Recognition

Posts

55 Posts
  • Published Tutorial in Series: Securing Your Network with Suricata

    Understanding Suricata Signatures

    In this tutorial you'll learn how Suricata signatures are structured, and some important options that are commonly used in most rules. Once you are familiar with how to understand the structure and fields in a signatu...
    By Jamon Camisso Security Networking Monitoring
  • Published Tutorial in Series: Securing Your Network with Suricata

    How To Install Suricata on Rocky Linux 8

    Suricata is a Network Security Monitoring (NSM) tool that uses sets of community created and user defined signatures (also referred to as rules) to examine and process network traffic. In this tutorial you will learn ...
    By Jamon Camisso Rocky Linux Rocky Linux 8 Security Networking
  • Published Tutorial

    How To Configure HAProxy Logging with Rsyslog on Rocky Linux 8 [Quickstart]

    By default on many Rocky Linux 8 installations, HAProxy is not configured to write its log output to a file. This quickstart tutorial will explain how to configure HAProxy logging with Rsyslog and SELinux rules by usi...
    By Jamon Camisso Rocky Linux Rocky Linux 8 HAProxy Interactive Logging
  • Published Tutorial

    How To Harden OpenSSH Client on Ubuntu 20.04

    When hardening SSH at the server side, the primary objective is to make it harder for malicious actors to access your server. However, hardening at the client side is very different, as instead you are working to defe...
    By Jamon Camisso Security Ubuntu 20.04
  • Published Tutorial

    How To Harden OpenSSH on Ubuntu 20.04

    Linux servers are often administered remotely using SSH by connecting to an OpenSSH server, which is the default SSH server software used within Ubuntu, Debian, CentOS, FreeBSD, and most other Linux/BSD-based systems....
    By Jamon Camisso Security Ubuntu 20.04
  • Published Tutorial in Series: Common HAProxy Errors

    How To Configure HAProxy Logging with Rsyslog on CentOS 8 [Quickstart]

    By default on many CentOS 8 installations, HAProxy is not configured to write its log output to a file. This quickstart tutorial will explain how to configure HAProxy logging with Rsyslog and SELinux rules by using a ...
    By Jamon Camisso Logging HAProxy CentOS Interactive
  • Published Tutorial in Series: Securing Your Network with Suricata

    How To Install Suricata on Debian 11

    Suricata is a Network Security Monitoring (NSM) tool that uses sets of community created and user defined signatures (also referred to as rules) to examine and process network traffic. Suricata can generate log events...
    By Jamon Camisso Security Debian Networking Debian 11
  • Published Tutorial

    How to Set Up SSH Keys on Debian 11

    SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a Debian server, chances are you will spend most of your time in a terminal session connected to your s...
    By Jamon Camisso Linux Basics Getting Started Security System Tools Debian Debian 11
  • Published Tutorial in Series: Securing Your Network with Suricata

    How To Install Suricata on Ubuntu 20.04

    Suricata is a Network Security Monitoring (NSM) tool that uses sets of community created and user defined signatures (also referred to as rules) to examine and process network traffic. Suricata can generate log events...
    By Jamon Camisso Ubuntu Ubuntu 20.04 Security Networking
  • Published Tutorial

    How To Set Up WireGuard on Rocky Linux 8

    WireGuard is a lightweight Virtual Private Network (VPN) that supports IPv4 and IPv6 connections. A VPN allows you to traverse untrusted networks as if you were on a private network. It gives you the freedom to access...
    By Jamon Camisso Rocky Linux Rocky Linux 8 Security Networking VPN IPv6
  • Published Tutorial

    How To Install and Secure Memcached on Ubuntu 18.04

    A previous version of this tutorial was written by Kathleen Juell. Memory object caching systems like Memcached can optimize backend database performance by temporarily storing information in memory, retaining…
    By Jamon Camisso Ubuntu Ubuntu 20.04 Server Optimization Security Caching Firewall
  • Published Tutorial

    How To Install and Secure Memcached on Ubuntu 20.04

    In this guide, you will learn how to install and configure a Memcached server. You’ll also learn how to add authentication to secure Memcached using Simple Authentication and Security Layer (SASL). Finally, you’ll lea...
    By Jamon Camisso Ubuntu Server Optimization Security Firewall Caching Interactive
  • Published Tutorial

    How To Set Up SSH Keys on Rocky Linux 8

    SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a Rocky Linux server, chances are you will spend most of your time in a terminal session connected to y...
    By Brian Boucheron, Jamon Camisso Rocky Linux Rocky Linux 8 Getting Started Linux Basics Security System Tools
  • Published Tutorial

    Initial Server Setup with Rocky Linux 8

    When you first create a new Rocky Linux 8 server, there are a few configuration steps that you should take early on as part of the basic setup. This will increase the security and usability of your server and will giv...
    By Brian Boucheron, Jamon Camisso Rocky Linux Rocky Linux 8 Linux Basics Getting Started Initial Server Setup
  • Published Tutorial

    How To Set Up WireGuard on Ubuntu 20.04

    In this tutorial, you will set up WireGuard on an Ubuntu 20.04 server, and then configure another machine to connect to it as a peer using both IPv4 and IPv6 connections (commonly referred to as a dual stack connectio...
    By Jamon Camisso VPN Security Networking IPv6 Ubuntu Ubuntu 20.04
  • Published Tutorial

    What is a Socket?

    Sockets are a way to enable inter-process communication between programs running on a computer, or between programs running on separate computers. Programs that communicate via network sockets typically rely on using ...
    By Jamon Camisso Glossary Networking
  • Published Tutorial

    Understanding Sockets

    Sockets are a way to enable inter-process communication between programs running on a server, or between programs running on separate servers. Communication between servers relies on network sockets, which use the Int...
    By Jamon Camisso Networking IPv6 Interactive
  • Published Tutorial

    How To Back Up and Restore a Kubernetes Cluster on DigitalOcean Using Velero

    Velero is a convenient backup tool for Kubernetes clusters that compresses and backs up Kubernetes objects to object storage. It also takes snapshots of your cluster’s Persistent Volumes using your cloud provider’s bl...
    By Hanif Jetha, Jamon Camisso Backups Kubernetes Solutions Object Storage DigitalOcean Block Storage
  • Published Tutorial

    What is SELinux?

    Security Enhanced Linux (SELinux) is an access control system that is built into the Linux kernel. It is used to enforce policies that define which resources users, programs and services can use on a system. In its de...
    By Jamon Camisso Glossary Security
  • Published Tutorial

    What is systemd?

    Many Linux distributions use systemd to manage system settings and services. systemd organizes tasks into components called units, and groups of units into targets, that can be used to create dependencies on other sys...
    By Jamon Camisso System Tools Glossary