Tag: SSH
SSH, or secure shell, known for its ease of use and secure communications. In our tutorials, we'll show you how to get the most out of this useful protocol.
Introduction
PuTTY is the de facto standard used to connect to Linux devices from Windows. The best way to use PuTTY is with secure shell (SSH) keys. People prefer to use PuTTY with SSH keys so that they don’t have to remember their SSH password. Using PuTTY enables users to use stronger passwords that prevent password compromises resulting from brute force attacks.
Websites and applications with a large amount of traffic will benefit from load balancing. We will dive into what it is, the methods of load balancing, its benefits, and its uses for load balancing.
How to Change Your Hostname in Ubuntu 16.04
A hostname is the name of a server, computer, or device on a network. You may come across a scenario in business that requires a hostname change. You might also ask yourself why you would need to change your hostname. The most common situations would be due to a domain name change, a business course change, or because you simply thought of something better.
How To Set up an SSH Key for SFTP in SiteWorx
In this tutorial, we’ll describe how to create and set up SSH keys for SFTP connections to remote servers using the Interworx control panel. Siteworx is a part of the Interworx control panel that grants you the ability to monitor bandwidth, disk space, email, database information, and other critical information relating to your hosted websites within the same Unix account.
Alert Logic Security and Compliance Suite
Introduction
Intrusion detection systems (IDSs) are an ever-present requirement in a cybersecurity infrastructure to ensure a server or internal network is protected. An intrusion detection system is either a hardware device or software program that actively monitors a server or group of servers for network policy violations or malicious activity. Any suspicious activity, attempted attack, or policy violation is reported and logged to a centrally located security information and event management (SIEM) system database, or directly to a security administrator for further review. This article explores Liquid Web’s intrusion detection product called Alert Logic Security and Compliance Suite.
Threat Stack Intrusion Detection System
Introduction
This article will review some of the more technical aspects of Threat Stack. Threat Stack is a platform-independent intrusion detection system (IDS) designed to provide users with a unique view into various integrated server security functions. It monitors both Linux and Windows servers as well as Kubernetes or other container-based server infrastructures to observe behaviors and detect malicious, uncommon, and risky activity.
What is SIEM?
Security Information and Event Management (or SIEM) is a subset of the computer security field, where applications and services join forces with security event management and security information management. When united, these disciplines provide significantly improved real-time statistical data and threat analysis of alerts generated by the related applications. The 2021 Internet Security Threat Report from Sophos denotes that are not only the number of attacks on the rise but also the diverse nature of methodologies and vectors of incursions used. This necessitates the fact that adding a SIEM is especially warranted at this time.
How to Install and Configure Zabbix on Ubuntu 20.04
Introduction
Zabbix is an open-sourced tool used to monitor various IT components such as servers and hardware that they are running, cloud services, whole networks, etc. Zabbix can monitor the network health and integrity of your servers. All monitoring can be done through Zabbix’s web-based frontend. This means that you can quickly check the status of your servers from anywhere! This article describes how to install the Zabbix monitoring tool, create a database, and configure the frontend on Ubuntu 20.04.
How To Use the Find Command In Linux
One of the most popular command-line utilities is the find command, mainly because of its simplicity and versatility. It's the default option to search for files across multiple UNIX based systems with a wide range of parameters and variables to narrow down our searches. It helps look for files matching a specific name, date, size, or even owner to provide a frame to append other commands to the list of files found. The basic structure of the find command is as follows.
How to Locate Open Ports in Linux
What is a Port?
First, let’s define what a port is. According to the IEFT, a port is:
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.