Windows roles provide a method to define the utilization types a server has available. These roles are necessary to properly utilize a server for the desired use cases, whether it is to be simply a file server, a print server, or a web server. Typically to act in a specific type of role, a server may require additional features that need to be installed in order to best perform that role. The number of roles available on a Windows Server has grown to the point where the Microsoft Windows’ help pages have gone from reporting what limited roles are deployable, to listing only non-incorporated roles.Continue reading “What are Windows Roles?”
What is Lynis?
Lynis is a well known, seasoned security tool for Linux based systems (including macOS and/or other Unix-based operating systems. It performs an extensive health scan of your systems to support system hardening and compliance testing. The project is open-source software with the GPL license and available since 2007.Continue reading “Lynis: A Security Auditing Tool For Linux”
What is OpenVPN?
As noted previously in our OpenVPN article, OpenVPN is an open-source Windows software package used to create a secure, site-to-site VPN connection that provides remote access between two locations. OpenVPN consists of three parts:
- The OpenVPN-AS Server
- The Admin Web Interface/Admin GUI
- The Connection Clients
What is OpenVPN?
The OpenVPN software bundle is a set of open-source, virtual private network (VPN) applications used to create a direct, secure site-to-site connection that provides remote access between two locations.
The OpenVPN Server consists of three main parts:Continue reading “How to Setup OpenVPN”
In this article, we will learn the basics of joining tables in SQL. We will learn about Left, Right, Inner, and Outer joins and give examples of how to use them.
Data in an RDBMS (Relational Database Management System) is grouped into tables. These tables have a rigid definition of the type of data that can be stored in them. To connect different tables, and thus different types of data that may relate to each other, we will use the JOIN clause.Continue reading “Intro to JOINS in SQL”
With the constant technological development we are witnessing in the world of hosting, it is necessary to familiarize ourselves with the terminology and meaning of the systems we are using. An important distinction that we need to make is between virtual machines and containers, as they are both widely used in the hosting industry, and yet they are often confused.Continue reading “Virtualization vs. Containerization”
What is GPG?
GnuPG (or Gnu Privacy Guard) is an adaptation of an earlier encryption standard known as PGP (or Pretty Good Privacy). GPG uses the method of “public” and “private” keys for the encryption and signing of messages or data.
In this article, we’re going to be discussing the following topics:
- Why is GPG needed?
- How Does Public Key Encryption Work?
- How do I Setup GPG Keys?
- How do I Find Other Users’ Public Keys?
- How do I Make My Public Key Available To Others?
- How do I Encrypt and Decrypt Messages with GPG?
Performance Co-Pilot (PCP) is a compact assessment and evaluation tool that is used to collect a wide array of server metrics and examines current and prior operational data. It is designed to be easily customizable utilizing modern APIs and other resources used to extend its functionality. Redhat has taken many of the best features of DStat and coupled them with additional capabilities that extended its usefulness, and have created their own updated version called Performance Co-Pilot.Continue reading “DStat Is Now PCP – Performance Co-Pilot”
In this article, we explain how to utilize the Windows Remote Desktop software to access your server from any location to a Windows Server operating system.Continue reading “Accessing Your Windows Server with Remote Desktop”
What Is Fail2Ban?
Fail2ban is an open-source software that actively scans the servers log files in real-time for any brute force login attempts, and if found, summarily blocks the attack using the servers firewall software (firewalld or iptables). Fail2Ban runs as a background process and continuously scans the log files for unusual login patterns and security breach attempts.Continue reading “Install Fail2Ban On CentOS 7”