
Google Search Cheat Sheet
A list of the most useful Google search commands and operators ... Read More

We established in part1 why the key exchange takes place, if you missed that part click HERE to check it out. Basically the client and the server agree on a key that they can use to encrypt the rest of ... Read More

Math in PowerShell is very simple and straightforward, the basic operators work as they usually do in any programming or scripting language: 1 + 1, 64 - 16, 4 * 32, 1024 / 128, etc. However, many times I faced ... Read More

The task for today is to join a Microsoft Active Directory domain with our CentOS box. We use the sssd package to accomplish this, first we start with a basic CentOS installation, we go through the initial setup, then the ... Read More

Our goal is to make our website protected, configuring the HTTPS service on it to ensure encrypted traffic between the client and our server. We utilize Let’s Encrypt’s certbot, that will create and automatically renew the publicly signed SSL certificates ... Read More

So what are Virtual Hosts and what are they for? John has a web server, connected to the internet with a single IP address. He has a website, called JohnBlog.com which is pointing to this web server. He ... Read More

Before You Begin Our job is really easy this time as we already have the process of installing Apache, MySQL and PHP on Debian based machines, as it is really similar to the process on RHEL based boxes. For the ... Read More

I’ve recently encountered a situation where a smaller company needed a VPN server, using SSTP, so they tried to set up an SSL certificate for their service to encrypt their client VPN tunnels with. It was a Windows server, and ... Read More

What is PKI and why do we need it? PKI stands for Public Key Infrastructure, that utilizes public and private key asymmetric encryption to create an encrypted channel between two parties through a public medium. Let’s see what we mean ... Read More

Modify the Limits If you get the following error message, saying the max upload filesize in php.ini is too small, you simply need to edit the php.ini file, increasing the required values as seen below. Note that both 1 ... Read More

You might have been wondering: do I really need to type in my long password every time I SSH into a remote server, possibly making a typo and starting the password all over again without seeing any feedback on the ... Read More

Making the PowerShell connection to the remote Exchange Online Office365 servers and connecting to an on premises server that is local to the organization are slightly different. Connect to Office365 Connecting to Office365 consists of three different, separate connections. One ... Read More

To see how to deploy a WordPress site from scratch please check out this previous article where we went through the process step by step. In this article we set up automatic HTTPS, that means all the HTTP requests are ... Read More

In this tutorial we will deploy a WordPress site for http://protectigate.com We assume that a web server is already ready for us. If you don’t have one you can check the installation process for Debian (like Ubuntu) and RHEL (CentOS) ... Read More

Before You Begin A minimal installation of Debian or Ubuntu linux is the starting point, with network connectivity. L.A.M.P is an acronym, stands for the building elements of a fully working website:
- Linux is probably the most stable and ... Read More

If you desperately need an SSL certificate signed by a publicly trusted CA, and you want it for free, Let’s Encrypt is certainly an option. They are valid for 3 months, and even though linux boxes are equipped to request ... Read More

I'm sure you have faced a situation at some point when you needed to RDP in to a client machine but without any luck. That is because the computer must have not had the RDP connections enabled. Even though the ... Read More

To make use of a trunk interface connected to our linux box with a single interface we can configure subinterfaces accessing specific VLAN segments, here we will use Debian and RHEL, assigning two subinterfaces, to each, on will use DHCP ... Read More

I’ve come across a company this week, while sorting the SSL certificate on their RRAS server I noticed that all of their nodes had 192.169.0.0/24 IP addresses assigned in their network. When I asked them about why they were using ... Read More

Recently I came across a situation where a small office needed a direct IPSec tunnel between two offices temporarily, but they only had a router from their ISP which was not configurable, or at least not by them and they ... Read More

Time to time we can face the problem that our storage is running out of space on our Linux box. Now what options do we have? We can attach a new storage to the system and mount it in the ... Read More