10 steps to secure your system

The goal of the Information security is Confidentiality, Integrity and Availability are also known as CIA triad. The security people who are protecting, and the bad people who are breaking the security are actually trying to protect and break these three things. The best and easy example is a DDOS …

How to SSH with key……

Almost all nix administrator use ssh (Secure shell) for managing server remotely. There are several way to use ssh. One of them is to use a manually generated public-private key pair to perform the authentication. In this tutorial I’ll show you how to create that public private key and use …