How to Install Kubernetes on Ubuntu, macOS, and Windows

Reading Time: 6 minutes

What is Kubernetes?

Kubernetes (or K8s) is an open-source container orchestration system for automating computer application deployment, scaling, and management. Kubernetes manages and runs Docker containers on numerous hosts. The project was started by Google and is supported by many companies, including Microsoft, RedHat, IBM.

Continue reading “How to Install Kubernetes on Ubuntu, macOS, and Windows”

How to Install and Configure K3s on Ubuntu 18.04

Reading Time: 7 minutes

What is K3s?

k3s Logo

K3s is a lightweight version of Kubernetes. It is a highly available Kubernetes certified distribution designed for production workloads in unattended, limited resource, remote locations, or inside an IoT appliance. The developers of K3s declare that K3s is capable of almost everything that K8s can do. 

Continue reading “How to Install and Configure K3s on Ubuntu 18.04”

What is a Virtual Private Network and How Does it Work? 

Reading Time: 6 minutes

What is a VPN?

vpn1

A Virtual private network (VPNs) creates a secure connection between a remote computer and another network. The connection itself is encapsulated and encrypted which provides a protected communications channel between the two points.

A VPN is becoming more crucial in today’s security-related society. Due to increasing safety concerns, the proportional use of these services is growing exponentially. This technology targets several critical aspects of our online experience: mainly privacy and security. 

Continue reading “What is a Virtual Private Network and How Does it Work? “

How To Protect Your Website From Remote Code Execution

Reading Time: 5 minutes

What is Remote Code Execution?

Remote code execution, also known as code injection, is one of the most common ways hackers compromise a website. This term encompasses multiple techniques which have one aspect in common. The attacker passes off their code as legitimate in the server’s eyes, using a data submission method typically reserved for regular users.

Continue reading “How To Protect Your Website From Remote Code Execution”

How to Configure Windows Remote Desktop Users Group

Reading Time: 4 minutes

The most common way to remotely manage a Windows server is through Remote Desktop Protocol. By default, Liquid Web’s Windows servers only allow the members of the administrators’ group remote desktop access. However, the Remote Desktop Users group grants its members access to securely connect to the server through RDP (Remote Desktop Protocol) as well.

This article will go over the basics of the Remote Desktop Users group. By the end, you will be able to add users to the group, understand permissions, and basic user management.

Continue reading “How to Configure Windows Remote Desktop Users Group”

“Password is Forbidden” PhpMyAdmin Login Error Solved

Reading Time: 2 minutes

Once in a while, perhaps on a Development server, MySQL will not be set up with a root password. The aforementioned configuration is generally thought of as against best practices, however, if it is what you’re dealing with, then it could also interfere with PhpMyAdmin.

This error relates to logging into phpMyAdmin, an open source tool used for the administration of MySQL.

Continue reading ““Password is Forbidden” PhpMyAdmin Login Error Solved”

SSL vs TLS

Reading Time: 4 minutes

What is the relationship between an SSL and TLS? Most of us are familiar with SSL (Secure Socket Layer) but not TLS (Transport Layer Security). Both protocols are used to transmit online data securely between two endpoints. SSL is older than TLS, but all SSL certificates can use both SSL and TLS encryption. TLS is the replacement protocol to SSL as TLS is the updated version of the SSL protocol. TLS operates similarly to SSL by using encryption methods to ensure secure communication.

Continue reading “SSL vs TLS”

How to Upgrade Ubuntu 16.04 to Ubuntu 18.04

Reading Time: 6 minutes

If you are still using Ubuntu version 16.04, you may want to consider updating to the latest Long Term Support release, version 18.04. In this post, we will cover what a Long Term Support release is and why you would want to use it. You will also learn the significant changes between 16.04 and 18.04. Last, but not least, you will also learn how to upgrade your dedicated server from Ubuntu 16.04 to Ubuntu 18.04.

Continue reading “How to Upgrade Ubuntu 16.04 to Ubuntu 18.04”

How to Solve the Upgrade Ubuntu Install Updates Error

Reading Time: < 1 minute

When updating from Ubuntu 16.04 to 18.04 we used the

do-release-upgrade command as one of the steps to get the newer versions.  While using that method the update Ubuntu’s core we came across a known bug that would not allow us to continue with the upgrade. Instead, it would give the following error message:

Checking for a new Ubuntu release
Please install all available updates for your release before upgrading.

Continue reading “How to Solve the Upgrade Ubuntu Install Updates Error”

How to Install and Use Mimikatz

Reading Time: 7 minutes

What is Mimikatz?

Mimikatz is a tool created by the French developer, Benjamin Delpy used to gather credentials and can carry out a range of operations connected with penetration testing. Its creation stems from a noted vulnerability of the Windows system function called WDigest. WDigest is designed to allow larger Windows-based network users to establish credentials in multiple applications on a LAN or WAN. This feature stores authentication credentials in memory and allows for their automatic reuse so users only have to enter their login details once.

Continue reading “How to Install and Use Mimikatz”