Maintaining security of your Linux server is extremely important, especially if you use your Linux server for production work for your business. These measures must be configured properly in order for the system to be difficult to hack, preventing any information from being stolen. When it comes to security, Linux-based operating systems have an advantage over other OSes such as Windows or macOS. There’s lots of great tools and features that help you secure your server from unwanted attackers. Let’s go over some of the best ways to secure your Linux server from attacks and hacks.
Linux
How to Install and Connect to NFS Networked Storage on Linux
NFS (Network File System) is a file-sharing protocol designed to function over a network. NFS storage allows us to share anything through a network using any Linux distros. This system was initially developed by Sun Microsystems that allow Linux users to store, share, view, and update files on a remote system as if it was in their local machine. In this article, we will show you how to install and connect to NFS networked storage on Linux.
How to Set up SSH Key Authentication on Linux
With brute-force attacks becoming more and more common, it’s best to prevent any malicious users from ever being able to attempt to guess your password. That’s why it’s important to set up SSH key authentication on your Linux server. Using key-based authentication is a lot safer and can pretty much never be guessed by anyone else. It’s also super easy to set up. Let’s get right into it.
Screen Commands in Linux with Examples
GNU Screen, or screen, is a tool to multiplex a terminal between several processes. With screen, you are able to run multiple session instances from a single terminal session. Let’s go over some useful screen commands in Linux and explain how this versatile tool works.
How to Fix HTTP/2 Rapid Reset CVE-2023-44487 on Linux
The most recent vulnerability sweeping across CDNs and web server development teams is CVE-2023-44487, or the HTTP/2 Rapid Reset vulnerability. In this article, we’ll be giving you our explanation on what this vulnerability does, as well as how to protect yourself from it. We’ll also go over the latest news on this vulnerability’s patches.
Top 10 Docker Commands You Should Know
In this tutorial, we are going to show you the ten most used Docker commands you should know.
Docker is an open-source platform service used for running applications in isolated environments called containers. The containers have their own structure, with encapsulated services that can not interfere with the work of the main server. In this tutorial, we are going to use the Ubuntu 22.04 OS, but you can choose any Linux distro you want.
First, we will install the docker and then show you the ten most used docker commands. Let’s get started!
Understanding the Linux Directory Structure
In this blog post, we are going to explain the Linux Directory Structure and how everything is connected in Linux operating system.
Linux is a very complex system and requires an efficient way to start, stop and maintain the system. Everything in Linux is a file, and even the directories count as files. There are three types of files in the Linux system: general files, directory files, and device files.
In the next paragraphs, we are going to explain the types of files and the most important directories such as root, bin, cdrom, boot, dev, etc, home, lib, mnt, tmp and many more. Let’s get started!
10 Useful YUM Commands in Linux
In this tutorial we are going to show you the most used 10 YUM commands in Linux. YUM is a command-line package management system that is used on CentOS and AlmaLinux.
YUM (shortcat for “Yellowdog Updater Modified“) package manager is responsible for managing the packages from the YUM repositories located on the server at /etc/yum.repos.d/. In this tutorial we are going to install, remove, update software packages with real example.
The YUM command examples will be explained on the CentOS 7 OS. Let’s get started!