How to setup and use SSH keys
For security reasons it is recommended to use SSH keys instead of password for accessing server. The biggest advantage SSH...
Basic and most common iptables rules
Iptables is basically a powerful firewall, which can allow a user to set specific rules to control incoming and outgoing...
[Ubuntu 16.04] Let’s Encrypt for Nginx including IPv6, HTTP/2
Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. Let’s Encrypt is a...
Optimize MySQL server
In this article, we will cover basics of MySQL server optimization. For server example, we will take VPS plan with...
Install ConfigServer Security & Firewall Application
ConfigServer Security & Firewall is a popular Linux firewall security suite. It is easy to install, flexible to configure, and...
Security tips for VPS
Here is a simple, straightforward guide to improve VPS security of your VPS server. Change the SSH port One of...
Quickly allowing/denying IP’s using iptables
How do you block an IP using iptables? iptables -A INPUT -s xx.xx.xx.xx -j DROP How do you block an...
Using ‘htop’ to Monitor System (Better Alternative to ‘top’)
Introduction Most people are familiar with Linux’s top command line utility to see what process is taking the most CPU...
Optimize Apache server
This article introduces basic, simple and yet effective ways to optimize apache service according to VPS resources. By default, apache...