Secure network time protocol (NTP)
Follow the templates below to secure your server from being used in a DDOS attack. CISCO IOS This is a template IOS configuration that should …
Follow the templates below to secure your server from being used in a DDOS attack. CISCO IOS This is a template IOS configuration that should …
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a data center. These components are managed with …
In this guide, we’ll cover how to change a password in Linux using the passwd command followed by the name of the desired user. This …
What is Kernel? The kernel is the central module of an operating system (OS). It is the part of the operating system that loads first, …
FFmpeg is a free software project that produces libraries and programs for handling multimedia data. FFmpeg includes libavcodec, an audio/video codec library used by several …
Purchase Purchasing an SSL is easy. Installing it? Not always so clear cut. We’ve worked to make it as simple as possible to secure your …
Zimbra 8 is a Free Email Server and is considered an Exchange replacement. Zimbra has an easy to use Web GUI that will allow you …
In Linux, log files display a timeline of events for specific processes and parts of the system. For example, there are log files for dpkg, …
In this tutorial, you’ll learn the basics of how to clear the yum cache. But first: What is yum? The Yellowdog Updater, Modified (yum) is …
If you’ve been working with computers for any length of time, you probably know that quad-core processors are faster than dual-core processors. But why? Well, …
There are two different ways to enable this option: 1] First method is Via WHM control panel 2] Second method is Via SSH Root Login …