A self reference guide on up and running with Pi-hole on a Ubuntu 22.04 LTS virtual machine. System Requirement for Pi-hole Using 192.168.0.50 as IP address for Pihole […]
Solution for client_loop: send disconnect: Broken pipe
Introduction While trying to SSH we may get this error “client_loop: send disconnect: Broken pipe”. The reason behind the cause is, a normal user added with a SELinux […]
Auto mount LUKS Encrypted file system with Network-Bound Disk Encryption NBDE
Auto mount a encrypted file system using Network bound disk encryption NBDE.
SELinux Confining Users | Protecting Linux server from Users
Protecting Linux servers from user by configuring SELinux Confining Users
Import RPM Signing GPG keys on CentOS 8
GPG Keys or GNU Privacy Guard is used to making sure that we are getting the right package from a trusted repository.
Install Wazuh Open Source Security Analytics
Install production-ready Wazuh OpenSource security analytics tool to monitor your critical production environment.
Migrate existing Iptables to Nftables in RHEL8/CentOS
Iptables can be migrated to nftables without spending time on writing it. Red Hat 8 based operating system provides translate tool to migrate the rules.
How to start using SELinux or Security-Enhanced Linux
SELinux is one of security layer in Linux which protect the directory, files, process and ports with its own labels by preventing unauthorised access.
Generate a CSR Certificate Signing Request in Linux
Generating a Certificate Signing Request (CSR) for Secure Sockets Layer (SSL) Certificate required when we need to sign with a Certificate Authority (CA).
How to Safely remove a Luks encrypted disk from Linux
Introduction In this guide, we are about to see how to safely remove a Luks encrypted disk from Red Hat Enterprise Linux 6, 7 and variant Linux distributions. […]