SSH command in Linux, with examples

This article is a follow-up to the previous 90 Linux Commands frequently used by Linux Sysadmins post. Every week, as time allows, I will publish articles on the 90 commands geared toward Linux sysadmins and Linux power users.   What is the SSH command? The ssh command in Linux is an acronym for Secure Shell, which is […]

SSH Security: Protecting Your Linux Server from Threats

As an essential tool for managing servers, SSH (Secure Shell) provides a secure way to remotely access a server’s command line. However, for best SSH security, it’s crucial to limit SSH access to specific IP addresses to reduce the risk of unauthorized access and brute force attacks. In this blog post, we’ll discuss methods to […]

Fix “Host key verification failed”

“Host key verification failed” is a common error message that can occur when trying to connect to a remote server via Secure Shell (SSH). This error can be frustrating, but it’s actually a security feature that can be easily resolved. In this blog post, we will first look at how to fix this error, then […]

Peplink Balance 20x Router Review: So Good, I Forgot It Was There

As the world becomes increasingly connected, more people rely on routers to provide stable and fast internet connections for their residences, home offices, and small businesses. Moreover, it is now quite common for routers in these scenarios to possess enterprise-grade capabilities and scalability. One such router is the Peplink Balance 20x. For the last three […]

How to Secure Your Linux Server from Emerging Cyber Attacks

In today’s world, cybersecurity has become a crucial factor in safeguarding online assets against emerging cyber threats. This is especially true for Linux servers, which are often targeted by cybercriminals due to their popularity and widespread use. In this blog post, we will cover seven essential tips for securing your Linux server against cyber attacks. […]

Linux Commands frequently used by Linux Sysadmins – Part 4

We are now up to part 4 of this five-part series entitled: Linux Commands frequently used by Linux Sysadmins. By the end of this series, we will cover at least 50 commands. Thus far, we have touched on around 60 commands often used by Linux Sysadmins and power users. Refer also to part 1, part […]

How to Convert OpenSSH keys to Putty (.ppk) on Linux

PuTTYgen is a key generator for creating SSH keys for PuTTY. PuTTYgen is comparable in certain respects to the ssh-keygen tool. PuTTYgen can create public and private key pairs (in .ppk file format). In addition, PuTTYgen can also be used to convert keys to and from other formats. On Windows, PuTTYGen is a graphical tool. […]

How to Enable Unattended Upgrades on Ubuntu/Debian

Linux server security is of critical importance to sysadmins. One central part of keeping Linux servers secure is by installing security updates promptly. Too often, there are compromised servers on the internet due to pending security updates waiting for a manual update. On both Ubuntu and Debian, the unattended-upgrades package can be configured to perform […]

Enable Automatic Updates – Fedora/Red Hat + Bonus Tip

Linux server security is crucial to Linux server administration. Part of keeping Linux servers secure is installing security updates shortly after they become available. Too often, compromised servers are a result of pending security updates awaiting manual installation. In general, for critical servers where you cannot afford unplanned downtime should be very careful with automatic updates. While there are […]

Improving OpenVPN performance and throughput

OpenVPN, Wireguard, L2TP/IPSec, SSTP, IKEv2, PPTP, or others. If you had the luxury of choosing, which VPN protocols would you use? Therein lies my problem. In my current use case, I must find a way to improve OpenVPN performance and throughput. You may have been following my Linux home lab build. One of the most […]

Top ↑