SSH command in Linux, with examples

This article is a follow-up to the previous 90 Linux Commands frequently used by Linux Sysadmins post. Every week, as time allows, I will publish articles on the 90 commands geared toward Linux sysadmins and Linux power users.   What is the SSH command? The ssh command in Linux is an acronym for Secure Shell, which is […]

SSH Security: Protecting Your Linux Server from Threats

As an essential tool for managing servers, SSH (Secure Shell) provides a secure way to remotely access a server’s command line. However, for best SSH security, it’s crucial to limit SSH access to specific IP addresses to reduce the risk of unauthorized access and brute force attacks. In this blog post, we’ll discuss methods to […]

Fix “Host key verification failed”

“Host key verification failed” is a common error message that can occur when trying to connect to a remote server via Secure Shell (SSH). This error can be frustrating, but it’s actually a security feature that can be easily resolved. In this blog post, we will first look at how to fix this error, then […]

Peplink Balance 20x Router Review: So Good, I Forgot It Was There

As the world becomes increasingly connected, more people rely on routers to provide stable and fast internet connections for their residences, home offices, and small businesses. Moreover, it is now quite common for routers in these scenarios to possess enterprise-grade capabilities and scalability. One such router is the Peplink Balance 20x. For the last three […]

How to Secure Your Linux Server from Emerging Cyber Attacks

In today’s world, cybersecurity has become a crucial factor in safeguarding online assets against emerging cyber threats. This is especially true for Linux servers, which are often targeted by cybercriminals due to their popularity and widespread use. In this blog post, we will cover seven essential tips for securing your Linux server against cyber attacks. […]

Linux Commands frequently used by Linux Sysadmins – Part 4

We are now up to part 4 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. By the end of this series, we will cover at least 50 commands. Thus far, we have touched on around 60 commands often used by Linux Sysadmins and power users. Refer also to part 1, part […]

Generating Secure Passwords for your Linux Server

During security audits, sysadmins will often have to set up new servers or harden existing server passwords. As a result, secure passwords have to be chosen for SFTP, admin panels, etc. Many practices make a server secure, but often neglected is using secure passwords. Notice that I didn’t include SSH or MySQL root passwords above. […]

How to Convert OpenSSH keys to Putty (.ppk) on Linux

PuTTYgen is a key generator for creating SSH keys for PuTTY. PuTTYgen is comparable in certain respects to the ssh-keygen tool. PuTTYgen can create public and private key pairs (in .ppk file format). In addition, PuTTYgen can also be used to convert keys to and from other formats. On Windows, PuTTYGen is a graphical tool. […]

5 Network Devices for work-from-home and Small Business 2023

Over the past few years, we’ve seen a mass migration from the work office to the home office. This continues to increase the requirements for better home network security, capacity, and additional capabilities. Small business and work-from-home networks must be more performant, reliable, accountable, and easier to manage. As such, network devices designed for consumers […]

How to Enable Unattended Upgrades on Ubuntu/Debian

Linux server security is of critical importance to sysadmins. One central part of keeping Linux servers secure is by installing security updates promptly. Too often, there are compromised servers on the internet due to pending security updates waiting for a manual update. On both Ubuntu and Debian, the unattended-upgrades package can be configured to perform […]