What do you need, as a startup?
Starting a new business can be, for some of us, a headache. Thinking of what kind of systems to use, what type of email, where… Read more
Starting a new business can be, for some of us, a headache. Thinking of what kind of systems to use, what type of email, where… Read more
In this article we presented the important role that our account and password have on daily life. At this point in time, according to haveibeenpwned.com… Read more
Did you ever wonder how you can add an extra layer of security to your local machine account? Well, if the password, PIN or ID… Read more
Docker it’s a service running at an operating system level. In this case our virtual environment is stored in containers, not in separate virtual machines,… Read more
In this post, I’ve presented you with a list of hypervisors that I’m using on daily basis. Now I’m going to show you a problem… Read more
Well, as you know 100% security does not exist, so our only chance is to try secure our servers as best as posible. The steps… Read more
Accesing a Linux server via a key file is another layer of security that someone should apply on servers. Besides secure, this method is also… Read more
According to CVE there is a major bug found in sudo. Yes, that command we use to elevate rights on Linux systems. CVE states that… Read more
Having your root enabled login via ssh is not a good ideea. Root is the is the most privileged account on a Unix system. If… Read more
One of the first things you should do, to set a layer of security to your linux server, is to change the default access port… Read more