I've been using Secure Shell (SSH) for decades. With this remote login tool, I can rest assured my remote machines accept logins securely and efficiently. At the same time, I also understand nothing ...
Most people assume Linux is secure, and that’s a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password ...
Would you change what you said on the phone, if you knew someone malicious was listening? Whether or not you view the NSA as malicious, I imagine that after reading the NSA coverage on Linux Journal, ...
A centralized syslog server was one of the first true SysAdmin tasks that I was given as a Linux Administrator way back in 1997. My boss at the time wanted to pull in log files from various appliances ...
How to use Linux file manager to connect to an sftp server Your email has been sent If a fear of the command line has prevented you from making use of the more secure sftp, Jack Wallen wants to show ...
Update on September 30, 2024: This VPN guide is out of date. Instead, check out TechCrunch skeptics’ guide to VPNs that can help you decide if a VPN is right for you, including how to set up your own ...