50 Top ‘Internet of Things’ Security Solutions

A couple of months back, I decided to maintain a list of companies that offer IoT (internet of things) security tools and solutions which you can find below. Feel free to share your solutions, feedback, and tips for securing IoT devices. Going forward, I will update this list continuously. A few key questions arose after […]

78% of the web powered by PHP, 1% on PHP 8

Today, PHP is used by almost 80% of all the websites whose server-side programming language we know. Popular websites such as Slack, Etsy, Wikipedia, WordPress, Mailchimp, Canva, Indeed, Investing.com, and others are powered by PHP. However, in the coming months, many websites that fail to upgrade to the latest version of PHP 8 will be […]

Facebook faulty configuration change: Who, what, why?

Update: Facebook just posted another update with just a bit more details. After Facebook’s downtime of around 6 hours which started just before noon on Monday, October 4, 2021, and several hours after restoration, Facebook has finally posted an official explanation for the outage via their engineering blog. The reason for the blackout cited was […]

Linux Commands frequently used by Linux Sysadmins – Part 5

This is the final part of the five-part series entitled: Linux Commands frequently used by Linux Sysadmins. So far, we’ve covered over 50  commands regularly used by Linux sysadmins and power users. Refer to part 1, part 2, part 3, and part 4. This article will look into another set of commands and command-line tools […]

Linux Commands frequently used by Linux Sysadmins – Part 4

We are now up to part 4 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. By the end of this series, we will cover at least 50 commands. Thus far, we touched on around 60 commands often used by Linux Sysadmins and power users. Refer also to part 1, part 2, […]

Generating Secure Passwords for your Linux Server

Sysadmins will often have to set up new servers or harden existing server passwords during security audits. As a result, secure passwords have to be chosen for SFTP, admin panels, etc. Many practices make a server secure, but often neglected is using secure passwords. Notice that I didn’t include SSH or MySQL root passwords above. […]

How to Enable Unattended Upgrades on Ubuntu/Debian

Linux server security is of critical importance to sysadmins. One central part of keeping Linux servers secure is by installing security updates promptly. Too often, there are compromised servers on the internet due to pending security updates waiting for a manual update. On both Ubuntu and Debian, the unattended-upgrades package can be configured to perform […]

Nginx tuning tips: TLS/SSL HTTPS – Improved TTFB/latency

Since 30th June 2018, the PCI Security Standards Council has required that support for SSL 3.0 and TLS 1.0 be disabled and, more recently, to disable TLS 1.1. Using TLS 1.2 and 1.3 is strongly recommended. In addition, as of July 2018, Google Chrome began to mark ‘HTTP’ websites as “not secure.” Over the past […]

5 Network Devices for work-from-home and Small Business

Over the past year, we’ve seen a mass migration from the office to the home office. This continues to increase the requirements for better network security, greater capacity, and additional capabilities. Small business and work-from-home networks must be more performant, reliable, accountable, and easier to manage. As such, network devices designed for consumers and small […]

last command in Linux with Examples – View history of user logins

This last command guide is a follow-up of my previous 90 Linux Commands frequently used by Linux Sysadmins article. Every week, or as time allows, I will publish articles on around 90 commands geared toward Linux sysadmins and Linux power users. Let’s continue this series with the last command. You may be working with other system administrators and developers […]