Configure OpenVPN Clients to use specific DNS Server

3
This is a quick tutorial on how to configure OpenVPN clients to use specific DNS server. OpenVPN server can be configured to enable the clients to use specific DNS server for hostname resolution. In our previous tutorials, we have covered how to install and configure OpenVPN server; Install OpenVPN Server on Debian 11/Debian 10 Configure OpenVPN Clients to use specific DNS Server To...

Install and Setup OpenVPN Server on Ubuntu 22.04

5
install and setup openvpn server in Linux
In this guide, we are going to learn how to install and setup OpenVPN Server on Ubuntu 22.04. OpenVPN is a robust and highly flexible open-source VPN software that uses all of the encryption, authentication, and certification features of the OpenSSL library to securely tunnel IP networks over a single UDP or TCP port. It facilitates the extension of private network...

Setup Multinode Elasticsearch 8.x Cluster

4
Setup Multi-node Elasticsearch Cluster
Follow through this tutorial to learn how to setup multinode Elasticsearch 8.x cluster. As of this writing, Elastic Stack 8.3 is the current release. This means that Elasticsearch 8.3, one of the major components of the Elastics Stack is also the current release version as of this writing. Setup Multinode Elasticsearch 8.x Cluster In our previous tutorial, we learnt how to...

Ship System Logs to ELK Stack using Elastic Agents

4
Ship System Logs to ELK Stack using Elastic Agents
This tutorial will take you through how to ship system logs to ELK stack using Elastic Agents. You might be so used to using Elastic beats such as Filebeat, metricsbeat, Winlogbeat etc. to ship log from your end points to ELK for visualization. However, Elastic has announced the general availability Elastic Agents. Elastic Agent is a single, unified agent...

How to Enable Basic Authentication on ELK Stack

0
In this tutorial, you will learn how to enable basic authentication on ELK stack. Elastic/ELK stack supports user authentication. This enables it to restrict access to various resources within the cluster. To access these resources when authentication is enabled, a user has to prove their identity using username/passwords or other forms of identity depending on the authentication realm enabled. How...

The Importance of Cybersecurity: What You Can Do to Stay Safe

0
The Importance of Cybersecurity: What You Can Do to Stay Safe
The 21st century has brought with it a whole host of exciting technological developments. The smartphone, smartwatch, smart glasses, and a whole host of other gadgets and knick-knacks that make life just a little bit more exciting. And that isn’t even mentioning all the wonderful advancements made in medical science, transportation, and other important avenues of life. Online Entertainment is...

Configure Apache with SSL/TLS Certificates on CentOS 8

1
Follow through this guide to learn how to configure Apache with SSL/TLS Certificates on CentOS 8. Are you using Nginx instead? Check our guide on setting up Nginx with SSL/TLS certificates by following the link below; Configure Nginx with SSL/TLS certificates on CentOS 8 Configure Apache with SSL/TLS Certificates on CentOS 8 Run System Update Update your system package by executing; dnf update Install Apache and...

Enforce Password Complexity Policy On CentOS 7/RHEL Derivatives

0
In this guide, we are going to learn how to enforce password complexity policy on CentOS 7/RHEL based derivatives. Our previous guide covered the enforcement of password complexity on Ubuntu 18.04. You can check the same by following the link below; Enforce Password Complexity Policy On Ubuntu 18.04 Enforce Password Complexity Policy On CentOS 7 Similar to our previous guide, we...

Install and Enroll Elastic Agents to Fleet Manager in Linux

2
This tutorial will take you through how you can install and enroll Elastic agents to Fleet manager in Linux. According to Elastic Fleet and Elastic Agent overview page; Elastic Agent is a single, unified way to add monitoring for logs, metrics, and other types of data to each host. A single agent makes it easier and faster to deploy monitoring...

Installing Metasploit on Ubuntu 18.04 LTS

1
This guide is about how installing Metasploit on Ubuntu 18.04 LTS. Metasploit Framework provides a platform and tools for performing deep system security auditing as well as penetration testing to unearth, exploit and validate every other would-be vulnerability. Metasploit is available in both the commercial and opensource version (thanks to Rapid 7 for teaming up with OSS community). We...