Short Articles

The shortest articles on the hottest topics

How to Configure and Secure the Server Setup on CentOS 7

How to Configure and Secure the Server Setup on CentOS 7

In this article, we will learn some configuration steps that should be taken care for security purpose and usability, just after a new server is installed. This will help us in building a solid foundation. Avoiding...
How to Install and Configure FTP server in Centos 7

How to Install and Configure FTP server in Centos 7

In this article, we will learn how to configure FTP server on CentOs 7 using ‘vsftpd’. ‘vsftpd’ (Very Secure File Transport Protocol Daemon) is a secure and very fast FTP server on Linux systems. Installing...
How To Secure Apache with Using Let’s Encrypt An Open Source SSL Provider

How To Secure Apache with Using Let’s Encrypt An Open Source SSL Provider

In this article, we will learn how to setup TLS/SSL certificates using the “Let’s Encrypt” on Ubuntu server with Apache as a web server, we shall also cover how to automate the certificate...
How to Install Guake (drop-down terminal) terminal on Ubuntu

How to Install Guake (drop-down terminal) terminal on Ubuntu

Guake is a drop-down terminal for GNOME and any other desktop. It aims to provide a quick-access terminal, that show/hide on screen with a simple key pressing. Its style of window is based on an fps games,...
How to make Twitter Bots in Less than Five Minutes?

How to make Twitter Bots in Less than Five Minutes?

Did you anytime notice about automatically answering questions posted on Twitter and you desire to make one for yourself? you can do it. We find, Twitter bots not only answering the questions, but it also...
How To Use date Command In Day-to-Day Practical Usage

How To Use date Command In Day-to-Day Practical Usage

In this article, we will learn about the ‘date’ command in Linux and how to practically use the ‘date’ command in day-to-day usage with some practical examples. The ‘date’ command is used to...
How to Use OpenSSL For Generating SSL Certificates, Private Keys and CSRs

How to Use OpenSSL For Generating SSL Certificates, Private Keys and CSRs

OpenSSL is a CLI (Command Line Tool) which can be used to secure the server to generate public key infrastructure (PKI) and HTTPS. This article helps you as a quick reference to understand OpenSSL commands...
Linux Nslookup Commands to Troubleshoot DNS (Domain Name Server)

Linux Nslookup Commands to Troubleshoot DNS (Domain Name Server)

nslookup is a network administration command-line tool available for many computer operating systems for querying Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific...
How to Find a List of Block Devices Information

How to Find a List of Block Devices Information

lsblk command is used to display a list of information about all available block devices. However, it does not give a list of information about RAM disks. Examples of block devices are hard disk, flash...
OpenSSH Security Best Practices

OpenSSH Security Best Practices

Secure Shell or SSH is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network. OpenSSH...
Advertisements