Sep 25, 2023 | Tech-Corner, Technology
The purpose of using Identity/Pubkey identification is to eliminate the use of static passwords. Instead of typing passwords each time (that could be intercepted by key loggers or just “peeped”), we can store a couple of SSH keys on the Virtual Private Server (VPS),...
Sep 25, 2023 | Tech-Corner, Technology
Task Scheduler plays an indispensable role in the automation of Linux system administration. Task Scheduler executes cron (crond – in some distributions). Cron is a daemon that can be used to schedule the execution of recurring tasks according to a combination...
Sep 25, 2023 | Tech-Corner, Technology
The firewalld daemon provides a dynamically managed firewall with support for network “zones” to assign a level of trust to a network and its associated connections and interfaces. It has support for IPv4 and IPv6 firewall settings. It supports Ethernet...
Sep 25, 2023 | Tech-Corner, Technology
You can learn about basic firewall installation and setup in our post “How To Set Up a Firewall Using firewalld.” Today, we’re going to discuss how to configure advanced firewalld settings. Understanding the Rich Rule Structure The format or structure...
Sep 25, 2023 | Tech-Corner, Technology
syslog-ng is an open source implementation of the syslog protocol for Unix and Unix-like systems. It extends the original syslogd model with content-based filtering, rich filtering capabilities, flexible configuration...