SCP Linux – Securely Copy Files Using SCP examples
This post includes SCP examples. SCP or secure copy allows the secure transferring of files between a local host and a remote host or between two remote hosts. It uses the same authentication…

This post includes SCP examples. SCP or secure copy allows the secure transferring of files between a local host and a remote host or between two remote hosts. It uses the same authentication…

Let’s pick up right where Part 1 left off: pfSense Firewall Appliance Unboxing. This isn’t a quick-start guide. It’s my logbook from weeks of fine-tuning pfSense. Weeks, not years, so follow along and…

For the past three years, I’ve been putting off an upgrade to my network’s firewall. During that time, I was balancing multiple priorities: maintaining uptime with multiple ISPs, managing VPN performance limitations, and…

The sudo command in Linux is one of the most important and widely used commands for managing system permissions. It allows you to run a command as the superuser, giving you elevated privileges…

This iotop command guide follows my previous 90 Linux Commands frequently used by Linux Sysadmins article. As time allows, I will continue to publish articles on the 90+ commands geared toward Linux sysadmins…

If you’ve ever looked at your server and wondered why it’s using swap even though plenty of RAM is available, you’re not alone. This is a common scenario on Linux systems, and it…

Recently, I supported a client with solving MySQL performance issues. There were several areas where MySQL performance issues were addressed. One issue, however, that was overlooked before our communications was that of keeping…

When it comes to database performance monitoring and optimization, MySQL offers a powerful tool called Performance Schema. This versatile instrument provides invaluable insights into the inner workings of your MySQL database, enabling you…

I’m sharing these PHP-FPM tweaks for pfSense publicly to solicit feedback and help anyone exploring similar optimizations. There may be more efficient methods or edge cases I haven’t covered. I welcome any suggestions,…

We all know how important it is to back up our data regularly. Disk drives fail, databases crash, and human error or bad actors can wreak havoc when you least expect it. Hurricanes,…

Recently, I started the process of upgrading my home network to give myself more room to experiment and grow. The first major step was replacing my router with a new firewall appliance, which…

A couple of months years back, I decided to maintain a list of companies that offer IoT (internet of things) security tools and solutions, which you can find below. Please don’t hesitate to…

Looking for application monitoring and observability solutions? On this page, I’ve listed the top application performance monitoring (APM), infrastructure monitoring, and observability solutions to date. The listings are updated periodically as APM and…

Updating your Linux system is one of the most important things you can do to keep it secure, stable and running well. With updates, you can patch vulnerabilities, fix bugs and access new…

Recently, I wanted to test network throughput via command line with at least 3 tools. For the life of me, I could not remember iperf. Not being able to remember previously used command…

Ready to go on a journey that will take your Linux skills to the next level and beyond what theoretical learning can? The devices in this article will give you hands-on experience and…

Over the past few years, we’ve seen a mass migration from the work office to the home office. This continues to increase the requirements for better home network security, capacity, and additional capabilities….

Thomas Jefferson said: “Our greatest happiness does not depend on the condition of life in which chance has placed us, but is always the result of a good conscience, good health, occupation, and…