/li>\n\n\n\n<li><strong>DoS attacks:<\/strong>&nbsp;DoS attacks can overwhelm your system with traffic, making it unavailable to legitimate users.<\/li>\n\n\n\n<li><strong>Man-in-the-middle attacks:<\/strong>&nbsp;Man-in-the-middle attacks allow attackers to intercept and modify communication between your system and other systems on the network.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example :- <\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo ufw allow 80\nsudo ufw allow 443\nsudo ufw enable<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"873\" height=\"126\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-76.png\" alt=\"\" class=\"wp-image-1267\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-76.png 873w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-76-300x43.png 300w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-76-768x111.png 768w\" sizes=\"auto, (max-width: 873px) 100vw, 873px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">5. Install Fail2ban<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is Fail2ban ?<\/strong><\/h2>\n\n\n\n<p>Fail2ban is an intrusion prevention software framework in Linux that monitors system logs for malicious activity and scans files for any entries matching identified patterns. If Fail2ban detects a spike of failed login attempts, it will automatically add new firewall rules to your iptables and block the source address for a specified time or indefinitely. This helps to protect your server against brute-force attacks, denial-of-service attacks, and other types of malicious activity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security thread if i ignore this Fail2ban<\/strong><\/h2>\n\n\n\n<p>Ignoring Fail2ban in Linux can pose a serious security threat to your system. Fail2ban is a software that helps to protect your system from brute-force attacks, denial-of-service attacks, and other types of malicious activity. If you ignore Fail2ban, your system will be more vulnerable to these attacks.<\/p>\n\n\n\n<p>Here are some of the security threats that you may face if you ignore Fail2ban in Linux:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Brute-force attacks:<\/strong>&nbsp;Attackers can use brute-force attacks to try to guess your passwords. If you ignore Fail2ban, attackers will be able to attempt to guess your passwords without any restrictions. This can lead to your account being compromised.<\/li>\n\n\n\n<li><strong>Denial-of-service attacks:<\/strong>&nbsp;Attackers can use denial-of-service attacks to flood your system with traffic, making it unavailable to legitimate users. If you ignore Fail2ban, attackers will be able to launch denial-of-service attacks against your system without any restrictions. This can make your system unavailable to you and other users.<\/li>\n\n\n\n<li><strong>Other types of malicious activity:<\/strong>&nbsp;Fail2ban can also be used to protect your system from other types of malicious activity, such as port scanning and malware infections. If you ignore Fail2ban, your system will be more vulnerable to these types of attacks.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example :- <\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt-get install fail2ban<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"534\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-77-1024x534.png\" alt=\"\" class=\"wp-image-1268\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-77-1024x534.png 1024w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-77-300x156.png 300w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-77-768x400.png 768w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-77.png 1032w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Create a copy of the default configuration file so you can safely make changes without them being overwritten by system upgrades:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo cp \/etc\/fail2ban\/jail.conf \/etc\/fail2ban\/jail.local<\/code><\/pre>\n\n\n\n<p>Edit the&nbsp;<em>jail.local<\/em>&nbsp;file:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/fail2ban\/jail.local\n<\/code><\/pre>\n\n\n\n<p>The&nbsp;<strong>[sshd]<\/strong>&nbsp;block should look like the following one:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;sshd]\n\nenabled  = true\nport     = ssh\nfilter   = sshd\nlogpath  = \/var\/log\/auth.log\nmaxretry = 5\nbantime = 600<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>6. &nbsp;Install and enable mod_security<\/strong> <\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is Mod-security2<\/strong>&nbsp;?<\/h3>\n\n\n\n<p>ModSecurity, often referred to as mod_security or mod_security2, is an open-source web application firewall (WAF) module that is typically deployed with the Apache HTTP Server. It provides a set of tools for monitoring and securing web applications by applying various security rules and policies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why We need to do this Mod-security2 ?