serverless cover picture

Serverless Computing, Explained

The world is changing dynamically at a fast pace. The thing that is changing even faster is technology and the underlying architecture beneath it. In this article, we will dig into the depths of...

An In-Depth Guide to iptables, the Linux Firewall

The Linux kernel comes with a packet filtering framework named netfilter. It allows you to allow, drop and modify traffic leaving in and out of a system. A tool, iptables builds upon this functionality...

How to Install WordPress on Windows with XAMPP

WordPress is a great Content Management System. It can be used to create nearly all kinds of websites ranging from blogs to e-commerce websites. In order to use WordPress, we also need to install...

caddy cover

How to Host a Website with the Caddy Web Server on Linux

Caddy is a new web server that’s extremely easy to configure and use. It provides HTTP/2 support, built-in integration with Let’s Encrypt and an intuitive configuration syntax. In addition, you can add various plugins...

A Guide to SSH Port Forwarding/Tunnelling

SSH is a widely used protocol for system administration and file transfer. In addition, it has a feature called SSH tunnelling  (or SSH port forwarding). It creates an encrypted connection between a local computer...

letsencrypt-cover

Adding HTTPS to Your Website with Let’s Encrypt

HTTPS is an important part of securing websites. In our previous article, we’ve discussed how to add HTTPS to your website with Cloudflare. Unfortunately, for all intents and purposes, CloudFlare’s HTTPS is just an...

How to Access Your Mac over SSH with Remote Login

Remote Login is a feature in macOS that allows you to connect to your Mac from another computer. Enabling this feature starts up a SSH server, and it allows you to access your Mac through...

How to Get an Unix/Linux Environment on Windows with MSYS2

If you’re a Unix/Linux user who also has to work with Windows systems, you’ve probably wished that Windows was more Unix-like. An Unix-like environment provides many advantages — the powerful text processing tools, using...

Adding HTTPS to Your Site with Cloudflare

Much of the web works on HTTP; but it is insecure protocol as it provides no protection. It’s secure sibling, HTTPS provides protection against eavesdropping and tampering of data. Historically, HTTPS has been used...

Building a Spam Filter Using Machine Learning

Machine learning is everywhere. From self driving cars to face recognition on Facebook, it is machine learning behind the scenes that drives all of it. If you’ve ever used GMail or Yahoo Mail, you...

security issue cover pic

8 Critical Security Issues to Avoid in Your Website

A web application, being exposed to the web, is far more prone to be attacked than other kinds of applications. Building a secure web application is of prime importance — a hacked website costs...

Customizing and coloring the bash prompt

If you’re already not familiar with bash, the prompt is the little blurb of text displayed when it asks for a command. It capable of communicating a lot, but most people don’t use it...

SSH bruteforce log

Protecting SSH with Fail2ban

SSH allows you to log in to a remote computer or server and control it through a command-line interface. However, because SSH is exposed to the internet; attackers can try to log in by...

cdn cover photo

What is a CDN and How to Use It

You may have come across the buzzword called CDN and may have probably wondered what it is. In this article, we are going to demystify this term and explain how to use it for...

cloud-torrent

Downloading Torrents over the Web with cloud-torrent

BitTorrent is a peer to peer protocol for sharing files. There are many local clients that allow you to download files via torrents. However, there are times where you may need to download them...

speed amp

How to Speed up Your Website up to 85% Using AMP

We all have the experience of loading resource intensive sites in patchy networks. The truth is, the pages take forever to load! This has been a big problem for web developers especially if the...

fail2ban

Blocking bad bots with Fail2ban

Fail2ban is a versatile security tool. While it is primarily used for preventing brute-force attacks against SSH, it can also be used for protecting other services. There are bots which go around scanning the...

smart lock cover photo

How to Use Google as a Password Manager

Did you know you can save up all those bucks that you have been spending all these years for a password manager? Google has its own password manager that many of us would not...