Security

How to Enable SSH on Debian 12

March 20, 2024

If you are using Debian 9 or Debian 10 to manage servers, you must ensure that the transfer of data is as safe as possible. This tutorial covers the necessary steps you need to take to establish a secure connection with a remote machine by using SSH.

Read more

How to Generate SSH Keys on Ubuntu

March 7, 2024

This article is meant to help system administrators configure SSH Keys on Ubuntu. The instructions allow you to set up encrypted credentials quickly.

Read more

How to Set up and Enable Automatic Updates on Ubuntu


If you do not keep your Ubuntu operating system up-to-date, you run the risk of compromising overall system security. Managing the process manually, wastes valuable resources and can even lead to overlooking essential security updates. In this tutorial, we explain how to Enable automatic security updates in Ubuntu 18.04. Doing so ensures your system stays protected with the latest security packages at all times.

Read more

How to Generate CSR With OpenSSL


A Certificate Signing Request (CSR) is the first step in setting up an SSL Certificate on your website. An SSL Certificate secures and encrypts traffic between a client and a website. This guide will walk you through generating a CSR.

Read more

How to Install Vault on Ubuntu

March 4, 2024

Store, control, and protect the data you use for authentication or authorization by installing Vault in your Ubuntu 18.04 system. In this tutorial you will learn step by step how to install and configure Vault, as well as how to set up Consul.

Read more

Apache Log Files: How to View, Configure & Use Them

February 28, 2024

Apache is part of the LAMP stack of software for Linux (Linux, Apache, MySQL, PHP). Learn about Apache logs in this comprehensive guide. See the difference between error and access logs and how to set up HTTP server logging.

Read more

How to Fix "ssh_exchange_identification: read: Connection reset by peer" Error

January 19, 2024

This article deals with the most common causes of the "ssh_exchange_identification: read: Connection reset by peer" error. At the same time, we offer expert solutions for this error, such as managing Host-Based Access Control Lists, changing Intrusion prevention software settings, and editing the SSH daemon configuration file.

Read more

How to Remove a Directory in Linux with rm & rmdir Commands

January 18, 2024

Linux offers different ways to remove directories without using the GUI. In this tutorial, learn how to remove directories in the terminal window or command line using Linux commands.

Read more

How to Kill a Process in Linux from Command Line?

December 13, 2023

If a Linux process becomes unresponsive or is consuming too many resources, you may need to kill it. This complete guide shows how to kill a Linux process using the command line.

Read more

How to Reset or Change MySQL Root Password on Linux or Windows

December 12, 2023

MySQL is a database management system. It’s operated under the Open Source software model and has become a very popular software package for web application software. Like many web services, MySQL has an administrator-level or root password. The root password allows a user to perform all top-level functions in the database.

Read more