Latest POSTS

Harden SSH on Ubuntu 24.04

Harden SSH on Ubuntu 24.04: Disable Root, Use Key Auth, Restrict IPs

Learn how to harden SSH on Ubuntu 24.04. Disable root login, enforce SSH key authentication, and restrict IP access for maximum protection. Table of Contents 🔈Introduction Secure Shell (SSH) is the backbone...
Responsive Dashboard with React and Tailwind on RHEL 9

How to Build a Responsive Dashboard with React and Tailwind CSS on RHEL 9 | CentOS 9

Learn how to build a responsive React dashboard with Tailwind CSS on RHEL 9 or CentOS Stream 9. Includes CLI commands, deployment tips, and full code examples. Table of Contents 🔈Introduction Deploying...
GPU passthrough on KVM

How to Set Up GPU Passthrough on KVM for a High‑Performance Linux VM

A detailed, step‑by‑step guide to setting up GPU passthrough on KVM for Linux hosts. Learn how to enable IOMMU, bind your GPU to VFIO, configure hosts and guests, avoid common issues, and unlock near‑native...
Splunk allowedDomainList configuration

Splunk Email Security Risk: How to Fix allowedDomainList Warning in alert_actions.conf

Learn how to fix the Splunk allowedDomainList security warning in alert_actions.conf. Prevent unauthorized alert emails and protect sensitive data by configuring domain restrictions correctly. Table of...