How to Secure Nginx with Let’s Encrypt On Ubuntu 20.04 / 18.04


This guide shows you how to secure your Nginx with Let’s Encrypt that generates SSL/TLS certificates for your domain. In addition, you will learn how to enabled Certbot to renew certificates automatically.

Read More

How to Use SSH Port Forwarding


This article demonstrates 3 distinct methods used to port forward SSH connections. It examines the syntax of the individual commands and teaches you everything you need to know to implement SSH port forwarding successfully.

Read More

How to Generate SSH Key in Windows 10


This article explains two methods of generating SSH keys on a Windows 10 system. One method uses the PuTTY tool, while the other uses the OpenSSH client utility.

Read More

How to Fix “ssh_exchange_identification: read: Connection reset by peer” Error


This article deals with the most common causes of the "ssh_exchange_identification: read: Connection reset by peer" error. At the same time, we offer expert solutions for this error, such as managing Host-Based Access Control Lists, changing…

Read More

How to Install SSL Certificate on NGINX


Install an SSL Certificate on NGINX to ensure a safe connection between your web server and browser. Encrypt transmitted data over the internet so that it is only visible to the intended recipient.

Read More

How to Create MariaDB User and Grant Privileges


Once you install MariaDB, one of the first things you need to do is to create a new MariaDB user. This article explains how to create a MariaDB user, and then how to grant privileges to the newly created user.

Read More

Iptables Tutorial: Ultimate Guide to Linux Firewall


Learn how to use iptables commands and see how iptables works. By following the instructions listed in this article, you'll get a better understanding of network packets, and can configure basic rules for your system and set up ports on the firewall…

Read More

6 Kubernetes Security Best Practices: Secure Your Workloads


This article presents basic security principles such as defense-in-depth and restricted privilege. Learn how to apply these principles in a distributed system such as a Kubernetes cluster.

Read More

How to Use the su Command in Linux with Examples


Learn how to use the su command with practical examples and explanations. Change users in the terminal window or switch to the root in a single step. This article tells you all you need to know about su.

Read More

How to Set Up a Firewall with UFW on Ubuntu 18.04


UFW is a simple interface implemented on top of iptables that provides an easier way to configure a firewall. Use it to define rules of communication to and from a server and ensure your Ubuntu 18.04 is protected.

Read More