Securing SSH on Linux: A Practical Baseline Checklist

Secure Shell (SSH) is the default entry point into most Linux systems. Unfortunately, it is also the most common attack vector exploited by automated bots and opportunistic attackers. So for any organisation running Linux servers — whether on-premises, in the cloud, or hybrid — hardening SSH is one of the simplest, highest-impact security steps you … Read more

Using a VPN for Remote Access

When non-IT people hear the term “VPN” they tend to think of a commercial service where for a monthly subscription you can connect your computer internet connection and surf the Web anonymously by passing your Internet traffic through a “VPN server” run by the VPN service provider. This is one usage for a VPN – … Read more

Why You Should Never Use A VPN For Security

The following is a copyright-free (creative-commons) released post by someone explaining why you should never use a VPN if you want security. Most average computer and internet users are unaware of the facts mentioned in this post.  I thought this post expresses the realities about VPNs succintly and clearly, and so I decided to reproduce … Read more

How To Backup Your Website

It’s vital to backup your website regularly. Servers fail, websites get hacked. So here’s a quick guide to how to backup your website. How To Backup Your Website There’s a kind of unspoken law about backups. If you backup, you probably won’t need the backups. But if you don’t – you sure as anything will! … Read more

How To Pursue Content Theft and Copyright Violation

Content and copyright theft is an increasing problem on the Web. So what should you do if you discover your content has been stolen by another website? How To Pursue Content Theft and Copyright Violation Yesterday I discovered that some of my website content had been copied and pasted onto someone else’s website. On the … Read more

How To Prevent Content Theft

Content theft is a big problem on the Web. Fortunately there’s an easy and effective way you can prevent people stealing your content. How To Prevent Content Theft Content theft is an ongoing issue for website owners.  There’s the simple copy and paste method by which people can steal your content. But there’s another content … Read more

Beware of Domain Name Appraisal Scams

There’s a scam going on called the Domain Name Appraisal. The scammers pose as buyers interested in a domain you have for sale, asking you to name your price. Beware of Domain Name Appraisal Scams Once you enter into communication with these scammers, what invariably pops up is a request you carry out a so-called … Read more

How To Choose a Domain Name and Web-Hosting For Your Business

Choosing and registering a domain name and web-hosting for your business is fairly straightforward.  But there are a few things you need to watch out for. How To Register a Domain Name For Your Business Think about some domain names which would be suitable for your business. Domains that aren’t yet registered are usually very … Read more

Switching from Windows to Linux Ubuntu

I’ve just switched my laptop over from Windows to Linux Ubuntu.

I’ve worked with Linux systems for many years so I’m not a newcomer to Linux.

Mostly though these have been server systems and not desktop computers.

Like the majority of people, I used Windows for my desktop PC and laptop.

So why the switchover from Windows to Ubuntu?

Switching from Windows to Linux Ubuntu

How To Install A WordPress Theme On Your Website

You don’t have to spend thousands with an expensive design consultancy to set up your website. WordPress makes it easy to install a theme for your website. There are literally thousands of different WordPress theme designs available at very low cost. Install a Premium WordPress Theme For Your Site WordPress allows you to install a … Read more

The Ultimate .htaccess Apache File Guide

This is a copy of The Ultimate .htaccess Apache File Guide by Charles Torvalds from www.askapache.com This document is reproduced here by kind permission of Charles Torvalds from www.askapache.com Full copyright details relating to this document can be found at the foot of this page. The Ultimate .htaccess Apache File Guide htaccess is a very … Read more

How To Comply With The EU Cookie Law

The EU Cookie Law requires sites to obtain consent of visitors to store information – or  “cookies” in their browsers. How To Comply With The EU Cookie Law The idea behind this is to protect the online privacy of consumers by informing them about this practice of using cookies and give them the choice as … Read more

How To De-Google Your Computer

The Snowden revelations about NSA data snooping make clear how our data is being spied upon by governments.  So I’ve been taking steps to de-Google my computer. How To De-Google Your Computer I’ve been taking step-by-step action to reduce my exposure to the services most likely to have links with or be infiltrated by the … Read more

How To Protect Against The ShellShock Bug

What is Shellshock? Shellshock is a vulnerability bug in the Bash shell used by many Unix, Linux, as well as Apple Mac computers. Shellshock gives attackers access to run commands and programs on a system. Microsoft Windows machines are not affected. If your system has not updated it’s Bash shell since September 28 2014  you … Read more

How To Secure Your Website Against WordPress Brute Force Password Attacks

There’s a worldwide hacker attack going on against many WordPress websites. The attack is a so-called “brute force attack” which aims to test different password and admin user id combinations to try and gain access to your WordPress administration dashboard. Then the attack installs a bot which is then used to launch attacks on other … Read more

The Unix and Linux System Administration Handbook

The Unix and Linux System Administration Handbook and the Linux system Administration Handbook are two of the best handbooks for system administrators ever written. The Unix and Linux System Administration Handbook is a joint effort by four authors: Evi Nemeth, Garth Snyder, Trent R. Hein, and Ben Whaley. The handbook is now in it’s fourth … Read more