Security

How to Install PuTTY on Ubuntu

September 17, 2021

PuTTY is an open-source session management client. Although it was originally developed for Windows, it is available on Linux, too. This tutorial shows how to install PuTTY on Ubuntu.

Read more

Shared Nothing Architecture Explained

September 2, 2021

The Shared Nothing Architecture allows you to build a scalable, fault tolerant system consisting of independent, self-sufficient nodes. Learn more about Shared Nothing and how it compared to other models.

Read more

How to List Running Processes in Linux


Tracking and managing running processes is an important part of Linux administration. This tutorial shows different methods you can use to list running processes in Linux.

Read more

CI/CD Security - How to Secure Your CI/CD Pipeline

August 26, 2021

Applications must be secure, but what about the application production line itself? The CI/CD pipeline constantly moves and there are many security challenges to face. Learn about how you can secure the CI/CD pipeline with a list of some of the best practices.

Read more

How to Install PuTTY on Windows

August 23, 2021

PuTTY is a free SSH and Telnet client for windows. This tutorial shows how to install PuTTY on Windows in several easy steps.

Read more

How to Use Public Key Authentication with SSH

August 10, 2021

Public Key Authentication is the secure way to connect via SSH. Through this guide, you will learn how to generate a key pair and use them to connect to a remote server via SSH.

Read more

SSHFS: How to Mount Remote File Systems Over SSH

July 26, 2021

Need to transfer files between two machines securely? Try the SSHFS client, which mounts a remote file system directly to your local machine and uses the SSH file transfer protocol.

Read more

What is Intel SGX and What are the Benefits?

July 19, 2021

Learn what Intel SGX is and how it works in this informative article. Take a look how to recognize which BMC servers support Intel SGX.

Read more

How to Provision and Secure Tokens and Secrets in phoenixNAP EMP

June 3, 2021

Learn how to provision and secure tokens, secrets, and other security objects in phoenixNAP EMP.

Read more

Telnet vs. SSH: How Is SSH Different From Telnet?

May 20, 2021

Telnet and SSH are network protocols used to connect to remote system. This tutorial covers the ways they work, what makes them different, and when to use them.

Read more