How To Add a User and Grant Root Privileges on Ubuntu 18.04

Reading Time: 2 minutes

Adding a user and granting that user root privileges is one of the many tasks of a system admin.  Once a user has been added and granted root privileges they’ll be able to login to your Ubuntu VPS and perform vital functions for the upkeep of the system. Afterward, they’ll be able to use sudo before commands to perform elevated tasks.  In this quick tutorial, we’ll show you how to add a new user and grant root permissions.

Continue reading “How To Add a User and Grant Root Privileges on Ubuntu 18.04”

How to Password Protect Folders in IIS and Plesk

Reading Time: 5 minutes

Introduction

When reviewing your servers security, it is critical for businesses to ensure that while building new sections of your website, that we do not leave it unsecured or visible to users while it is being built. With this in mind, there are several ways for you to “lock” a folder or domain while it is being developed. This will safeguard a folder or an entire site using the security feature built into IIS and Plesk called password protection. In today’s article we will see how easy it is to restrict access to a site or a folder.

Continue reading “How to Password Protect Folders in IIS and Plesk”

How To List Users in CentOS 7

Reading Time: 3 minutes

Adding a user in CentOS is a common task for most Linux admins. Users have unique username’s and occasionally you may wonder if a username is in use or need other details about the user (like their group ID). We’ll show you how to see a list of users after logging into your Liquid Web CentOS 7 server. Once you’ve logged in via SSH, you’ll be able to run the commands below and get the information you need. Let’s get started!

Continue reading “How To List Users in CentOS 7”

Best Practices for Security on Your New Ubuntu Server: Users, Console and Firewall

Reading Time: 4 minutesThank you for taking the time to review this important information. You will find this guide broken down into six major sections that coincide with Ubuntu’s security policy guide. The major topics we talk on throughout these articles are as follows:

Continue reading “Best Practices for Security on Your New Ubuntu Server: Users, Console and Firewall”

What is Kubernetes RBAC Authorization

Reading Time: 4 minutes

What is RBAC?

Kubernetes Role-Based Access Control or the (RBAC) system describes how we define different permission levels of unique, validated users or groups in a cluster. It uses granular permission sets defined within a .yaml file to allow access to specific resources and operations.

Starting with Kubernetes 1.6, RBAC is enabled by default and users start with no permissions, and as such, permissions must be explicitly granted by an admin to a specific service or resource. These policies are crucial for effectively securing your cluster. They permit us to specify what types of actions are allowed, depending on the user’s role and their function within the organization.

Continue reading “What is Kubernetes RBAC Authorization”

How To Remove a User from a MySQL Database in cPanel

Reading Time: < 1 minute

This tutorial assumes you’ve already logged in to cPanel, and are starting on the home screen.  Let’s learn how to remove a user from a database.

  1. Click the “MySQL Databases” icon.cpanel-pl-mysql-7-removeuser-02
  2. In the table of databases, locate the database you wish to remove a user from, locate the specific user assigned to that database that you want to remove and click the delete icon.cpanel-pl-mysql-7-removeuser-04
  3. Click “Revoke User Privileges from Database” to confirm.cpanel-pl-mysql-7-removeuser-05
  4. That’s it! The user has been removed from the database.cpanel-pl-mysql-7-removeuser-06
  5. The user hasn’t been deleted … you can see it’s still listed in the list of current users. It has simply been removed from that database.cpanel-pl-mysql-7-removeuser-07