How To Set Up Apache with a Free Signed SSL Certificate on a VPS
Our focus here is setting up Apache with a free signed SSL Cert on a VPS.
Our focus here is setting up Apache with a free signed SSL Cert on a VPS.
This article will go over how to enable SSH authentication using an OATH-TOTP app in addition to an SSH key. Logging into your server via SSH will then require two factors across two channels, thereby making it more secure than a password or SSH key alone.
This tutorial will walk you through password-protecting assets on an Apache web server running on Ubuntu 18.04 in order to provide your server with additional security.
SSH или защищенная оболочка — это шифрованный протокол, используемый для администрирования и связи с серверами. При работе с сервером CentOS вы с большой вероятностью проведете больше всего времени в сеансах терминала с подключением к серверу через SSH. В этом обучающем…
SSH, ou secure shell, est un protocole crypté utilisé pour administrer et communiquer avec des serveurs. Lorsque vous travaillez avec un serveur Ubuntu, il y a de fortes chances que vous passiez la majeure partie de votre temps dans une session terminal connectée à votre…
FTP, which is short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. vsftpd, very secure FTP daemon, is an FTP server for many Unix-like systems, including Linux. In this tutorial, you’ll configure vsftpd to allow a user to upload files to their home directory using FTP with login credentials secured by SSL/TLS. You’ll also connect your server using FileZilla, an open-source FTP client, to test the TLS encryption.
SSH is the standard way to connect to remote Linux systems. You probably know the basics of how to use it, but the daemon also has many options that can give you more flexibility in user authentication and control. In this guide, we’ll explore some of these options in order to give you a more secure and more flexible SSH experience.
GPG is a cryptographic system designed to provide you with the ability to encrypt messages and verify the identity of received messages. In this guide, we will discuss how to create GPG keys and use them to encrypt messages.
A network intrusion detection application can monitor your network interfaces for suspicious traffic and attempted security breaches. In this guide, we will configure a tool called psad to monitor our firewall logs and determine if there is a problem. We will be configuring psad on an Ubuntu 12.04 machine to detect intrusion attempts on our servers.
This article will walk you through the installation of wpscan and serve as a guide on how to use wpscan to locate any known vulnerable plugins and themes that may make your site vulnerable to attack. Using wpscan, we can see an outline of the site in a way similar to that of a would-be attacker.