The other day I wanted to buy a concert ticket from a website I haven’t visited before. That meant creating a new account (even though that shouldn’t really be necessary). I went through the ordeal of filling in my details, clicked “Confirm” and *bam*… the password was not good enough. As is usual, the password […]
You might consider antivirus software unneccessary on a Linux box. But if you are running a public facing server, it might be a good idea to run it regardless. Why is that? Even though malware probably can’t affect your server much, it can still use it to infect users. To prevent that, we will learn […]
Docker has become omnipresent in recent years. However, by default, it requires root privileges to run containers. Obviously, this is not good security-wise. But a simple change will allow you to run docker container as a regular user. In the examples below, I am using Ubuntu 17.04, but the commands should be the same for […]
You have Raspberry Pi set up and running, but typing password every time you try to login using ssh is quite the pain. Well, using key-based authentication is not only more convenient, but also more secure. Let’s see how to set it up.
Rapsberry Pi is the single most popular computer in the world. And it is easily one of the most hacked systems as well. That’s due to single fact – most users never change the default username and password. But is a relatively a simple process, so there is no reason not to do it. If […]
The Raspberry Foundation has recently launched Raspberry Pi 3, a new version of their popular developer board. It features a faster ARM processor, 1 GB of RAM and, most importantly, on-board wifi. This makes it even better choice for a headless Linux server. This guide shows how to do the basic Raspberry Pi server setup, […]