How to Enable SSH on Raspberry Pi {Linux, Mac OS, Windows}


This article shows you how to enable SSH on your Raspberry Pi using different methods. The guide also provides an essential tip on how to improve the security of your Raspberry Pi device. If you are not sure how to SSH into the device, we got that…

Read More

6 Kubernetes Security Best Practices: Secure Your Workloads


This article presents basic security principles such as defense-in-depth and restricted privilege. Learn how to apply these principles in a distributed system such as a Kubernetes cluster.

Read More

How to Find and Terminate / Kill MySQL Process


Killing a MySQL process can help you boost the performance of your server. By running a few commands, you can identify which processes might be holding back your system and then kill individual processes or all of them.

Read More

5 Linux SSH Security Best Practices to Secure Your Systems


The article covers the 5 most common and efficient ways to secure an SSH connection. The listed solutions go a long way in preventing malicious activity and protecting your servers.

Read More

How to Install and Use Nmap Network Scanner on Linux


Learn how to install Nmap on a Linux based system and use it to retrieve valuable information from remote systems.

Read More

How to Enable and Use firewalld on CentOS 7


This phoenixNAP guide instructs how to enable and start firewalld on CentOS 7. It explains basic firewall zone concepts and teaches you how to work with default firewalld zones.

Read More

How to Disable or Turn Off Firewalld on CentOS 7


Firewalld is a dynamically managed firewall solution that supports network zoning. As of CentOS 7, firewalld (Dynamic Firewall Manager) is the default firewall tool on CentOS servers. Admins might need to disable firewalld for testing or switching…

Read More

How to Install Sophos Intercept X Advanced for Server


If you are using the Sophos Central Admin platform to manage and secure your devices, you will want to activate Server Protection. Deploy Sophos agents on Linux and Windows servers quickly and easily, with the step-by-step help of this installation…

Read More

How to Enable SSH on Ubuntu 18.04


When establishing a remote connection between a client and a server, a primary concern is ensuring a secure connection. For Linux users, the best practice of accessing and managing your server remotely is through the cryptographic protocol known as…

Read More

21 Server Security Tips to Secure Your Server


Hackers are always on the lookout for server vulnerabilities. Minimize risks and be confident your data is safe on secure servers by implementing our server security best practices.

Read More