50 Top ‘Internet of Things’ Security Solutions

A couple of months back, I decided to maintain a list of companies that offer IoT (internet of things) security tools and solutions which you can find below. Feel free to share your solutions, feedback, and tips for securing IoT devices. Going forward, I will update this list continuously. A few key questions arose after […]

Facebook faulty configuration change: Who, what, why?

Update: Facebook just posted another update with just a bit more details. After Facebook’s downtime of around 6 hours which started just before noon on Monday, October 4, 2021, and several hours after restoration, Facebook has finally posted an official explanation for the outage via their engineering blog. The reason for the blackout cited was […]

Linux Commands frequently used by Linux Sysadmins – Part 5

This is the final part of the five-part series entitled: Linux Commands frequently used by Linux Sysadmins. So far, we’ve covered over 50  commands regularly used by Linux sysadmins and power users. Refer to part 1, part 2, part 3, and part 4. This article will look into another set of commands and command-line tools […]

Linux Commands frequently used by Linux Sysadmins – Part 4

We are now up to part 4 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. By the end of this series, we will cover at least 50 commands. Thus far, we touched on around 60 commands often used by Linux Sysadmins and power users. Refer also to part 1, part 2, […]

Generating Secure Passwords for your Linux Server

Sysadmins will often have to set up new servers or harden existing server passwords during security audits. As a result, secure passwords have to be chosen for SFTP, admin panels, etc. Many practices make a server secure, but often neglected is using secure passwords. Notice that I didn’t include SSH or MySQL root passwords above. […]

How to Enable Unattended Upgrades on Ubuntu/Debian

Linux server security is of critical importance to sysadmins. One central part of keeping Linux servers secure is by installing security updates promptly. Too often, there are compromised servers on the internet due to pending security updates waiting for a manual update. On both Ubuntu and Debian, the unattended-upgrades package can be configured to perform […]

5 Network Devices for work-from-home and Small Business

Over the past year, we’ve seen a mass migration from the office to the home office. This continues to increase the requirements for better network security, greater capacity, and additional capabilities. Small business and work-from-home networks must be more performant, reliable, accountable, and easier to manage. As such, network devices designed for consumers and small […]

last command in Linux with Examples – View history of user logins

This last command guide is a follow-up of my previous 90 Linux Commands frequently used by Linux Sysadmins article. Every week, or as time allows, I will publish articles on around 90 commands geared toward Linux sysadmins and Linux power users. Let’s continue this series with the last command. You may be working with other system administrators and developers […]

Improving OpenVPN performance and throughput

OpenVPN, Wireguard, L2TP/IPSec, SSTP, IKEv2, PPTP, or other. If you had the luxury of choosing, which of these VPN protocols would you use? Therein lies my problem. In my current use case, I must find a way to improve OpenVPN performance and throughput. You may have been following my Linux home lab build. One of […]

Replacing Cloudflare with CSF Firewall

March 8th, 2021 update: For the past year, this blog has been using Bunny CDN as a full-page caching solution. That said, I still use Cloudflare with other websites. I’m updating this guide with additional details and tips for using CSF (Config Server Firewall) to increase security with [or without] Cloudflare as a reverse proxy. […]