Security

How to Install OpenVPN on CentOS and Rocky Linux

December 19, 2024

In this tutorial, you will learn how to set up OpenVPN on a CentOS 7 server and how to connect to OpenVPN from a client machine. Establish a secure connection to a company network, bypass geo-restrictions, and allow you to surf the web using public Wi-Fi networks while keeping your data private with OpenVPN.

Read more

15 DNS Best Practices for Security and Performance

December 5, 2024

DNS management is a significant hurdle in enterprise environments. DNS infrastructure needs to be organized properly to avoid security and performance issues. By following DNS best practices, most potential problems can be evaded.

Read more

How to Disable SELinux on CentOS and Rocky Linux

November 27, 2024

This tutorial explains how to check the SELinux status and disable the service on CentOS and Rocky Linux..

Read more

How to Disable and Stop firewalld on CentOS or Rocky Linux

November 13, 2024

firewalld is the default firewall tool on CentOS and Rocky Linux servers. This tutorial shows you how to disable and stop the firewalld service.

Read more

How to Enable and Use firewalld on CentOS or Rocky Linux

November 6, 2024

This phoenixNAP guide instructs how to enable and start firewalld on CentOS or Rocky Linux. It explains basic firewall zone concepts and teaches you how to work with default firewalld zones.

Read more

SSH Public Key Authentication: How to Configure

October 31, 2024

This article explains how to generate a key pair and use them to connect to a remote server via SSH.

Read more

How to Connect to a Remote Server via SSH from Windows, Linux, or Mac

October 24, 2024

In this tutorial, find out How To Use SSH to Connect to a Remote Server in Linux, Mac, or Windows.

Read more

Legacy Application Migration: Benefits, Challenges & Best Practices

October 17, 2024

Legacy application migration is often a necessary and difficult process. This guide takes you through the benefits, challenges, and best practices when moving legacy applications to a new and modern system.

Read more

How to Enable SSH on Ubuntu

October 3, 2024

For Linux users, the best practice of accessing and managing your server remotely is through Secure Shell (SSH). This tutorial shows how to enable, install and configure SSH on Ubuntu.

Read more

Linux chown Command: Syntax, Options & Examples


The chown command changes user ownership of a file, directory, or link in Linux. This tutorial shows how to execute the Linux chown command to control who can modify file contents.

Read more
1 2 3 12