A repository of information technology questions and answers

Latest posts

Restricting Access to SSH Connections

A set of direcetives that are under used are the AllowUsers, AllowGroups, DenyUsers and DenyGroups to restrict user and groups remote access with SSH.

Securing SSH on Solaris 10

It is strongly recommended that sites abandon older clear-text login protocols and use SSH to prevent sniffing of sensitive data off the network

Recovering from a lost root password under Linux

This article provides a quick procedure on how to recover a lost root password frm virtually any version of Linux which uses the GRUB boot loader.