In an administrator’s quest to get stuff done, SELinux tends to get in the way. It is being perceived as a nuisance rather than a feature and this happens mostly for only one reason: setting correct SELinux labels requires the ability to figure out the appropriate SELinux security contexts. Here is how to do it.

Correcting SELinux security contexts: how to adjust SELinux labels on your file system
In an administrator’s quest to get stuff done, SELinux tends to get in the way. It is being perceived as a nuisance rather than a feature and this happens mostly for only one reason: setting correct SELinux labels requires the ability to figure out the appropriate SELinux security contexts. Here is how to do it.

Set up logrotate for Postfix
Finding errors in a postfix log file is tedious work. The job gets even more complicated if you have to dig through old postfix log files which might no longer be relevant. logrotate comes to the rescue, but only if you configure it correctly. Here is how you can do it on Fedora.

Fixing your Web Server’s Security Headers: From Hall of Shame to Hall of Fame
[Updated 2020-12-04] This post explains how to set up robust security headers in NGINX to protect your web application from malicious payloads and other forms of attacks. Choose your HTTP(S) headers wisely.

Cannot sign in to AWS as IAM user with MFA? How to resync your MFA token generator
Problems signing in to AWS? When the login page “Sign in as IAM user” repeatedly says: “Your authentication information is incorrect. Please try again” though you entered correct information, your Gemalto token generator for MFA authentication could be out of sync.


Running Microsoft Azure In Your Own Data Center
In the stormy race of the digital transformation, the hybrid landscape of corporate IT is increasingly evading manageability. Could the control plane of a hyperscaler provide a lasting remedy? Would you need special hardware?
- 1
- 2
- 3
- …
- 17
- Next Page »