Security

How to Fix the SSH "Connection Refused" Error

November 12, 2020

Fix SSH connection refused by troubleshooting some of the common causes for this problem. Take a look of all the reasons for connection refused error and how to fix the problem.

Read more

Ubuntu 16.04 End of Life in April 2021

October 21, 2020

Ubuntu 16.04 EOL is coming up on April, 2021. This Linux distribution will no longer be supported with updates and patches, so make sure you upgrade or mitigate your systems on time.

Read more

How to Make curl Ignore Certificate Errors

October 13, 2020

Learn how to make curl ignore certificate errors by adding the required option to the command. Ignoring certificate errors, should only be practiced for development purposes. Skip checking for SSL certificates only if needed.

Read more

How to Generate & Set Up SSH Keys on Debian 10

September 14, 2020

This article will help system administrators configure SSH Keys on Debian 10. The instructions allow you to set up encrypted credentials quickly, log in remotely, and disable authentication.

Read more

10 Docker Security Best Practices


This article provides 10 container security tips that can help you prevent attacks and privilege breaches. It explains the importance of keeping containers updated, privileges and resources limited, and provides other useful security practices.

Read more

CentOS 6 End of Life in November 2020

September 4, 2020

CentOS 6 EOL is coming up on November 2020. This Linux distribution will no longer be supported with updates and patches, so make sure you upgrade or mitigate your systems on time.

Read more

Ultimate Guide to Types of SSL Certificates

August 20, 2020

While they all encrypt data, not all SSL certificates provide the same features to their users. Learn about all the types of SSL certificates on the market and see what they can do for your website.

Read more

How to Use the sudo Command in Linux

August 18, 2020

sudo stands for SuperUser DO, and it’s used to temporarily elevate privileges in Linux. This guide will show you several ways that sudo command can be used.

Read more

How to Change File Permissions Recursively with chmod in Linux

August 17, 2020

Setting file and directory permission properly is important in multi-user systems such as Linux. You can set permission recursively using the chmod or find command and grant privileges or restrict access in a single command.

Read more

pfSense vs. Sophos: The Main Differences

August 6, 2020

This article is meant to assist readers in determining whether pfSense or Sophos would better fit their system's requirements. It contains a clear and brief overview of pfSense and Sophos' characteristics.

Read more
1 3 4 5 6 7 12