-
Published Tutorial
This article will go over how to enable SSH authentication using an OATH-TOTP app in addition to an SSH key. Logging into your server via SSH will then require two factors across two channels, thereby making it more s...
•
By
Michael Holley
Security
-
Published Tutorial
This article will go over how to enable SSH authentication using an OATH-TOTP app in addition to an SSH key. Logging into your server via SSH will then require two factors across two channels, thereby making it more s...
•
By
Michael Holley
Security
-
Published Tutorial
This article will go over how to enable SSH authentication using an OATH-TOTP app in addition to an SSH key. Logging into your server via SSH will then require two factors across two channels, thereby making it more s...
•
By
Michael Holley
Security
Ubuntu
-
Published Tutorial
You can browse the web securely using a Droplet with SSH access as a SOCKS 5 proxy end point. In this tutorial we'll use a Ubuntu 20.04 Droplet as the proxy, and the Firefox web browser as the client application. By t...
•
By
Michael Holley
Security
Ubuntu
-
Published Tutorial
Verifying downloaded files ensures that what you downloaded is what you think it is. In this tutorial, you'll learn what file verification is, why it's important, and how to do it on various operating systems using co...
•
By
Michael Holley
System Tools
Security
-
Published Tutorial
If you want to stop seeing ads when you check your email, or if you've moved from a public email service to your own domain, you can run your own webmail client (also known as a mail user agent or MUA). In this tutori...
•
By
Michael Holley
Email
LAMP Stack
Ubuntu 16.04
-
Published Tutorial
In this tutorial, you'll secure an existing basic Roundcube installation by adding SSL to Apache with Let's Encrypt, adding two-factor authentication to your Roundcube account with a Roundcube plugin, and using GPG to...
•
By
Michael Holley
Email
LAMP Stack
Let's Encrypt
Security
Ubuntu 16.04
-
Published Tutorial
This article will go over how to enable SSH authentication using an OATH-TOTP app in addition to an SSH key. Logging into your server via SSH will then require two factors across two channels, thereby making it more s...
•
By
Michael Holley
Security
CentOS
-
Published Tutorial
This article will go over how to enable SSH authentication using an OATH-TOTP app in addition to an SSH key. Logging into your server via SSH will then require two factors across two channels, thereby making it more s...
•
By
Michael Holley
Security
Ubuntu
Ubuntu 16.04
-
Published Tutorial
As adoption of the cloud increases, more and more data is being stored remotely. From music to pictures to personal documents, many people are uploading files onto servers they don't manage. If you'd rather keep your ...
•
By
Michael Holley
Miscellaneous
Apache
Ubuntu
-
Published Tutorial
This article will go over how to enable SSH authentication using an OATH-TOTP app in addition to an SSH key. Logging into your server via SSH will then require two factors across two channels, thereby making it more s...
•
By
Michael Holley
Security
Ubuntu
-
Published Tutorial
Many modern DevOps teams are putting more and more infrastructure around the chatroom. One of the main motivations behind this chatroom infrastructure is because of chatroom bots, which DevOps teams use to help get th...
•
By
Michael Holley
Miscellaneous
Ubuntu
-
Published Tutorial
Typically, a user pushes their Puppet modules to a version control server, then pulls those modules down to a Puppet master. Puppet clients periodically connect to the Puppet master to pull and apply any changes.
This...
•
By
Michael Holley
Configuration Management
Git
Ubuntu
-
Published Tutorial
The CalDAV and CardDAV standards provide an easy way to keep all our smart things up-to-date with what we are doing, as well as how to get hold of our friends and other contacts. In this tutorial, we'll show you how t...
•
By
Michael Holley
Control Panels
Apache
Nginx
Ubuntu