Linux Commands frequently used by Linux Sysadmins – Part 5

This is the final part of the five-part series entitled: Linux Commands frequently used by Linux Sysadmins. So far, we’ve covered over 50  commands regularly used by Linux sysadmins and power users. Refer to part 1, part 2, part 3, and part 4. This article will look into another set of commands and command-line tools […]

Linux Commands frequently used by Linux Sysadmins – Part 4

We are now up to part 4 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. By the end of this series, we will cover at least 50 commands. Thus far, we touched on around 60 commands often used by Linux Sysadmins and power users. Refer also to part 1, part 2, […]

Generating Secure Passwords for your Linux Server

Sysadmins will often have to set up new servers or harden existing server passwords during security audits. As a result, secure passwords have to be chosen for SFTP, admin panels, etc. Many practices make a server secure, but often neglected is using secure passwords. Notice that I didn’t include SSH or MySQL root passwords above. […]

How to Enable Unattended Upgrades on Ubuntu/Debian

Linux server security is of critical importance to sysadmins. One central part of keeping Linux servers secure is by installing security updates promptly. Too often, there are compromised servers on the internet due to pending security updates waiting for a manual update. On both Ubuntu and Debian, the unattended-upgrades package can be configured to perform […]

Nginx tuning tips: TLS/SSL HTTPS – Improved TTFB/latency

Since 30th June 2018, the PCI Security Standards Council has required that support for SSL 3.0 and TLS 1.0 be disabled and, more recently, to disable TLS 1.1. Using TLS 1.2 and 1.3 is strongly recommended. In addition, as of July 2018, Google Chrome began to mark ‘HTTP’ websites as “not secure.” Over the past […]

5 Network Devices for work-from-home and Small Business

Over the past year, we’ve seen a mass migration from the office to the home office. This continues to increase the requirements for better network security, greater capacity, and additional capabilities. Small business and work-from-home networks must be more performant, reliable, accountable, and easier to manage. As such, network devices designed for consumers and small […]

last command in Linux with Examples – View history of user logins

This last command guide is a follow-up of my previous 90 Linux Commands frequently used by Linux Sysadmins article. Every week, or as time allows, I will publish articles on around 90 commands geared toward Linux sysadmins and Linux power users. Let’s continue this series with the last command. You may be working with other system administrators and developers […]

Improving OpenVPN performance and throughput

OpenVPN, Wireguard, L2TP/IPSec, SSTP, IKEv2, PPTP, or other. If you had the luxury of choosing, which of these VPN protocols would you use? Therein lies my problem. In my current use case, I must find a way to improve OpenVPN performance and throughput. You may have been following my Linux home lab build. One of […]

Replacing Cloudflare with CSF Firewall

March 8th, 2021 update: For the past year, this blog has been using Bunny CDN as a full-page caching solution. That said, I still use Cloudflare with other websites. I’m updating this guide with additional details and tips for using CSF (Config Server Firewall) to increase security with [or without] Cloudflare as a reverse proxy. […]

Is Cloudflare Argo worth it?

Cloudflare Argo reduces network latency on average by 35% and connection errors by 27%. Traditional network technologies use static routing information, which can be slower and often use congested paths. Slow loading times and connection timeouts increase the likelihood of poor user experience. The Cloudflare company routes 10% of all HTTP/HTTPS Internet traffic. This provides […]