How to Install PuTTY on Windows

August 23, 2021

PuTTY is a free SSH and Telnet client for windows. This tutorial shows how to install PuTTY on Windows in several easy steps.

Read more

How to Use Public Key Authentication with SSH

August 10, 2021

Public Key Authentication is the secure way to connect via SSH. Through this guide, you will learn how to generate a key pair and use them to connect to a remote server via SSH.

Read more

SSHFS: How to Mount Remote File Systems Over SSH

July 26, 2021

Need to transfer files between two machines securely? Try the SSHFS client, which mounts a remote file system directly to your local machine and uses the SSH file transfer protocol.

Read more

What is Intel SGX and What are the Benefits?

July 19, 2021

Learn what Intel SGX is and how it works in this informative article. Take a look how to recognize which BMC servers support Intel SGX.

Read more

10 Database Security Best Practices

July 13, 2021

Database security involves all aspects of security. Many unwanted database breaches and information compromises are avoidable when sticking to the best security practices. Learn how you can best secure your data to avoid disasters.

Read more

How to Provision and Secure Tokens and Secrets in phoenixNAP EMP

June 3, 2021

Learn how to provision and secure tokens, secrets, and other security objects in phoenixNAP EMP.

Read more

Telnet vs. SSH: How Is SSH Different From Telnet?

May 20, 2021

Telnet and SSH are network protocols used to connect to remote system. This tutorial covers the ways they work, what makes them different, and when to use them.

Read more

How to Set Up BMC Drive Encryption Using EMP

May 19, 2021

This tutorial explains how to encrypt a BMC drive using the phoenixNap EMP platform as well as how to automate the unlocking process. Follow this three part tutorial to secure your disk.

Read more

Fail2Ban Installation & Setup: Ubuntu, CentOS, Fedora & Debian

May 13, 2021

Introduction Fail2ban is a software that protects your server from brute force attacks. It does this by monitoring server logs and detecting any suspicious activity. The program detects when there is an unreasonable number of failed attempts and automatically adds new to iptables that block the given IP. This IP (or host) is then blocked for a specified […]

Read more

phoenixNAP EMP Account Provisioning and Overview

May 6, 2021

Get acquainted with phoenxNAP’s EMP and learn how to create, manage, and maintain accounts and users.

Read more