Exposing locally hosted services in your home network is a nightmare. Assume in your…
Tips & Tricks
-
- LinuxSecurityTips & Tricks
Encrypt Logs using Logrotate with GnuPG for Compliance Requirements
88 views 6 mins readAs a Sys Admin when you are working with Linux systems, logs are very…
-
Sometimes you might observe some web applications are not properly handle errors when the…
- Tips & TricksCloud
Deploying SentinelOne using VMware Workspace ONE UEM for MacOS
990 views 12 min readWorkspace ONE UEM is a sophisticated all-in-one solution that manages and centrally controls the…
-
In this era, sending SMS appears to be outdated technology, but in some cases,…
-
As a Systems Administrator, you may have to manage due dates in many areas…
-
Are you getting libraries or dependencies missing errors when you work with your lambda…
-
The Cisco ASA firewall produces thousands of Syslog messages for many different events every…
- LinuxSecurityTips & Tricks
Protect Web Servers from DDoS Attacks using Fail2ban
17.2k views 15 mins readAny service endpoint exposed to the public internet is susceptible to so many attacks…
-
Tip 1 – Adjust Worker Processors & Worker Connections The architecture of the Nginx…