Working Remotely? Pair SSH with Teleport.

As companies have started to embrace working remote-first, we’ve quickly reached the limits of tools available. Sure, you can jump into a Slack Huddle or Screen Share over a Zoom Room, or if you’re running Linux – good luck. Sometimes you want to jam with your co-workers using the Terminal. In this post, I’ll show […]

G-Core Labs CDN Review

G-Core Labs has its cloud and edge solutions ecosystem where Content Delivery Network (CDN) initially have had an important role. Unlike other providers, the company offers all the benefits of deep integration between CDN and Cloud, Storage, DDoS Protection, Web Application Firewall (WAF) and other cloud services at affordable rates. With it, G-Core Labs CDN […]

Is Cloudflare Argo worth it?

Cloudflare Argo reduces network latency on average by 30% and connection errors by 27%. Traditional network technologies use static routing information, which can be slower and often use congested paths. Slow loading times and connection timeouts increase the likelihood of poor user experience. The Cloudflare company routes 20% of all internet traffic. This provides them […]

Home Network Security: Firewalla Blue Plus – Giveaway

Home network security refers to the protection of networks that connect devices – such as routers, computers, smartphones, security cameras, etc. – to each other and the outside web. Although most home network attacks are non-personal, once a network connects to the internet, it is immediately vulnerable and susceptible to a cascade of external threats. […]

30+ Log4j vulnerability solutions, tools and resources

In August 2021, the article “Observability in 5 minutes” said: “Cybersecurity, as we discussed last time, will dominate news headlines in the coming months. As such, along with adding context to collected telemetry data, security will emerge as an instrumental component of observability.” Over the past year, some of those listed observability software vendors have […]

Facebook faulty configuration change: Who, what, why?

Update: Facebook just posted another update with just a bit more details. After Facebook’s downtime of around 6 hours which started just before noon on Monday, October 4, 2021, and several hours after restoration, Facebook has finally posted an official explanation for the outage via their engineering blog. The reason for the blackout cited was […]

Linux Commands frequently used by Linux Sysadmins – Part 5

This is the final part of the five-part series entitled: Linux Commands frequently used by Linux Sysadmins. So far, we’ve covered over 50  commands regularly used by Linux sysadmins and power users. Refer to part 1, part 2, part 3, and part 4. This article will look into another set of commands and command-line tools […]

Linux Commands frequently used by Linux Sysadmins – Part 4

We are now up to part 4 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. By the end of this series, we will cover at least 50 commands. Thus far, we touched on around 60 commands often used by Linux Sysadmins and power users. Refer also to part 1, part 2, […]

Generating Secure Passwords for your Linux Server

Sysadmins will often have to set up new servers or harden existing server passwords during security audits. As a result, secure passwords have to be chosen for SFTP, admin panels, etc. Many practices make a server secure, but often neglected is using secure passwords. Notice that I didn’t include SSH or MySQL root passwords above. […]

last command in Linux with Examples – View history of user logins

This last command guide is a follow-up of my previous 90 Linux Commands frequently used by Linux Sysadmins article. Every week, or as time allows, I will publish articles on around 90 commands geared toward Linux sysadmins and Linux power users. Let’s continue this series with the last command. You may be working with other system administrators and developers […]