Security

How to Set Up BMC Drive Encryption Using EMP

May 19, 2021

This tutorial explains how to encrypt a BMC drive using the phoenixNap EMP platform as well as how to automate the unlocking process. Follow this three part tutorial to secure your disk.

Read more

Fail2Ban Installation & Setup: Ubuntu, CentOS, Fedora & Debian

May 13, 2021

Introduction Fail2ban is a software that protects your server from brute force attacks. It does this by monitoring server logs and detecting any suspicious activity. The program detects when there is an unreasonable number of failed attempts and automatically adds new to iptables that block the given IP. This IP (or host) is then blocked for a specified […]

Read more

phoenixNAP EMP Account Provisioning and Overview

May 6, 2021

Get acquainted with phoenxNAP’s EMP and learn how to create, manage, and maintain accounts and users.

Read more

What is chroot jail and How to Use it?

April 15, 2021

A chroot jail is created when a system's root folder is changed to once chosen by a user.
This tutorial covers possible uses for a chroot jail and how you can set one up.

Read more

RPKI Explained - Secure BGP Routing

April 1, 2021

RPKI makes BGP more secure and reliable. Learn about the flaws of BGP, what RPKI is and how it works.

Read more

TLS vs SSL: What's the Difference?

March 25, 2021

TLS and SSL protocols serve to encrypt the data exchanged between a user and a web server.
This tutorial will show you how they work, what makes them different, and which one you should ultimately use.

Read more

How To Use The Modprobe Command In Linux

February 11, 2021

The Linux kernel is extensible and uses modules (drivers) to make the communication between hardware and software run smoothly. Learn how to add and remove official modules using the modprobe command.

Read more

How To Use The Passwd Command In Linux

January 26, 2021

Passwords are the most important feature of security. This article explains and shows examples of how to use the passwd command in Linux to manage passwords for accounts.

Read more

How VMware Tenants Apply the Fortanix Encryption Policy

January 14, 2021

The Fortanix Key Management Service (KMS) provides enhanced privacy compliance in multi-tenant cloud environments. Learn how to expose the policy as a service provider, and apply it as a tenant on PhoenixNAP's Data Security Cloud.

Read more

What is Umask and How to Use It

December 30, 2020

The umask command on Linux lets you interact with your system's default permissions and fine-tune permissions for new files and folders.
This tutorial shows you what umask is, how it works, and how best to use it.

Read more
1 5 6 7 8 9 12