Security

How to Generate & Set Up SSH Keys on Debian 10

September 14, 2020

This article will help system administrators configure SSH Keys on Debian 10. The instructions allow you to set up encrypted credentials quickly, log in remotely, and disable authentication.

Read more

10 Docker Security Best Practices


This article provides 10 container security tips that can help you prevent attacks and privilege breaches. It explains the importance of keeping containers updated, privileges and resources limited, and provides other useful security practices.

Read more

CentOS 6 End of Life in November 2020

September 4, 2020

CentOS 6 EOL is coming up on November 2020. This Linux distribution will no longer be supported with updates and patches, so make sure you upgrade or mitigate your systems on time.

Read more

Ultimate Guide to Types of SSL Certificates

August 20, 2020

While they all encrypt data, not all SSL certificates provide the same features to their users. Learn about all the types of SSL certificates on the market and see what they can do for your website.

Read more

pfSense vs. Sophos: The Main Differences

August 6, 2020

This article is meant to assist readers in determining whether pfSense or Sophos would better fit their system's requirements. It contains a clear and brief overview of pfSense and Sophos' characteristics.

Read more

The Difference Between sudo and su Explained

August 3, 2020

Learn when to use the su command and when to use the sudo command. While su is mostly used for account switching, sudo is utilized for executing commands that require root privileges. Find out more about SU vs. SUDO in this in-depth comparison.

Read more

How to Secure Nginx with Let's Encrypt On Ubuntu 20.04 / 18.04

July 9, 2020

This guide shows you how to secure your Nginx with Let’s Encrypt that generates SSL/TLS certificates for your domain. In addition, you will learn how to enabled Certbot to renew certificates automatically.

Read more

How to Create MariaDB User and Grant Privileges

March 18, 2020

Once you install MariaDB, one of the first things you need to do is to create a new MariaDB user. This article explains how to create a MariaDB user, and then how to grant privileges to the newly created user.

Read more

6 Kubernetes Security Best Practices: Secure Your Workloads

January 23, 2020

This article presents basic security principles such as defense-in-depth and restricted privilege. Learn how to apply these principles in a distributed system such as a Kubernetes cluster.

Read more

How to Install Vault on CentOS and Rocky Linux

December 17, 2019

If you need a management system that will store and protect your authentication and authorization data, you may want to install Vault. Apart from managing access to passwords, certificates, and APIs, Vault also provides on-demand secrets, encryption, and revocation. Follow this simple guide to install Vault on a CentOS 7 system.

Read more