How to Create and Delete a User on Debian 9

How to Create and Delete a User on Debian 9

In this tutorial, we will show you how to create and delete a user on Debian 9. In the initial server setup, there is only one user account created and that is “root” user account. This root user has the highest privileges and has access to all files and commands on the system. But having too many privileges and running as root user is not always recommended and if you are not careful enough it can have destructive consequences for your system.

That’s why it is recommended to create additional users with limited privileges for your most common tasks. A new user account should also be created for any other user that will be using your server. Additionally, we will also show you how to give those users root privileges when necessary through the sudo command.

Read More

How to Install ELK Stack on Debian 9

How to Install ELK stack on Debian 9

installing elk stack on debian 9In this tutorial, we will show you how to install  ELK Stack on Debian 9. ELK stack is a collection of three open-source products, Elasticsearch, Logstash, and Kibana, and is a robust solution for searching, analyzing, and visualizing data. Elasticsearch is a distributed, RESTful search and analytics NoSQL engine based on Lucene, Logstash is a light-weight data processing pipeline for managing events and logs from a wide variety of sources and Kibana is a web application for visualizing data that works on top of Elasticsearch. This ELK Stack tutorial should work on other Linux VPS systems as well but be tested and written for a Debian 9 VPS. Installing ELK Stack on Debian 9 is an easy and straightforward task, just follow the steps below, and you should have it installed in less than 10 minutes.

Read More

How to install NextCloud 13 on Debian 9

How to install NextCloud 13 on Debian 9

We’ll show you, how to install NextCloud 13 on Debian 9. Nextcloud is an open-source software suite that allows users to store their data such as files, contacts, calendars, news feed, TODO lists and much more, on their personal servers. It is using standard protocols such as webdavm, carddav and caldav. It also provides client applications so users can easily manage and synchronize their data among Linux, MacOS, Windows platforms and smart phones, which makes Nextcloud a great free alternative to proprietary cloud services such as Dropbox, Google Drive, iCloud, etc…

Read More

How to Install Nginx on Debian 9

How to Install Nginx on Debian 9

Nginx is a free, open-source and high-performance HTTP server. It is widely used for load balancing,  mail proxy server,  generic TCP/UDP proxy server, it provides reverse proxy configuration, media streaming and much more. It is designed to efficiently serve both low and high traffic websites and it is a very popular alternative to the Apache web server. Nginx is powering a lot of heavily loaded websites like Yandex, DropBox, NetFlix, WordPress.

In this tutorial, we will show you how to install and configure Nginx on Debian. Installing Nginx on a Debian server is a very easy task, and if you carefully follow all the instructions provided below, you should have your Nginx server up and running in less than 10 minutes. This tutorial has been written for and tested on Debian 9 VPS.

Read More

How to Change the root Password in Linux

How to Change Root Password in Linux
How to Change Root Password in Linux

Change Root Password LinuxIn today’s tutorial, we will show you how to change the root password in Linux. The root account on a Linux machine is the highest authority account on the system. It has control over everything, can delete and modify anything, and has permission to run any program. Simply put, the root account can do anything that the system supports. Typically, casual users never need to use the root account, while more experienced users need the root account more often, especially if they spend a large amount of their time at a terminal. So, even if you don’t use the root account much, it helps to put a more secure password so that malicious users don’t log into the root account and wreak havoc on your system.

Read More