CrowdSec - Open Source Security Automation Tool
CrowdSec is a massively multiplayer firewall designed to protect Linux servers, services, containers, or virtual machines exposed on the internet with a server-side agent. It was inspired by Fail2Ban and aims to be a modernized, collaborative version of that intrusion-prevention tool. CrowdSec is free and...
NMap - A Basic Security Audit of Exposed Ports and Services
Learn how to use NMap to do basic scans for open ports. Use additional NMap vulnerability scanning scripts for important security audits.
3 Privacy & Security Focused Linux Distributions to Try in 2020
3 Linux based operating systems to help preserve your online anonymity, privacy and security. 3 operating systems with 3 different approaches to security.
How to Install Nextcloud on CentOS 9
Nextcloud is a robust, self-hosted file-sharing platform that allows you to control your data, providing a secure alternative to commercial cloud services. It's an excellent choice for those who want to manage their cloud storage service, whether for personal use or within an organization. Installing...
DirectAdmin - How to Install on Ubuntu 22.04
If you are looking for a user-friendly way to manage your web hosting on Ubuntu 22.04, then consider using DirectAdmin! DirectAdmin is a web-based control panel for web hosting that helps you in the management of databases, websites, email accounts, FTP, site backup, error pages,...
Securely Erase a SATA Hard Drive for Disposal using hdparm in Linux
Learn how to securely erase a SATA hard drive before disposal using hdparm in Linux. Ensure your data is safe.
Automatically Install Updates on RHEL8 or Fedora
Learn how to configure your systems to automatically install updates using dnf. Perfect for that Red Hat or Fedora workstation that needs to patched.
SFTP, FTPS, and SCP - What's the Difference?
What is the difference between SCP, SFTP, and FTPS? In this article we try to highlight the differences, strengths and limitations of each protocol.
4 Way Honey Tokens Help Detect Cybercriminals
4 ways honey tokens can be used to detect cyber criminals. Learn what a honey token is and how it is used by cybersecurity professionals.
Shred Command - Securely Erase Files or Entire Disk on Linux
The shred command allows you to securely delete files on a Linux system. We will cover how to use shred and it's command line options.