Is a Firewall Box All You Need for Home and Small Office Security?
With the pandemic relegating much of the knowledge workforce to the home office, it comes as no surprise that cyber threats targeting home and small
With the pandemic relegating much of the knowledge workforce to the home office, it comes as no surprise that cyber threats targeting home and small
In this tutorial, you will learn how to add hosts to LibreNMS server for monitoring. LibreNMS is a fully featured MySQL/PHP and SNMP based network monitoring
In this guide, we are going to learn how to delete lines matching a specific pattern in a file using SED. SED is a stream
In this tutorial, we are going to learn how to install and configure Nessus scanner on Ubuntu 18.04/CentOS 7 server. Identifying vulnerabilities is the first
Follow through this tutorial to learn how to setup replicated GlusterFS volume on Ubuntu. There are different types of Volume architectures that you may want to consider.
In this guide, we are going to learn how to install VeraCrypt on Debian 11. VeraCrypt, a fork of TrueCrypt, is a free and open
This guide describes a step by step tutorial on how to install LEMP stack on Rocky Linux 8. LEMP stack is a group of opensource
In this guide, we are going to learn how to configure SSSD for OpenLDAP client authentication on Debian 12/11/10/9. SSSD is an acronym for System
Follow through this tutorial to learn how to install Sensu Go on Debian 11. Sensu is an opensource infrastructure and application monitoring tool. Install Sensu
In this tutorial, we are going to learn how to install and setup Vtiger CRM on Rocky Linux 8. CRM is an abbreviation for Custom