Found 103 Articles for Information Technology

How to create photography website in a minute or less 2

Lakshmi Srinivas
Updated on 12-May-2022 06:43:32

315 Views

All those who are enthusiastic about photography, having a photography website is beneficial as it is a great way to show not only your work to the world but also your talent and commitment to the art of photography. That’s not all, it also helps you to reach your prospective clients and helps to build a personal brand.Photography website can be built with ease with WYSIWYG tools, WordPress and Squarespace, but there exists little downside with these tools, you need to manually update them either every few weeks or fortnight.WordPressCreating a website using WordPress is not only easy, but also ... Read More

How to setup hostname in centos 7 x or rhel 7 x linux versions

Lakshmi Srinivas
Updated on 18-Oct-2019 12:23:33

2K+ Views

In this article, we will learn how to change the host name on CentOS 7.x / RHEL 7.0, by default after installation on CentOS 7 or RHEL the default hostname will be localhost.localdomain. This hostname will be used for various services, unlike the older versions we will try to change the host name by changing /etc/sysconfig/networks or using the host name command to change the hostname and after multiple reboot of server the hostname remains as localhost.localdomain. The procedure for changing the host name in CentOS 7 or RHEL is totally different from the previous versions. we have 3 tools ... Read More

Openssh security best practices

Lakshmi Srinivas
Updated on 18-Oct-2019 12:21:18

343 Views

Secure Shell or SSH is a cryptographic (encrypted) network protocol operating at layer 7 of the OSI Model to allow remote login and other network services to operate securely over an unsecured network.OpenSSH is a premier connectivity tool for remote login with the SSH protocol. It encrypts all traffic to eliminate eavesdropping, connection hijacking, and other attacks. In addition, OpenSSH provides a large suite of secure tunneling capabilities, several authentication methods, and sophisticated configuration options. This article explains about important tasks to secure your SSH server setup.Use a Strong PasswordA password is a string of characters that people can use ... Read More

Advertisements