Found 5 results

Generate SSH Key – Linux, Mac and Windows

In this quick tutorial, Generate SSH Key, we will learn more exactly how to generate a SSH Key in Linux or Mac using a terminal window and also in Windows using Putty. Before we start our little journey we should be clear about one thing, all SSH Keys consists of two parts, a Private Key and a Public Key. In this article we’ll generate both these keys and we’ll learn the importance but also the difference between these two. What is a Pivate Key As we said in our introduction a SSH Key contains a Private Key and a Public […]

Category: Security | Published: 09/02/2018 | Updated: 05/11/2018

Setup an SFTP Server on CentOS

Set up an SFTP server on CentOS is our next tutorial where we will guide you as always, step by step, how to build from scratch such a server. We all agree that an SFTP server can be quite handy or sometimes a must if for example one or more applications within our stack requires file transfer between different processing steps or maybe for backups. In this tutorial we will learn how to build an SFTP server on CentOS 7 and OpenSSH 7.4 and also providing you two authentication solutions, first one being based on using basic password authentication and […]

Category: General | Published: 08/11/2018 | Updated: 14/12/2018

Setup a Private Docker Registry

Setting up a private Docker registry locally for our organisation or maybe for personal use can be seen as a must if we don’t want to expose publicly our custom Docker images. It is true that we can easily get a private repository if we would go for a paid subscription to one of the providers available out there on the market that are offering such services, but why doing so when we can simply do it by ourselves, internally, completely isolated and being under our control. Having a private Docker repository / registry will give us the ability to […]

Category: Docker | Published: 20/12/2019 | Updated: 31/12/2019

SSH client configuration for Jump Host

SSH client configuration for Jump Host is just a simple, fast and efficient way to configure your local SSH client to remote access via SSH other external networks / hosts. In the same time we can say that this solution adds a layer of security as well if your environment is not so secure for whatever reason, we have seen this quite often but let’s not talk about this yet. In this short tutorial we will try explain in a very simple way how you may configure your local SSH client configuration file in order to connect straight to one […]

Category: Security | Published: 10/08/2018 | Updated: 15/11/2018

What is GDPR

We all heard in the news about GDPR in 2018, but what is GDPR? In the first place GDPR or also known as EU General Data Protection Regulation is a decisive amendment in data privacy regulation from the last 20 years, it actually basis his provisions on the Data Protection Directive 95/46/EC and was particularly created to reconcile data privacy laws within Europe. The main difference regarding the legislative framework is given by the name itself GDPR – that means it is a regulation (a legally binding act) and not only a directive (an official or authoritative instruction that outlines […]

Category: Regulations | Published: 04/08/2018 | Updated: 05/11/2018