SSH, or secure shell, known for its ease of use and secure communications. In our tutorials, we'll show you how to get the most out of this useful protocol.
How to Use the Find Command In Linux
One of the most popular command-line utilities is the find command, mainly because of its simplicity and versatility. It's the default option to search for files across multiple UNIX based systems with a wide range of parameters and variables to narrow down our searches. It helps look for files matching a specific name, date, size, or even owner to provide a frame to append other commands to the list of files found. The basic structure of the find command is as follows.
Guide on Connecting to Remote Servers Using SSH in Linux, Windows, or macOS Systems
What is Secure Shell (SSH)?
Secure Shell (SSH), is a service that is similar to Telnet which enables you to remotely connect over the Internet network to a computer that is located anywhere in the world and is connected to the Internet. Unlike Telnet, SSH service provides a secure connection between the two computers.
Top 10 Web Server Security Best Practices
How Can You Ensure Security on a Server?
It is important to secure your server to prevent data loss or security compromises. Because security is such a challenging subject for many, it often goes unheeded. Many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.
Generating and Using SSH Keys with PuTTY
PuTTY is the de facto standard used to connect to Linux devices from Windows. The best way to use PuTTY is with secure shell (SSH) keys. People prefer to use PuTTY with SSH keys so that they don’t have to remember their SSH password. Using PuTTY enables users to use stronger passwords that prevent password compromises resulting from brute force attacks.
Understanding Load Balancing for Web Servers
Websites and applications with a large amount of traffic will benefit from load balancing. We will dive into what it is, the methods of load balancing, its benefits, and its uses for load balancing.
How to Change the Hostname in Ubuntu 16.04
A hostname is a human-readable string that allows people to identify a server or computer on a network. It may include a fully qualified domain name (FQDN) but identifies a computing device in a unique and absolute manner.
How To Set up an SSH Key for SFTP in SiteWorx
In this tutorial, we’ll describe how to create and set up SSH keys for SFTP connections to remote servers using the Interworx control panel. Siteworx is a part of the Interworx control panel that grants you the ability to monitor bandwidth, disk space, email, database information, and other critical information relating to your hosted websites within the same Unix account.
Alert Logic Security and Compliance Suite
Intrusion detection systems (IDSs) are an ever-present requirement in a cybersecurity infrastructure to ensure a server or internal network is protected. An intrusion detection system is either a hardware device or software program that actively monitors a server or group of servers for network policy violations or malicious activity. Any suspicious activity, attempted attack, or policy violation is reported and logged to a centrally located security information and event management (SIEM) system database, or directly to a security administrator for further review. This article explores Liquid Web’s intrusion detection product called Alert Logic Security and Compliance Suite.
Fully Managed Cloud App Infrastructure Protection (AIP) (formerly Threat Stack)
This article will review some of the more technical aspects of F5 Distributed Cloud AIP. F5 Distributed Cloud AIP is a platform-independent intrusion detection system (IDS) designed to provide users with a unique view into various integrated server security functions. It monitors both Linux and Windows servers as well as Kubernetes or other container-based server infrastructures to observe behaviors and detect malicious, uncommon, and risky activity.
What is SIEM?
Security Information and Event Management (or SIEM) is a subset of the computer security field, where applications and services join forces with security event management and security information management. When united, these disciplines provide significantly improved real-time statistical data and threat analysis of alerts generated by the related applications. The 2021 Internet Security Threat Report from Sophos denotes that are not only the number of attacks on the rise but also the diverse nature of methodologies and vectors of incursions used. This necessitates the fact that adding a SIEM is especially warranted at this time.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.