Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In a nutshell: Set up your VM (or whatever), harden the base against intrusion as needed (per the OS provider or application's recommendations) then set up your services following the given guide for a service.

BIND, NGINX, Postfix, Apache... they all have excellent documentation on setup and securing.

I'm curious which aspect your seeing as poorly documented. Perhaps some specificity would help others point you at a reference.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: