Common WordPress security issues and how to solve them

Having your website up and running is one thing. Keeping it secure for both yourself and visitors is another matter altogether. Here are some frequent WordPress security concerns and how you can resolve them. 1.…

How To Set Up Multi-Factor Authentication for SSH on CentOS 8

This tutorial will teach you, step-by-step, how to set up multi-factor authentication for SSH on CentOS 8.

How To Set Up SSH Keys on CentOS 8

This tutorial will teach you how to set up SSH Keys on a server running CentOS 8. SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with…

How To Enable SFTP Without Shell Access on CentOS 7

Introduction SFTP stands for SSH File Transfer Protocol. As its name suggests, it’s a secure way of transferring files to a server using an encrypted SSH connection. Despite the name, it’s a completely different protocol…

What is SSH? SSH Essentials, and how to use SSH

Introduction SSH is a secure protocol used as the primary means of connecting to Linux servers remotely. It provides a text-based interface by spawning a remote shell. After connecting, all commands you type in your…

How To Back Up a CentOS 7 Server with Bacula

Introduction This tutorial will show you how to set up Bacula to create backups of a remote CentOS 7 host, over a network connection. This involves installing and configuring the Bacula Client software on a…

How To Install Bacula Server on CentOS 7

Introduction Bacula is an open source network backup solution that allows you create backups and perform data recovery of your computer systems. It is very flexible and robust, which makes it, while slightly cumbersome to…

How To Protect SSH With Fail2Ban on CentOS 7

Introduction While connecting to your server through SSH can be very secure, the SSH daemon itself is a service that must be exposed to the Internet to function properly. This comes with some inherent risk…

How To Create an SSL Certificate on Apache for CentOS 7

Introduction TLS, or “transport layer security”, and its predecessor┬áSSL, which stands for “secure sockets layer”, are web protocols used to wrap normal traffic in a protected, encrypted wrapper. Using this technology, servers can send traffic…

Editing the Sudoers file on Ubuntu and CentOS

Introduction Privilege separation is one of the fundamental security paradigms implemented in Linux and Unix-like operating systems. Regular users operate with limited privileges in order to reduce the scope of their influence to their own…