<\/strong><\/h2>\n\n\n\n<p>Implementing ModSecurity, or ModSecurity2, is beneficial for several reasons, especially when it comes to enhancing the security posture of web applications and protecting against various cyber threats. Here are some key reasons why organizations use ModSecurity:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Protection Against Web Application Attacks:<\/strong>&nbsp;ModSecurity acts as a web application firewall (WAF), providing protection against a wide range of web application attacks, including SQL injection, cross-site scripting (XSS), and other common vulnerabilities. It helps to filter malicious traffic before it reaches the web application.<\/li>\n\n\n\n<li><strong>Prevention of SQL Injection and Cross-Site Scripting:<\/strong>&nbsp;SQL injection and XSS are common attack vectors where attackers attempt to inject malicious code into web applications. ModSecurity can detect and prevent these types of attacks by analyzing and filtering incoming requests.<\/li>\n\n\n\n<li><strong>Security Compliance:<\/strong>&nbsp;Many regulatory standards and security best practices recommend or require the implementation of a WAF for web applications. ModSecurity helps organizations achieve and maintain compliance with standards such as PCI DSS (Payment Card Industry Data Security Standard) and others.<\/li>\n\n\n\n<li><strong>Real-time Monitoring and Incident Response:<\/strong>&nbsp;ModSecurity provides real-time monitoring of web traffic and logs security events. This allows security teams to analyze and respond to incidents promptly. The detailed logging helps in identifying the nature of attacks and understanding the security posture of the web application.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Security thread if i ignore Mod-security2<\/strong><\/h2>\n\n\n\n<p>If your\u2019re Ignoring ModSecurity2 then your web applications vulnerable to a range of security threats. Here are some potential security threats and risks associated with not using ModSecurity2:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>SQL Injection Attacks:<\/strong>&nbsp;Without a WAF like ModSecurity, your web applications may be susceptible to SQL injection attacks. Attackers can inject malicious SQL queries into input fields, potentially leading to unauthorized access, data manipulation, or data theft.<\/li>\n\n\n\n<li><strong>Cross-Site Scripting (XSS) Attacks:<\/strong>&nbsp;XSS attacks involve injecting malicious scripts into web pages viewed by other users. Without protection, your applications may be vulnerable to these attacks, which can lead to session hijacking, defacement, or the theft of sensitive information.<\/li>\n\n\n\n<li><strong>Cross-Site Request Forgery (CSRF) Attacks:<\/strong>&nbsp;CSRF attacks involve tricking a user\u2019s browser into making unintended requests. ModSecurity can help detect and prevent these attacks by validating and blocking malicious requests.<\/li>\n\n\n\n<li><strong>Security Compliance Violations:<\/strong>&nbsp;Many regulatory standards and compliance requirements mandate the use of a web application firewall. Ignoring ModSecurity may lead to non-compliance with standards such as PCI DSS, exposing your organization to potential legal and financial consequences.<\/li>\n<\/ol>\n\n\n\n<p><strong>Installation of ModSecurity:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt install libapache2-mod-security2<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"704\" height=\"143\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-24.png\" alt=\"\" class=\"wp-image-1173\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-24.png 704w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-24-300x61.png 300w\" sizes=\"auto, (max-width: 704px) 100vw, 704px\" \/><\/figure>\n\n\n\n<p><strong>Run below code<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo a2enmod security2<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"430\" height=\"95\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-25.png\" alt=\"\" class=\"wp-image-1174\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-25.png 430w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-25-300x66.png 300w\" sizes=\"auto, (max-width: 430px) 100vw, 430px\" \/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>nano \/etc\/apache2\/mods-enabled\/security2.conf<\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;IfModule security2_module&gt;\n        # Default Debian dir for modsecurity's persistent data\n        SecDataDir \/var\/cache\/modsecurity\n        # Include all the *.conf files in \/etc\/modsecurity.\n        # Keeping your local configuration in that directory\n        # will allow for an easy upgrade of THIS file and\n        # make your life easier\n        IncludeOptional \/etc\/modsecurity\/*.conf\n        # Include OWASP ModSecurity CRS rules if installed\n        IncludeOptional \/usr\/share\/modsecurity-crs\/*.load\n&lt;\/IfModule&gt;<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"231\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-26-1024x231.png\" alt=\"\" class=\"wp-image-1175\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-26-1024x231.png 1024w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-26-300x68.png 300w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-26-768x174.png 768w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-26.png 