System Administration

How to Compile a Dynamic NGINX Module: A Step-by-Step Guide

NGINX is a versatile, high-performance web server, often used for reverse proxying, load balancing, and other web-related tasks. One of its strengths is the extensibility provided through modules. While there are many built-in modules, you can also compile your own dynamic modules to extend its functionality. In this tutorial, we will guide you through the …

How to Compile a Dynamic NGINX Module: A Step-by-Step Guide Read More »

How to Create a cgroup on CentOS 7

Introduction Control Groups (cgroups) are a Linux kernel feature that allows you to allocate resources—such as CPU time, memory, and I/O bandwidth—among user-defined groups of processes running on a system. This guide will walk you through setting up and using cgroups on CentOS 7, giving you fine-grained control over resource allocation. Prerequisites Installing the Required …

How to Create a cgroup on CentOS 7 Read More »

The Pros and Cons of Blocking Requests with Empty User-Agent Headers Using ModSecurity

Introduction ModSecurity is an open-source web application firewall (WAF) that is highly configurable and customizable. It offers an array of rules and filters to help secure your web application. One common rule used is blocking requests that come with an empty User-Agent header. While this might seem like a good idea at first glance, there …

The Pros and Cons of Blocking Requests with Empty User-Agent Headers Using ModSecurity Read More »

Managing SSH Key Exchange Algorithms: A How-To Guide

SSH (Secure Shell) is the go-to protocol for secure remote login and file transfer over a network. Although it’s designed with security in mind, the security level you get depends on a variety of factors, including the cryptographic algorithms used for the key exchange. In this article, we will look at how to set key …

Managing SSH Key Exchange Algorithms: A How-To Guide Read More »

Navigating Network Security: Understanding Different Traffic Scrubbing Methods

Introduction Network security is a high-stakes game where the goal is to keep bad actors at bay while maintaining optimum performance. One essential tool for achieving this goal is traffic scrubbing, a method that filters out malicious or unnecessary data from your network traffic. With cyber threats such as Distributed Denial of Service (DDoS) attacks …

Navigating Network Security: Understanding Different Traffic Scrubbing Methods Read More »

3 Effective Ways to Improve Cable Management in a Datacenter

Datacenters are the heart and brains of our modern interconnected world. As information becomes increasingly digitized, datacenters continue to grow in both size and complexity. One of the biggest challenges administrators face when setting up or maintaining a datacenter is cable management. Proper cable management is vital not just for aesthetics but also for airflow, …

3 Effective Ways to Improve Cable Management in a Datacenter Read More »

5 Critical CLI Commands for Troubleshooting and Administering an LDAP/FreeIPA Server on Linux

Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral application protocol for accessing and maintaining distributed directory information services. FreeIPA (Identity, Policy, and Audit) provides an integrated security information management solution built on top of the LDAP server. Both are crucial in managing and accessing information on Linux-based systems, especially in enterprise environments. If you …

5 Critical CLI Commands for Troubleshooting and Administering an LDAP/FreeIPA Server on Linux Read More »

Building and Hosting Efficient Docker Images on Docker Hub: Tips & Tools

Docker has revolutionized the way developers package and deploy applications. It provides an environment where apps can run consistently across different stages, making the deployment process smoother and less prone to errors. Docker Hub, on the other hand, acts as a central repository for sharing container images with the community or within an organization. When …

Building and Hosting Efficient Docker Images on Docker Hub: Tips & Tools Read More »

Three Essential Bash Programs for System Administrators

Bash (Bourne-Again SHell) is the most popular shell used in the Linux world. For system administrators, understanding and using Bash is not just a choice but a necessity. The powerful shell provides an environment to run commands, script tasks, and manage systems efficiently. While Bash itself is quite influential, there are numerous command-line programs and …

Three Essential Bash Programs for System Administrators Read More »

Scroll to Top