How to Locate Open Ports in Linux

Reading Time: 9 minutes
openports

What is a Port? 

First, let’s define what a port is. According to the IEFT, a port is: 

A logical entity for Internet communication. Ports serve two main purposes:
1. They provide a demultiplexing identifier to separate transport sessions between the same pair of endpoints
2. They may also identify the application protocol and associated service to which processes connect.

Wikipedia.com

In plain English, this simply means that a port is an endpoint through which data flows back and forth between two computers over a network. A computer has 65535 ports available to share information. These port numbers are based on a 16-bit number, which is where we derive the total number of available ports (0 to 65535).

Continue reading “How to Locate Open Ports in Linux”

How to Install and Configure Rancher K3s

Reading Time: 4 minutes

What is Rancher K3s?

K3s is an official Cloud Native Computing Foundation sandbox project that brings a lightweight, fully compliant Kubernetes distribution designed for lower resource production models like remote locations or on an IoT device. When used in conjunction with Rancher, K3s can easily be managed from within the Rancher orchestration platform.

Continue reading “How to Install and Configure Rancher K3s”

How to Implement Zero Trust Security in 5 Steps

Reading Time: 6 minutes

What is Zero Trust Security?

Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.

Continue reading “How to Implement Zero Trust Security in 5 Steps”

What are Inodes in Linux?

Reading Time: 6 minutes

As you are probably already aware, everything is considered to be a file in Linux. That includes hardware devices, processes, directories, regular files, sockets, links, and so on. Generally, the file system is divided into data blocks and inodes. With that being said, you can think about inodes as a basis of the Linux file system. To explain it more clearly, an Inode is a data structure that stores metadata about every single file on your computer system. 

Continue reading “What are Inodes in Linux?”

How Was My Website Compromised? 

Reading Time: 7 minutes

In this tutorial, we will look at several methods that are used to compromise a website. In today’s world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business. 

Continue reading “How Was My Website Compromised? “

How to Install and Configure the Kubernetes Dashboard

Reading Time: 5 minutes

The web-based Kubernetes console is an interface that provides information about the state of the Kubernetes cluster. The dashboard is also used for deploying containerized applications as well as for general cluster resource management. Traditionally, kubectl is primarily used in the terminal for nearly all cluster related tasks. Still, it is useful to have a visual representation of our cluster in a user-friendly interface. To install the dashboard, kubectl needs to be installed and running on the server.

Continue reading “How to Install and Configure the Kubernetes Dashboard”

How to Install Kubernetes Using Kubeadm on Ubuntu 18

Reading Time: 11 minutes

What is Kubernetes?

k8s logo

In this article, we review what Kubernetes and Kubeadm are, how to install, create a cluster, and set up worker nodes using Kubeadm. If you are not yet familiar with Kubernetes, we recommend reading our article on the fundamental basics of Kubernetes.

Continue reading “How to Install Kubernetes Using Kubeadm on Ubuntu 18”

How to Install and Configure Minikube on Ubuntu

Reading Time: 14 minutes

Introduction

This article will demonstrate how to install and configure Minikube to set up a small Kubernetes cluster. We will then examine Kubernetes in more detail to apply that knowledge to a real-world example.

Continue reading “How to Install and Configure Minikube on Ubuntu”

Troubleshooting Microsoft SQL Server Error 18456

Reading Time: 4 minutes

Login errors with Microsoft SQL Server (MSSQL) are a fairly common issue and can be easily solved with some basic troubleshooting steps. Before we dig in, let’s take a look at the details of the error to try and determine the cause.

connect to server error
Continue reading “Troubleshooting Microsoft SQL Server Error 18456”