Learn the best practices with SU and SUDO

For security reasons, root is disabled by default with our Linux Cloud Virtual Servers (Cloud Servers). This guide will explain how to use SU and SUDO. Note: if you need to gain access to the…

How to install and configure Ansibile on CentOS 7

Introduction First off, you’ll need to set up your CentOS 7 server. Here’s how. Configuration management systems are designed to make controlling large numbers of servers easy for administrators and operations teams. They allow you…

Jump start in to CentOS – How to Create a new Sudo User

Introduction If you haven’t set up your new server yet, read this guide. The sudo command provides a mechanism for granting administrator privileges, ordinarily only available to the root user, to normal users. This guide…

How To Install Nginx on CentOS 7

About Nginx Nginx is a high performance web server software package. It is a much more flexible and lightweight program than Apache HTTP Server. This tutorial will teach you how to install and start Nginx…

Adding and deleting users in CentOS 7

Introduction When you first start using a fresh Linux server, adding and removing users is one of the most basic tasks that you should know how to do. When you create a new server, you…

How To Install Apache Tomcat 8 on CentOS 7

Installing Topcat 8 web server on CentOS 7 Apache Tomcat is a web server and servletcontainer that is used to serve Java applications. Tomcat is an open source implementation of the Java Servlet and JavaServer…

How to set up your new CentOS 7 server

So you have a fresh new server, now what? There are a few configuration steps you’ll need to go through before you can start playing around with your new kit. This is for security and…

Editing the Sudoers file on Ubuntu and CentOS

Introduction Privilege separation is one of the fundamental security paradigms implemented in Linux and Unix-like operating systems. Regular users operate with limited privileges in order to reduce the scope of their influence to their own…

How To Configure SSH Key-Based Authentication on a Linux Server

Introduction SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a Linux server, chances are, you will spend most of your time in a terminal session…