How to Use the su Command in Linux with Examples


Learn how to use the su command with practical examples and explanations. Change users in the terminal window or switch to the root in a single step. This article tells you all you need to know about su.

Read More

How to Set Up a Firewall with UFW on Ubuntu 18.04


UFW is a simple interface implemented on top of iptables that provides an easier way to configure a firewall. Use it to define rules of communication to and from a server and ensure your Ubuntu 18.04 is protected.

Read More

How to Install Hashicorp Vault on Ubuntu 18.04


Store, control, and protect the data you use for authentication or authorization by installing Vault in your Ubuntu 18.04 system. In this tutorial you will learn step by step how to install and configure Vault, as well as how to set up Consul.

Read More

How to Install Hashicorp Vault on CentOS 7


If you need a management system that will store and protect your authentication and authorization data, you may want to install Vault. Apart from managing access to passwords, certificates, and APIs, Vault also provides on-demand secrets,…

Read More

DNS Best Practices for Security and Performance


DNS management is a significant hurdle in enterprise environments. DNS infrastructure needs to be organized properly to avoid security and performance issues. By following DNS best practices, most potential problems can be evaded.

Read More

How to Add User to a Group in Linux


By following the steps in this tutorial you will learn how to add a user to a group in Linux. Read the easy steps and learn how to expand your team. You will learn how to manage privileges for several users at once. Linux groups allow you to manage…

Read More

How to Install NMAP on Ubuntu 18.04


This article will help you how to install Nmap on Ubuntu 18.04 as well as explore some of the options it has to offer. Use Nmap to discover network vulnerabilities on remote computer networks.

Read More

5 Linux SSH Security Best Practices to Secure Your Systems


The article covers the 5 most common and efficient ways to secure an SSH connection. The listed solutions go a long way in preventing malicious activity and protecting your servers.

Read More

How to Create a New MySQL Account and Grant Privileges


MySQL is a database application for Linux. It’s part of the LAMP (Linux, Apache, MySQL, PHP) stack that powers many features on the internet. A MySQL installation starts by default with a root user, but it’s better to create a specific user account…

Read More

Linux File Permission Tutorial: How to Check and Change Permissions


The file permission feature specifies how much power each user has over a given file or directory. To understand Linuxfile permissions, you need to get to know the different permission classes and levels. Once you have learned how to interpret…

Read More