Tag: SSH

SSH, or secure shell, known for its ease of use and secure communications. In our tutorials, we'll show you how to get the most out of this useful protocol.

Reading Time: 11 minutes
Find Logo

One of the most popular command-line utilities is the find command, mainly because of its simplicity and versatility. It's the default option to search for files across multiple UNIX based systems with a wide range of parameters and variables to narrow down our searches. It helps look for files matching a specific name, date, size, or even owner to provide a frame to append other commands to the list of files found. The basic structure of the find command is as follows. 

Continue reading →
Reading Time: 5 minutes

What is Secure Shell (SSH)?

Secure Shell (SSH), is a service that is similar to Telnet which enables you to remotely connect over the Internet network to a computer that is located anywhere in the world and is connected to the Internet. Unlike Telnet, SSH service provides a secure connection between the two computers.

Continue reading →
Reading Time: 11 minutes

How Can You Ensure Security on a Server?

It is important to secure your server to prevent data loss or security compromises. Because security is such a challenging subject for many, it often goes unheeded. Many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.

Continue reading →

PuTTY Generate and Use SSH Keys

Posted on by Brian Corson | Updated:
Reading Time: 7 minutes

Introduction

PuTTY is the de facto standard used to connect to Linux devices from Windows. The best way to use PuTTY is with secure shell (SSH) keys. People prefer to use PuTTY with SSH keys so that they don’t have to remember their SSH password. Using PuTTY enables users to use stronger passwords that prevent password compromises resulting from brute force attacks.

Continue reading →
Reading Time: 4 minutes

Websites and applications with a large amount of traffic will benefit from load balancing. We will dive into what it is, the methods of load balancing, its benefits, and its uses for load balancing.

Continue reading →
Reading Time: 3 minutes

A hostname is a human-readable string that allows people to identify a server or computer on a network. It may include a fully qualified domain name (FQDN) but identifies a computing device in a unique and absolute manner.

Continue reading →
Reading Time: 5 minutes

In this tutorial, we’ll describe how to create and set up SSH keys for SFTP connections to remote servers using the Interworx control panel. Siteworx is a part of the Interworx control panel that grants you the ability to monitor bandwidth, disk space, email, database information, and other critical information relating to your hosted websites within the same Unix account.

Continue reading →
Reading Time: 5 minutes

Introduction

This article will review some of the more technical aspects of F5 Distributed Cloud AIP. F5 Distributed Cloud AIP is a platform-independent intrusion detection system (IDS) designed to provide users with a unique view into various integrated server security functions. It monitors both Linux and Windows servers as well as Kubernetes or other container-based server infrastructures to observe behaviors and detect malicious, uncommon, and risky activity.

Continue reading →
Reading Time: 4 minutes
SIEM 2

Security Information and Event Management (or SIEM) is a subset of the computer security field, where applications and services join forces with security event management and security information management. When united, these disciplines provide significantly improved real-time statistical data and threat analysis of alerts generated by the related applications. The 2021 Internet Security Threat Report from Sophos denotes that are not only the number of attacks on the rise but also the diverse nature of methodologies and vectors of incursions used. This necessitates the fact that adding a SIEM is especially warranted at this time.

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434