1279w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo mv \/etc\/modsecurity\/modsecurity.conf-recommended \/etc\/modsecurity\/modsecurity.conf\n<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"90\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-27-1024x90.png\" alt=\"\" class=\"wp-image-1176\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-27-1024x90.png 1024w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-27-300x26.png 300w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-27-768x67.png 768w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-27.png 1349w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo nano \/etc\/modsecurity\/modsecurity.conf<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"409\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-29-1024x409.png\" alt=\"\" class=\"wp-image-1178\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-29-1024x409.png 1024w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-29-300x120.png 300w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-29-768x306.png 768w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-29.png 1341w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"550\" src=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-30-1024x550.png\" alt=\"\" class=\"wp-image-1179\" srcset=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-30-1024x550.png 1024w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-30-300x161.png 300w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-30-768x412.png 768w, https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-30.png 1348w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>7. Hide PHP basic information<\/strong><\/h2>\n\n\n\n<p>The first step is to hide the information provided by&nbsp;PHP&nbsp;which some attackers may find useful. Open the&nbsp;<em>php.ini<\/em>&nbsp;file and change the settings to match the following:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>expose_php = Off\ndisplay_errors = Off\nmail.add_x_header = Off<\/code><\/pre>\n\n\n\n<p>Save the file and restart Apahce:sudo systemctl restart apache2.service<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>8. &nbsp;Set maximum execution time<\/strong><\/h2>\n\n\n\n<p>Go to php.ini and do change the following settings:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>max_execution_time = 30\nmax_input_time = 30\nmemory_limit = 40M<\/code><\/pre>\n\n\n\n<p>Ignoring the maximum execution time in Linux can pose a serious security threat to your system. The maximum execution time is a limit on how long a script or program can run. If you ignore the maximum execution time, a malicious script or program can run indefinitely, consuming system resources and potentially harming your system.<\/p>\n\n\n\n<p>Here are some of the security threats that you may face if you ignore the maximum execution time in Linux:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Denial-of-service attacks:<\/strong>&nbsp;Attackers can use denial-of-service attacks to flood your system with long-running scripts or programs, making it unavailable to legitimate users. If you ignore the maximum execution time, attackers will be able to launch denial-of-service attacks against your system without any restrictions. This can make your system unavailable to you and other users.<\/li>\n\n\n\n<li><strong>Resource exhaustion attacks:<\/strong>&nbsp;Attackers can use resource exhaustion attacks to consume all of the system&#8217;s resources, such as CPU time and memory, making it unavailable to legitimate users. If you ignore the maximum execution time, attackers will be able to launch resource exhaustion attacks against your system without any restrictions. This can make your system unavailable to you and other users.<\/li>\n\n\n\n<li><strong>Malware infections:<\/strong>&nbsp;Malware can often be disguised as scripts or programs. If you ignore the maximum execution time, malware can run indefinitely on your system, causing damage and stealing data.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>9. Enable automatic updates<\/strong><\/h2>\n\n\n\n<p>Enabling automatic updates in Ubuntu is a good practice to ensure that your system is always up-to-date with the latest security patches and software updates. Ubuntu provides a tool called <code>unattended-upgrades<\/code> to facilitate automatic updates. Here&#8217;s how you can enable it:<\/p>\n\n\n\n<p>To enable automatic unattended upgrades you should install the&nbsp;<em>unattended-upgrades<\/em>&nbsp;package.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example :- <\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt-get install unattended-upgrades\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>10. Hide the Apache Version number, and other sensitive information<\/strong><\/h2>\n\n\n\n<p>It is essential to hide the Apache Version Number your server is running, as well as other sensitive information. You can do this by following the simple steps listed below.