The most recent articles
Find below the most recent articles sorted by date, to see the full archive please click here.

Unveiling Qwen AI: A Comprehensive Look at Its Capabilities
Large language models have become pivotal tools for businesses, developers, and individuals. Among these innovations stands Qwen, a cutting-edge AI developed by Alibaba Cloud.

How DeepSeek Achieved Cheaper AI Processing Than OpenAI
The race to dominate the AI industry isn’t just about building smarter models—it’s also about who can deliver powerful AI solutions at the lowest cost.

Introduction to Containers and Docker on Linux: Basics and Setup
If you’ve ever heard the terms “containers” or “Docker” and felt a little out of your depth, don’t worry—you’re not alone. Containers are transforming how

PostgreSQL vs. MySQL: Comparison for Linux System Administrators
Understanding the differences between PostgreSQL and MySQL is crucial for managing databases effectively. Both PostgreSQL and MySQL are popular open-source databases, but they each have

Configuring the Linux Kernel: Basics and Considerations
The Linux kernel is the heart of every Linux-based operating system. It bridges software with the system’s hardware. Whether you’re trying to squeeze the best

Backup and Recovery Strategies: A Practical Overview for Data Protection
One of your most critical responsibilities for Linux Admins is ensuring the availability and integrity of your organization’s data. It’s not a glamorous job, but

Quick Guide: How to Brute Force with Burp Suite
This tutorial walks you through a simple brute force attack using Burp Suite. It’s hands-on, and while concise, it covers the essentials. For the best

Networking Basics in Linux: Network Settings and Multiple IPs
Setting up multiple IP addresses on a single network interface, allowing for more flexible and efficient management of services and resources is a common task

Process Management: Monitoring and Controlling Processes in Linux
As a Linux System Administrator, process management is one of the most crucial skills to master. Efficiently monitoring and controlling processes ensures the system runs

Galera Cluster: A Practical Guide to Setup on Debian/Ubuntu, Example With Two Nodes
Galera Cluster is a high-availability solution for MySQL databases, offering synchronous replication across multiple database nodes. Designed for MySQL, MariaDB, and Percona XtraDB Cluster, Galera

A Comprehensive Guide to Using rsync on Debian
As a Linux system administrator, managing file transfers and backups is a crucial part of your daily routine. Two popular tools for these tasks are

Shell Scripting Basics: Automation To Streamline Linux Administration Tasks
Linux administration is tightly linked to efficiency and precision. One of the best ways to achieve this is through shell scripting. Whether you’re managing hundreds

Using AppArmor on Debian: Enhancing Security on Linux Systems
Securing your system is no longer optional—it’s essential. As a Linux System Administrator, you are tasked with ensuring the security and stability of your systems,

Exploring Wireshark: A Powerful Tool for Sniffing Unencrypted Traffic
With countless devices and users connected to networks at all times, ensuring that sensitive data remains secure is a top priority. Yet, despite advancements in

SELinux Explained: Why You Need It and How to Set It Up
We all know that in today’s computerized landscape, security is of paramount importance. As cyber threats continue to evolve, securing systems, especially servers and endpoints

Guide to Linux Security: SSH Hardening, SELinux, AppArmor, Firewalls, and Security Audits
As a Debian/Ubuntu Linux System Administrator, ensuring the security of your server is not just an optional task; it’s a critical responsibility. The security landscape

Cyber Hygiene Tips: Simple Daily Steps to Improve Your Security
With cyber threats constantly evolving, it’s crucial that both individuals and businesses adopt daily security practices to protect their data and systems. Cyber hygiene refers

WordPress Optimization For Speed and Security: A Comprehensive Guide
WordPress, the most popular content management system (CMS) in the world, powers over 40% of websites globally. However, as your website grows in complexity and

Integrating Wazuh SIEM with VirusTotal: Practical Guide
Securing sensitive data and monitoring file integrity across enterprise networks is essential. Integrating Wazuh, a robust SIEM solution, with VirusTotal, a powerful threat intelligence platform,

How to Perform a Cybersecurity Risk Assessment: A Practical Guide
Cybersecurity threats are more sophisticated and pervasive than ever before. For organizations and individuals alike, the ability to anticipate, identify, and mitigate risks is critical

Penetration Testing Overview: Introduction and Essential Tools
The importance of securing systems and networks cannot be overstated. Cyber-criminals are always on the lookout for vulnerabilities, and businesses need to stay ahead of

Phishing Scams to Watch For: A Breakdown of Current Tactics and How to Avoid Them
Cybersecurity threats are constantly evolving, but one tactic has remained persistently effective for attackers: phishing. Phishing scams—where cybercriminals trick users into providing sensitive information—continue to

Endpoint Security Best Practices: Tips for Securing Devices in Your Network
Endpoints (laptops, desktops, mobile devices, and servers) are prime targets for cyberattacks. As networks grow increasingly complex, securing these devices has become more critical than

Zero Trust Architecture: Importance and Practical Implementation Strategies
Threats are more sophisticated and pervasive than ever before, traditional security models based on perimeter defenses are no longer adequate. Zero Trust Architecture (ZTA) has