Installing and Configuring Redis In order to get the latest version of Redis, we will use apt to install it from the official Debian repositories.Update your local apt package cache and install Redis by typing: This will download and install Redis and its dependencies.Open this file with your preferred text editor: Inside the file, find ..
OpenVPN is great, it allows for easy access in a secure way. But how do you keep it secure? I mean, what if someone leaves your company? Do you disable access to the OpenVPN server? You should! I’ll show you how to do it.A feature called revoking exists in OpenVPN. Revoking a certificate mean to ..
OpenSUSE Leap 15.2 is already available, and the upgrade process is simple. – look into the upgrade release notes to make sure, you don’t run in any deprecations with your currently running software – run a backup or a snapshot of the system, which will going to be upgraded. After you read the release notes ..
LDAPS Server Certificate Requirements LDAPS requires a properly formatted X.509 certificate. This certificate lets a OpenLDAP service listen for and automatically accept SSL connections. The server certificate is used for authenticating the OpenLDAP server to the client during the LDAPS setup and for enabling the SSL communication tunnel between the client and the server. As ..
How to map Linux disk to vmware disk???? dmesg is the easiest way to map the disk with vmdk files. Execute the following command on your linux. You will get the following output : Now match second and third number from first column sd ‘2:0:0:0’ with VMWARE scsi Id mentioned in VM properties as mentioned ..
We hear a lot about how passwords are insecure, and should not be used alone for authentication.They are hard to remember, users are tempted to come up with weak passwords, and reuse them across multiple websites.Even if the password is strong, sometimes we need one extra layer of security. Our TestLAB is using a webserver ..
This guide was last tested with Debian 9.8(Stretch) GNU/Linux. Note that this guide is not intended to create a perfectly secure system, and may be vulnerable to tampering by knowledgable users. We start from beginning that you have already installed a new box with Debian Stretch, and have access to the shell. So lets start… ..
Recent Comments