<\/p>\n\n\n\n<p>Add or Edit the following two directives in your httpd.conf file<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>ServerSignature OffServerTokens Prod<\/strong><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>&lt;Directory \/var\/www\/html&gt;\n    Options Indexes FollowSymLinks\n    AllowOverride None\n    Require all granted\n    ServerSignature Off\n&lt;\/Directory&gt;<\/code><\/pre>\n\n\n\n<p>The ServerSignature appears on the bottom of pages generated by apache such as 404 pages, directory listings, etc.<\/p>\n\n\n\n<p>The ServerTokens directive is used to determine what Apache will put in the Server HTTP response header. By setting it to Prod it sets the HTTP response header as follows:<\/p>\n\n\n\n<p>Thanks for learning &#8230; \ud83d\udc4d\ud83d\udc4d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this tutorial we\u2019re going to learn top security checklist for Lampp server. In this tutorial we have to learn lots of security checklist for lampp server,&#8230; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[491],"tags":[488,350,500,88],"class_list":["post-1260","post","type-post","status-publish","format-standard","hentry","category-devsecops","tag-apache-security","tag-devsecops","tag-linux-security","tag-mysql"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Define Security Checklist for LAMPP Server with example ? - DevOps Freelancer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Define Security Checklist for LAMPP Server with example ? - DevOps Freelancer\" \/>\n<meta property=\"og:description\" content=\"In this tutorial we\u2019re going to learn top security checklist for Lampp server. In this tutorial we have to learn lots of security checklist for lampp server,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/\" \/>\n<meta property=\"og:site_name\" content=\"DevOps Freelancer\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/amitsthakurs\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-19T13:00:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-19T13:05:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72-1024x482.png\" \/>\n<meta name=\"author\" content=\"Amit Kumar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/amits_thakurs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amit Kumar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/\"},\"author\":{\"name\":\"Amit Kumar\",\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/#\\\/schema\\\/person\\\/22ed4bd82dc04200a2ca541b3e35fc5b\"},\"headline\":\"Define Security Checklist for LAMPP Server with example ?\",\"datePublished\":\"2023-10-19T13:00:40+00:00\",\"dateModified\":\"2023-10-19T13:05:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/\"},\"wordCount\":2151,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/image-72-1024x482.png\",\"keywords\":[\"apache-security\",\"devsecops\",\"linux-security\",\"mysql\"],\"articleSection\":[\"devsecops\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/\",\"url\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/\",\"name\":\"Define Security Checklist for LAMPP Server with example ? - DevOps Freelancer\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/image-72-1024x482.png\",\"datePublished\":\"2023-10-19T13:00:40+00:00\",\"dateModified\":\"2023-10-19T13:05:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/#\\\/schema\\\/person\\\/22ed4bd82dc04200a2ca541b3e35fc5b\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/image-72.png\",\"contentUrl\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/image-72.png\",\"width\":1105,\"height\":520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/top-security-checklist-for-lampp-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Define Security Checklist for LAMPP Server with example ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/\",\"name\":\"DevOps Freelancer\",\"description\":\"We provide DevOps | SRE | DevSecOps | MLOps Freelancing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/#\\\/schema\\\/person\\\/22ed4bd82dc04200a2ca541b3e35fc5b\",\"name\":\"Amit Kumar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d76fb4d0f15f7a458f1fd91063b44fbb7e7eb9e724b1c465d885054c2540250f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d76fb4d0f15f7a458f1fd91063b44fbb7e7eb9e724b1c465d885054c2540250f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d76fb4d0f15f7a458f1fd91063b44fbb7e7eb9e724b1c465d885054c2540250f?s=96&d=mm&r=g\",\"caption\":\"Amit Kumar\"},\"description\":\"Hi I am Amit Kumar Thakur Experienced as s Software Developer with a demonstrated history of working in the information technology and services industry. Skilled in HTML, CSS, Bootstrap4, PHP, Laravel-9 , REST API,FB API,Google API, Youtube Api, Bitbucket,Github,Linux and jQuery. Strong engineering professional focused in Computer\\\/Information Technology Administration and Management. Currently my profile is to Software Developer, analyze the requirement, creating frame for web application, coding and maintenance.