Check-out our new look and give us some feedback!

Tag: SSH

SSH, or secure shell, known for its ease of use and secure communications. In our tutorials, we'll show you how to get the most out of this useful protocol.

Reading Time: 9 minutes

A Fast, Modern and Secure VPN Tunnel

Objective

In this tutorial we will learn what Wireguard is, what it is used for, how to install and configure it, and lastly, how to use it to it wisely. 

Continue reading →
Reading Time: 3 minutes

In this article, we will be reviewing how to connect to your WordPress Optimized Template using SFTP as the connection medium.

Continue reading →
Reading Time: 9 minutes

Introduction

In this article we will learn what the Network Time protocol (NTP) is and how to install it on the two Linux distributions most commonly used on Liquid Web’s servers. We will be focusing on using CentOS 7 and Ubuntu 18.04 servers, but the process is largely the same on other recent versions of each. Before we start, make sure we are familiar with using SSH (Secure Shell) as we’ll need it to connect to the server. Here’s a link to one of our articles on the basics of SSH if you are unfamiliar with its usage.

Continue reading →
Reading Time: 3 minutes

WordPress has a great GUI-based installation process however some use cases call for CLI! Or, maybe you just feel more at home in a terminal, either way this article will show you how to get your WordPress site setup with just a terminal, using WP-CLI, and maybe a sprinkle of SSH.

Continue reading →
Reading Time: 5 minutes

If you are a Windows administrator who has recently been tasked with administering a Linux-based Ubuntu server, you may find that utilizing Microsoft Powershell may help ease the transition into Linux, and allow you to be more productive. If you are a Linux administrator who is interested in exploring the options that Powershell provides, then this tutorial is for you as well.

Continue reading →
Reading Time: 3 minutes

What Is Fail2Ban?

Fail2ban is an open-source software that actively scans the servers log files in real-time for any brute force login attempts, and if found, summarily blocks the attack using the servers firewall software (firewalld or iptables). Fail2Ban runs as a background process and continuously scans the log files for unusual login patterns and security breach attempts.

Continue reading →
Reading Time: 17 minutes

In this article, we will denote the security best practices for 2020 and beyond. Because security is such a challenging subject for many, it often goes unheeded, and as such, many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.

Continue reading →

How to Enable an EPEL repository

Posted on by David Singer | Updated:
Reading Time: 3 minutes

The EPEL repository is an additional package repository that provides easy access to install packages for commonly used software. This repo was created because Fedora contributors wanted to use Fedora packages they maintain on RHEL and other compatible distributions.

Continue reading →
Reading Time: 6 minutes

In part 3 of our series of InterWorx vs. cPanel, we'll be reviewing the following sections: MySQL, DNS, and NFS/Clustering. In InterWorx, there are three divisions under each main section.

Continue reading →
Reading Time: 8 minutes

In the second part of our review, we will be looking at the Web Server, FTP Server, SSH Server and lastly the Mail Server sections of the InterWorx main menu and comparing them to the available options in WHM. Let’s start with the System Services menu.

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434