Technology

How to Compile a Dynamic NGINX Module: A Step-by-Step Guide

NGINX is a versatile, high-performance web server, often used for reverse proxying, load balancing, and other web-related tasks. One of its strengths is the extensibility provided through modules. While there are many built-in modules, you can also compile your own dynamic modules to extend its functionality. In this tutorial, we will guide you through the …

How to Compile a Dynamic NGINX Module: A Step-by-Step Guide Read More »

How to Create a cgroup on CentOS 7

Introduction Control Groups (cgroups) are a Linux kernel feature that allows you to allocate resources—such as CPU time, memory, and I/O bandwidth—among user-defined groups of processes running on a system. This guide will walk you through setting up and using cgroups on CentOS 7, giving you fine-grained control over resource allocation. Prerequisites Installing the Required …

How to Create a cgroup on CentOS 7 Read More »

The Pros and Cons of Blocking Requests with Empty User-Agent Headers Using ModSecurity

Introduction ModSecurity is an open-source web application firewall (WAF) that is highly configurable and customizable. It offers an array of rules and filters to help secure your web application. One common rule used is blocking requests that come with an empty User-Agent header. While this might seem like a good idea at first glance, there …

The Pros and Cons of Blocking Requests with Empty User-Agent Headers Using ModSecurity Read More »

Managing SSH Key Exchange Algorithms: A How-To Guide

SSH (Secure Shell) is the go-to protocol for secure remote login and file transfer over a network. Although it’s designed with security in mind, the security level you get depends on a variety of factors, including the cryptographic algorithms used for the key exchange. In this article, we will look at how to set key …

Managing SSH Key Exchange Algorithms: A How-To Guide Read More »

Navigating Network Security: Understanding Different Traffic Scrubbing Methods

Introduction Network security is a high-stakes game where the goal is to keep bad actors at bay while maintaining optimum performance. One essential tool for achieving this goal is traffic scrubbing, a method that filters out malicious or unnecessary data from your network traffic. With cyber threats such as Distributed Denial of Service (DDoS) attacks …

Navigating Network Security: Understanding Different Traffic Scrubbing Methods Read More »

Understanding Service Config Files in Nginx and Apache on Ubuntu: Demystifying the ‘sites-enabled’ Directory

When it comes to web server software, two of the most popular choices are Nginx and Apache. These web servers power a large portion of the internet and are commonly deployed on Ubuntu servers. While the software itself is well-documented, one area that often puzzles newcomers is the configuration file structure—specifically, the use of directories …

Understanding Service Config Files in Nginx and Apache on Ubuntu: Demystifying the ‘sites-enabled’ Directory Read More »

The Unsung Hero of Rack Mounting: Understanding the Importance of Rack Nuts

When it comes to setting up a server rack or AV rack, most of the focus naturally goes to the big-ticket items—the servers, switches, routers, or audio-visual equipment. But, just like in any well-oiled machine, it’s often the smallest components that make the biggest difference in function and reliability. Enter rack nuts. In the world …

The Unsung Hero of Rack Mounting: Understanding the Importance of Rack Nuts Read More »

3 Effective Ways to Improve Cable Management in a Datacenter

Datacenters are the heart and brains of our modern interconnected world. As information becomes increasingly digitized, datacenters continue to grow in both size and complexity. One of the biggest challenges administrators face when setting up or maintaining a datacenter is cable management. Proper cable management is vital not just for aesthetics but also for airflow, …

3 Effective Ways to Improve Cable Management in a Datacenter Read More »

5 Critical CLI Commands for Troubleshooting and Administering an LDAP/FreeIPA Server on Linux

Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral application protocol for accessing and maintaining distributed directory information services. FreeIPA (Identity, Policy, and Audit) provides an integrated security information management solution built on top of the LDAP server. Both are crucial in managing and accessing information on Linux-based systems, especially in enterprise environments. If you …

5 Critical CLI Commands for Troubleshooting and Administering an LDAP/FreeIPA Server on Linux Read More »

Scroll to Top