Short Articles

The shortest articles on the hottest topics

I have more than 15 years of experience across various fields in IT. I find my expertise in LINUX configuration, Virtualization, and Cloud. In my pastime, I hone my skills by writing blogs and reviewing articles on the web.

‘Ransomware Locky’ a new threat decoded and How to Protect Yourself.
‘Ransomware Locky’ a new threat decoded and How to Protect Yourself.

A Government Organization CERT (Computer Emergency Response Team) has issued a high priority alert that a new ransomware Locky has spread like ransomware WannaCry which has compromised a huge number of...

How to Configure a Website Using Caddy on CentOS 7
How to Configure a Website Using Caddy on CentOS 7

In this article we will learn how to setup a website using Caddy on CentOS 7, Caddy is a new generation web server where we can easily host the web pages on the web server which is very simple to use and...

How To Configure Icinga and Icinga Web on Ubuntu 16.04
How To Configure Icinga and Icinga Web on Ubuntu 16.04

In this article, we will configure Icinga and Icinga Web on Ubuntu 16.04 machine. Icinga is a very powerful, flexible and open source monitoring tool used to observe the health of the servers and services,...

How To Configure and Secure SFTP Without Providing Shell Access on CentOS 7
How To Configure and Secure SFTP Without Providing Shell Access on CentOS 7

In this article we will learn about how to configure SFTP without enabling the shell access on CentOS 7, SSH File Transfer Protocol (SFTP) which is a secure way to transferring files from servers to a...

How To Configure and Secure SFTP Without Providing Shell Access on Ubuntu 16.04
How To Configure and Secure SFTP Without Providing Shell Access on Ubuntu 16.04

In this article, we will learn about how to configure SFTP without enabling the shell access on Ubuntu 14.04, SSH File Transfer Protocol (SFTP) which is a secure way to transfer files from various a servers...

Caution! Subtitled Files Can Hack The Devices When You Watch Movies
Caution! Subtitled Files Can Hack The Devices When You Watch Movies

Subtitled files are allowing hackers to read your information.  These files are targeted for malicious software attacks that are being used to control devices like (Smart TV, Computer and Mobile Device)....

Samba Installation Vulnerable for Remote Attacks
Samba Installation Vulnerable for Remote Attacks

Samba software package is generally for UNIX/Linux systems which are used for sharing files, and printers using SMB and CIFS protocols services. Samba allows Linux/Unix users to set up shared folders and...

How To Configure and Setup Ghost on Ubuntu 16.04
How To Configure and Setup Ghost on Ubuntu 16.04

In this article, we will learn how to setup and Configure Ghost on Ubuntu 16.04. Ghost os a light-weight and open-source blogging programs which can be used easily and can be customizable, also have many...

How to Secure MongoDB on Ubuntu 16.04
How to Secure MongoDB on Ubuntu 16.04

In this article, we will learn how to secure Mongo DB on Ubuntu 16.04. In previous versions the Mongo DB is vulnerable to automated exploits because, by default, there  is no authentication which was...

Important MYSQL Performance Tuning and Settings after Installation
Important MYSQL Performance Tuning and Settings after Installation

In this article, we will learn and discuss some important performance tuning settings for MySQL which we need to implement after the MySQL Installation better and speedy performance. Pre-requisites Assuming...
Advertisements