How To Install Nginx on CentOS 7

About Nginx Nginx is a high performance web server software package. It is a much more flexible and lightweight program than Apache HTTP Server. This tutorial will teach you how to install and start Nginx…

Adding and deleting users in CentOS 7

Introduction When you first start using a fresh Linux server, adding and removing users is one of the most basic tasks that you should know how to do. When you create a new server, you…

Automate tasks on your cloud server using Cron

Introduction One of the most standard ways to run tasks in the background on Linux machines is with cron jobs. They’re useful for scheduling tasks on the VPS and automating different maintenance-related jobs. “Cron” itself…

How To Encrypt Tomcat 8 Connections with Apache or Nginx on CentOS 7

What is Apache Tomcat and why are we bothering to encrypt it? Apache Tomcat, or ‘Tomcat Server,’ is a web server and servlet container, usefully designed to serve Java applications. It is a very flexible…

How To Create a Self-Signed SSL Certificate for Nginx on CentOS 7

Introduction TLS, or transport layer security, and its predecessor SSL, which stands for secure sockets layer, are web protocols used to wrap normal traffic in a protected, encrypted wrapper. Using this technology, servers can send traffic…

How To Create an SSL Certificate on Apache for CentOS 7

Introduction TLS, or “transport layer security”, and its predecessor SSL, which stands for “secure sockets layer”, are web protocols used to wrap normal traffic in a protected, encrypted wrapper. Using this technology, servers can send traffic…

How To Set Up Apache Virtual Hosts on CentOS 7

Introduction The Apache web server is the most popular way of serving web content on the Internet. It serves more than half of all of the Internet’s active websites, and is extremely powerful and flexible.…

Editing the Sudoers file on Ubuntu and CentOS

Introduction Privilege separation is one of the fundamental security paradigms implemented in Linux and Unix-like operating systems. Regular users operate with limited privileges in order to reduce the scope of their influence to their own…

How To Configure SSH Key-Based Authentication on a Linux Server

Introduction SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a Linux server, chances are, you will spend most of your time in a terminal session…