How to Expose and Apply Fortanix Encryption Policy to VMware Tenants


The Fortanix Key Management Service (KMS) provides enhanced privacy compliance in multi-tenant cloud environments. Learn how to expose the policy as a service provider, and apply it as a tenant on PhoenixNAP's Data Security Cloud.

Read More

What is Umask and How to Use It


The umask command on Linux lets you interact with your system's default permissions and fine-tune permissions for new files and folders. This tutorial shows you what umask is, how it works, and how best to use it.

Read More

How to Install OpenVPN on CentOS 7 or 8


In this tutorial, you will learn how to set up OpenVPN on a CentOS 7 server and how to connect to OpenVPN from a client machine. Establish a secure connection to a company network, bypass geo-restrictions, and allow you to surf the web using public…

Read More

How to Build Linux Kernel From Scratch {Step-By-Step Guide}


All Linux distributions come with a predefined kernel. However, they are usually outdated. Follow this step-by-step guide to learn how to build a Linux kernel from scratch.

Read More

How to Fix the SSH “Connection Refused” Error


Fix SSH connection refused by troubleshooting some of the common causes for this problem. Take a look of all the reasons for connection refused error and how to fix the problem.

Read More

Ubuntu 16.04 End of Life in April 2021


Ubuntu 16.04 EOL is coming up on April, 2021. This Linux distribution will no longer be supported with updates and patches, so make sure you upgrade or mitigate your systems on time.

Read More

How to Make curl Ignore Certificate Errors


Learn how to make curl ignore certificate errors by adding the required option to the command. Ignoring certificate errors, should only be practiced for development purposes. Skip checking for SSL certificates only if needed.

Read More

How to Generate & Set Up SSH Keys on Debian 10


This article will help system administrators configure SSH Keys on Debian 10. The instructions allow you to set up encrypted credentials quickly, log in remotely, and disable authentication.

Read More

10 Docker Security Best Practices


This article provides 10 container security tips that can help you prevent attacks and privilege breaches. It explains the importance of keeping containers updated, privileges and resources limited, and provides other useful security practices.

Read More

CentOS 6 End of Life in November 2020


CentOS 6 EOL is coming up on November 2020. This Linux distribution will no longer be supported with updates and patches, so make sure you upgrade or mitigate your systems on time.

Read More