Sudoers File featured image

Configuring the Linux Sudoers File

Introduction Do you ever wonder why you must type “sudo” while trying to execute certain commands in a Linux or Unix Operating System environment? Sudo is actually an abbreviation, standing for “super-user do”. When you use the sudo command, you can run programs and execute commands with the security privileges of another user. By default, the sudo command allows system …

Apache Server featured image

Installing the Apache Server on Ubuntu 18.04: A How-To Guide

Introduction The Apache HTTP Server is an open-source web server by the Apache Software Foundation. It is a software that connects your local server to the website servers such as Firefox or Google Chrome. This connection is used to send and receive files and data. It is the most popular server across the globe. Over 40% of all websites on …

Kubernetes

Getting to Know Kubernetes

Container Technology and Docker The idea of using containers for deployment in an application environment is not new. People have been using it for several years and with much success. With the help of containers, developers are able to isolate an application’s coding and configuration in an executable package. This prevents needless interference and hangups that would only slow down …

Nginx with Let's Encrypt featured image

How to Secure Nginx with Let’s Encrypt on Ubuntu 20.04

Having a secure website is vital to ensuring a reputable online presence for any business. Website security should be among your top concerns especially if you are transferring sensitive data between your website and your website visitors. A simple Google search of ‘how to secure a website’ will bring you several directives. One of the top results is an SSL …

Let’s Encrypt

Securing Apache with Let’s Encrypt on Ubuntu 18.04

Website and data security are topics that cannot be taken lightly. Highly sensitive information which includes financial records and customers’ private information is always in transit between the user’s computer and your website. When you consider this fact, it’s not hard to see why unsecured websites could result in a breach that could seriously damage your business. There are a …

SSH Key

Configuring Your Linux Server to Use SSH Key-Based Authentication

SSH on a Linux Server SSH, also known as secure shell, is a protocol that can be used to connect and communicate with a server. You can connect to your Linux server for a terminal session using this encrypted protocol. If you are using an OpenSSH server, there are primarily two different ways you can go about the authentication process. …

phpMyAdmin

Installing and Securing phpMyAdmin on Ubuntu 18.04

MySQL is an open-source RDBMS based on SQL queries. It’s easy to use, secure, free, and open-source (under the GNU license). In addition, it is highly flexible, memory efficient, and high-performance. Because of all these features, MySQL finds its way in even the top-tier industries. When working with MySQL, most of the time, the interactions occur through the MySQL CLI …

LAMP Stack featured image

How To Install Linux, Apache, MySQL, PHP (LAMP) stack on CentOS 7

LAMP is an acronym of a very popular web stack – Linux, Apache, MySQL, PHP. All of the four components of LAMP are open-sourced and are suitable to deploy dynamic websites and web applications. In this tutorial,  we will walk you through setting up a cloud server with the LAMP stack. LAMP Stack: L – Linux L in LAMP stands for …

FirewallD featured image

Setting Up a Firewall with FirewallD on CentOS 7

Introduction Firewalld is a firewall management solution that is available to many Linux distributions. It serves as an interface to the iptables packet filter system provided by the Linux kernel. In this guide, you will learn how to configure a firewall for your server. We will also show you the basics of managing the firewall with the firewall-cmd administration tool. …

Locating files featured image

Locating Files on your Linux VPS System with Whereis, Which, Whatis, Readlink and Find

Introduction The Linux system is filе-bаѕеd. This means that when you work long еnоugh with it, уоu mау find уоurѕеlf not knowing where a сеrtаin filе rеѕidеѕ. Therefore, it will be useful to know how to quickly and efficiently locate the files you need at any given moment. This will increase your performance and save you a lot of time. …

OAuth featued image

OAuth 2: An Introduction and Basic Guidelines

What is OAuth 2? The IETF OAuth 2.0 is an authorization framework that aims to give third-party applications limited access to a given HTTP service. A good place to start when trying to learn about OAuth 2 is to go through its specifications. Thus,  you can maximize the functionality you get out of it. If you need to access certain …