Skip to content
ITFROMZERO - Share tobe shared!
  • Home
  • AI
  • Database
  • Docker
  • Git
  • Linux
  • Network
  • Virtualization
  • English
    • Tiếng Việt
    • English
    • 日本語
  • Home
  • AI
  • Database
  • Docker
  • Git
  • Linux
  • Network
  • Virtualization
  • English
    • Tiếng Việt
    • English
    • 日本語
  • Facebook

Security

Security tutorial - IT technology blog
Posted inSecurity

Configuring HTTP Security Headers: ‘Armor’ for Nginx and Apache to Achieve A+ Standard

Posted by By admin May 9, 2026
Installing SSL (HTTPS) is just the beginning. To truly block Clickjacking and XSS, you need a powerful set of HTTP Security Headers. Upgrade your security in 5 minutes.
Read More
Database tutorial - IT technology blog
Posted inDatabase

Database Encryption: Don’t Leave Your Data Exposed with pgcrypto and AES_ENCRYPT

Posted by By admin May 5, 2026
Don't let user data leak in plain-text. Learn how to use pgcrypto and AES_ENCRYPT to encrypt sensitive data according to modern security standards.
Read More
Fedora tutorial - IT technology blog
Posted inFedora

Preventing Brute-force Attacks on Fedora Server with Fail2ban: Don’t Leave SSH Doors Wide Open

Posted by By admin May 3, 2026
Don't let your Fedora Server crash due to brute-force attacks. Check out this guide to configuring Fail2ban to automatically block malicious IPs and secure SSH.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Ditch VPNs, Use Cloudflare Access to Secure Internal Apps: Fast, Secure, and Effortless

Posted by By admin May 3, 2026
Forget VPNs! Learn how to use Cloudflare Access to protect internal dashboards and SSH with Google/GitHub SSO. 5-minute setup for enterprise-grade security.
Read More
Docker tutorial - IT technology blog
Posted inDocker

Securing Docker Images with Cosign: Thwarting Malware in the Software Supply Chain

Posted by By admin May 3, 2026
Forget Notary v1; Cosign is the new standard for Docker image security. This guide covers signing, verification, and CI/CD integration to protect your systems from malware.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Securing Secrets in GitHub Actions: Don’t Leak API Keys Due to a Moment of Negligence

Posted by By admin April 29, 2026
Don't expose API keys and tokens on GitHub. A detailed guide on using GitHub Actions Secrets to protect sensitive information and deploy CI/CD securely.
Read More
Docker tutorial - IT technology blog
Posted inDocker

Distroless Docker Images: Remove Unnecessary Shell and OS to Harden Container Security

Posted by By admin April 28, 2026
Google's Distroless Images strip the shell, package manager, and unnecessary OS components from Docker containers — significantly reducing the attack surface. This guide covers how to use multi-stage builds with Distroless for Go, Python, and Java, along with real-world vulnerability comparison and testing techniques.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Nginx GeoIP Blocking: How I Cut 80% of Junk Traffic from Unknown Countries

Posted by By admin April 27, 2026
Blocking IPs by country using Nginx and MaxMind GeoLite2 is the most effective way to eliminate 80% of botnet junk traffic. See this detailed configuration guide drawn from real-world experience.
Read More
Ubuntu tutorial - IT technology blog
Posted inUbuntu

How to Register Ubuntu Pro for Free: 10 Years of Security, Kernel Updates Without Rebooting

Posted by By admin April 26, 2026
Learn how to activate Ubuntu Pro for free to receive 10 years of security patches. Use Livepatch to update the Kernel immediately without rebooting the server.
Read More
Linux tutorial - IT technology blog
Posted inLinux

Linux ACL: How to Set ‘Ultra-Detailed’ Permissions for Each User (Replacing chmod 777)

Posted by By admin April 24, 2026
Forget chmod 777! Learn how to use Linux ACLs for 'surgical' user and group permissions, solving permission issues in real-world projects.
Read More

Posts pagination

1 2 3 … 6 Next page
Copyright 2026 — ITFROMZERO. All rights reserved.
Privacy Policy | Terms of Service | Contact: [email protected] DMCA.com Protection Status
Scroll to Top