What do you need, as a startup?

Starting a new business can be, for some of us, a headache. Thinking of what kind of systems to use, what type of email, where to buy it and how to connect different systems can be overwhelming. So, What…
Starting a new business can be, for some of us, a headache. Thinking of what kind of systems to use, what type of email, where to buy it and how to connect different systems can be overwhelming. So, What…
In this article we presented the important role that our account and password have on daily life. At this point in time, according to haveibeenpwned.com there are 11,721,203,163 accounts that have been compromised. This is just an estimation that we…
Did you ever wonder how you can add an extra layer of security to your local machine account? Well, if the password, PIN or ID is not enough, or you want to have extra protection when connecting over RDP, there…
Docker it’s a service running at an operating system level. In this case our virtual environment is stored in containers, not in separate virtual machines, using the same kernel from the OS. You can create application packages containing everything you…
In this post, I’ve presented you with a list of hypervisors that I’m using on daily basis. Now I’m going to show you a problem that I’ve encountered working with one of them. We have one VMware ESXi called server1…
Well, as you know 100% security does not exist, so our only chance is to try secure our servers as best as posible. The steps that I take to secure a linux server: 1. Change the default ssh port. I’ve…
Accesing a Linux server via a key file is another layer of security that someone should apply on servers. Besides secure, this method is also an easier way of access. In order to make the setup we need to generate…
According to CVE there is a major bug found in sudo. Yes, that command we use to elevate rights on Linux systems. CVE states that “Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow,…
Having your root enabled login via ssh is not a good ideea. Root is the is the most privileged account on a Unix system. If you are signed in or using the root account the system shell, bash, prompts “#”…
One of the first things you should do, to set a layer of security to your linux server, is to change the default access port for ssh connection. It will avoid the automatic scripts that will try to login on…