\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/amitsthakurs\\\/\",\"https:\\\/\\\/www.instagram.com\\\/amits_thakurs\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/amits-thakurs\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/amits_thakurs\"],\"url\":\"https:\\\/\\\/www.devopsfreelancer.com\\\/blog\\\/author\\\/amit\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Define Security Checklist for LAMPP Server with example ? - DevOps Freelancer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/","og_locale":"en_US","og_type":"article","og_title":"Define Security Checklist for LAMPP Server with example ? - DevOps Freelancer","og_description":"In this tutorial we\u2019re going to learn top security checklist for Lampp server. In this tutorial we have to learn lots of security checklist for lampp server,...","og_url":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/","og_site_name":"DevOps Freelancer","article_author":"https:\/\/www.facebook.com\/amitsthakurs\/","article_published_time":"2023-10-19T13:00:40+00:00","article_modified_time":"2023-10-19T13:05:36+00:00","og_image":[{"url":"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72-1024x482.png","type":"","width":"","height":""}],"author":"Amit Kumar","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/amits_thakurs","twitter_misc":{"Written by":"Amit Kumar","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/#article","isPartOf":{"@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/"},"author":{"name":"Amit Kumar","@id":"https:\/\/www.devopsfreelancer.com\/blog\/#\/schema\/person\/22ed4bd82dc04200a2ca541b3e35fc5b"},"headline":"Define Security Checklist for LAMPP Server with example ?","datePublished":"2023-10-19T13:00:40+00:00","dateModified":"2023-10-19T13:05:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/"},"wordCount":2151,"commentCount":0,"image":{"@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72-1024x482.png","keywords":["apache-security","devsecops","linux-security","mysql"],"articleSection":["devsecops"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/","url":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/","name":"Define Security Checklist for LAMPP Server with example ? - DevOps Freelancer","isPartOf":{"@id":"https:\/\/www.devopsfreelancer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/#primaryimage"},"image":{"@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72-1024x482.png","datePublished":"2023-10-19T13:00:40+00:00","dateModified":"2023-10-19T13:05:36+00:00","author":{"@id":"https:\/\/www.devopsfreelancer.com\/blog\/#\/schema\/person\/22ed4bd82dc04200a2ca541b3e35fc5b"},"breadcrumb":{"@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/#primaryimage","url":"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72.png","contentUrl":"https:\/\/www.devopsfreelancer.com\/blog\/wp-content\/uploads\/2023\/10\/image-72.png","width":1105,"height":520},{"@type":"BreadcrumbList","@id":"https:\/\/www.devopsfreelancer.com\/blog\/top-security-checklist-for-lampp-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.devopsfreelancer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Define Security Checklist for LAMPP Server with example ?"}]},{"@type":"WebSite","@id":"https:\/\/www.devopsfreelancer.com\/blog\/#website","url":"https:\/\/www.devopsfreelancer.com\/blog\/","name":"DevOps Freelancer","description":"We provide DevOps | SRE | DevSecOps | MLOps Freelancing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.devopsfreelancer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.devopsfreelancer.com\/blog\/#\/schema\/person\/22ed4bd82dc04200a2ca541b3e35fc5b","name":"Amit Kumar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d76fb4d0f15f7a458f1fd91063b44fbb7e7eb9e724b1c465d885054c2540250f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d76fb4d0f15f7a458f1fd91063b44fbb7e7eb9e724b1c465d885054c2540250f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d76fb4d0f15f7a458f1fd91063b44fbb7e7eb9e724b1c465d885054c2540250f?s=96&d=mm&r=g","caption":"Amit Kumar"},"description":"Hi I am Amit Kumar Thakur Experienced as s Software Developer with a demonstrated history of working in the information technology and services industry. Skilled in HTML, CSS, Bootstrap4, PHP, Laravel-9 , REST API,FB API,Google API, Youtube Api, Bitbucket,Github,Linux and jQuery. Strong engineering professional focused in Computer\/Information Technology Administration and Management. Currently my profile is to Software Developer, analyze the requirement, creating frame for web application, coding and maintenance.","sameAs":["https:\/\/www.facebook.com\/amitsthakurs\/","https:\/\/www.instagram.com\/amits_thakurs\/","https:\/\/www.linkedin.com\/in\/amits-thakurs\/","https:\/\/x.com\/https:\/\/twitter.com\/amits_thakurs"],"url":"https:\/\/www.devopsfreelancer.com\/blog\/author\/amit\/"}]}},"_links":{"self":[{"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/posts\/1260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/comments?post=1260"}],"version-history":[{"count":3,"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/posts\/1260\/revisions"}],"predecessor-version":[{"id":1273,"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/posts\/1260\/revisions\/1273"}],"wp:attachment":[{"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/media?parent=1260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/categories?post=1260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsfreelancer.com\/blog\/wp-json\/wp\/v2\/tags?post=1260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}