Security

How to Delete Iptables Rule

November 8, 2022

Learn how to list and delete iptables rules and protect your system.
This tutorial will teach you how to harvest the full potential of the Linux firewall.

Read more

AppArmor vs. SELinux: Comprehensive Comparison

November 2, 2022

AppArmor and SELinux, allow system administrators to grant or deny access to resources and control systems built into the Linux kernel.
In this text, you'll learn how the tools differ.

Read more

How to Add a User to a Linux Group

August 19, 2022

By following the steps in this tutorial you will learn how to add a user to a group in Linux. Read the easy steps and learn how to expand your team. You will learn how to manage privileges for several users at once. Linux groups allow you to manage multiple user permissions more quickly and easily.

Read more

What is an SSL Certificate?

March 10, 2022

SSL certificates encrypt data sharing between a web server and a client browser to ensure information is kept safe and secure. Learn more about SSL certificate and find out why you should have one.

Read more

14 Dangerous Linux Terminal Commands

November 17, 2021

It is always dangerous to run a Linux terminal command when you aren't sure what it does. This article lists 14 Linux commands that can have adverse effects on your data or system.

Read more

Should You Backup Office 365 Data?

November 4, 2021

Office 365, now known as Microsoft 365, is a suite of cloud-based applications and services for personal and business users. This article will discuss the importance of backing up your Office 365 emails and provide you with backup solutions.

Read more

How to Install PuTTY on Mac

September 21, 2021

This step-by-step tutorial shows how you can install PuTTY on your macOS. PuTTY is a popular, open-source Telnet and SSH client, originally developed for Windows, and later ported to macOS.

Read more

How to Install PuTTY on Ubuntu

September 17, 2021

PuTTY is an open-source session management client. Although it was originally developed for Windows, it is available on Linux, too. This tutorial shows how to install PuTTY on Ubuntu.

Read more

Shared Nothing Architecture Explained

September 2, 2021

The Shared Nothing Architecture allows you to build a scalable, fault tolerant system consisting of independent, self-sufficient nodes. Learn more about Shared Nothing and how it compared to other models.

Read more

CI/CD Security - How to Secure Your CI/CD Pipeline

August 26, 2021

Applications must be secure, but what about the application production line itself? The CI/CD pipeline constantly moves and there are many security challenges to face. Learn about how you can secure the CI/CD pipeline with a list of some of the best practices.

Read more
1 5 6 7 8 9 12