As companies have started to embrace working remote-first, we’ve quickly reached the limits of tools available. Sure, you can jump into a Slack Huddle or Screen Share over a Zoom Room, or if you’re running Linux – good luck. Sometimes you want to jam with your co-workers using the Terminal. In this post, I’ll show […]
SSH command in Linux, with examples
This article is a follow-up to the previous 90 Linux Commands frequently used by Linux Sysadmins post. Every week, as time allows, I will publish articles on the 90 commands geared toward Linux sysadmins and Linux power users. What is the SSH command? The ssh command in Linux is an acronym for Secure Shell, which is […]
SSH Security: Protecting Your Linux Server from Threats
As an essential tool for managing servers, SSH (Secure Shell) provides a secure way to remotely access a server’s command line. However, for best SSH security, it’s crucial to limit SSH access to specific IP addresses to reduce the risk of unauthorized access and brute force attacks. In this blog post, we’ll discuss methods to […]
Fix “Host key verification failed”
“Host key verification failed” is a common error message that can occur when trying to connect to a remote server via Secure Shell (SSH). This error can be frustrating, but it’s actually a security feature that can be easily resolved. In this blog post, we will first look at how to fix this error, then […]
Peplink Balance 20x Router Review: So Good, I Forgot It Was There
As the world becomes increasingly connected, more people rely on routers to provide stable and fast internet connections for their residences, home offices, and small businesses. Moreover, it is now quite common for routers in these scenarios to possess enterprise-grade capabilities and scalability. One such router is the Peplink Balance 20x. For the last three […]
How to Convert OpenSSH keys to Putty (.ppk) on Linux
PuTTYgen is a key generator for creating SSH keys for PuTTY. PuTTYgen is comparable in certain respects to the ssh-keygen tool. PuTTYgen can create public and private key pairs (in .ppk file format). In addition, PuTTYgen can also be used to convert keys to and from other formats. On Windows, PuTTYGen is a graphical tool. […]
50 Top ‘Internet of Things’ Security Solutions
A couple of months back, I decided to maintain a list of companies that offer IoT (internet of things) security tools and solutions which you can find below. Feel free to share your solutions, feedback, and tips for securing IoT devices. In the future, I will update this list continuously. A few key questions arose […]
78% of the web powered by PHP (3% on PHP 8)
Today, PHP is used by almost 78% of all the websites whose server-side programming language we know. Popular websites such as Slack, Etsy, Wikipedia, WordPress, Mailchimp, Canva, Indeed, Investing.com, and others are powered by PHP. However, in the coming months, many websites that fail to upgrade to the latest version of PHP 8 will be […]
30+ Log4j vulnerability solutions, tools and resources
In August 2021, the article “Observability in 5 minutes” said: “Cybersecurity, as we discussed last time, will dominate news headlines in the coming months. As such, along with adding context to collected telemetry data, security will emerge as an instrumental component of observability.” Over the past year, some of those listed observability software vendors have […]
Facebook faulty configuration change: Who, what, why?
Update: Facebook just posted another update with just a bit more details. After Facebook’s downtime of around 6 hours which started just before noon on Monday, October 4, 2021, and several hours after restoration, Facebook has finally posted an official explanation for the outage via their engineering blog. The reason for the blackout cited was […]