Igniter of Machines

Igniter of Machines

Latest posts

SFTP vs FTPS: Clearing the Confusion

SFTP (SSH File Transfer Protocol) and FTPS (FTP Secure) are two common methods for secure file transfer, but they differ significantly: SFTP, an extension of SSH, uses a single encrypted connection, making it highly secure and resistant to intercepti...

Linux Security Modules: AppArmor vs SELinux

When it comes to securing computer systems, there are many tools available to administrators. Two of the most popular are AppArmor and SELinux. Both tools are designed to provide an extra layer of security to the system by enforcing Mandatory Access...

HTTP/3 with QUIC: Improved Performance and Security

HTTP/3 is the latest version of the HTTP protocol, designed to improve web performance and enhance security. It is based on the QUIC transport protocol, which was developed by Google. QUIC (Quick UDP Internet Connections) is a transport protocol that...

How to Use Rootkit Hunter (rkhunter) on AlmaLinux 8

a) Installing Rootkit Hunter Install Rootkit Hunter which is available as rkhunter package. sudo dnf install rkhunter b) Updating Database Before using, you need to update the database of Rootkit Hunter. sudo rkhunter –update With the database files...

How to Setup Lynis Security Auditor on AlmaLinux 8

a) Adding Repository At first, you may need to add the official repository of the Lynis. So, create the /etc/yum.repos.d/cisofy-lynis.repo file on your favorite text editor with superuser privileges and populate it with the information below. [lynis]...

How to Change Port of SSH Server on AlmaLinux 8

a) Configuring The OpenSSH Server You can specify any port from 1024 to 65535. Here, we will use 26170 as the port for SSH instead of the default port 22. Edit the /etc/ssh/sshd_config file on your favorite text editor with superuser privileges and a...