Security Operations

7 Results / Page 1 of 1

Background
Photo by Pixabay: https://www.pexels.com/photo/close-up-of-figurine-326616/

today17 February 2024

Application Security Justin

A Guide to Public Key Authentication Using SSH

The SSH (Secure Shell) protocol allows an ability to remotely, and securely, access hosts. SSH has various options for authenticating to a host including — password authentication, public-key authentication, and host-based authentication. Before we get into all of that, let’s generate an SSH keypair. Generating an SSH Keypair Most Linux ...

Gitlab

today4 March 2023

Application Security Justin

Easy GitLab Upgrading Using The Upgrade Path Tool

What Is GitLab? GitLab is web software built on the popular Git Version Control system that provides organization and control to DevOps activity. Similar to GitHub, it allows you to store and organize code, create CI/CD pipelines, as well as track issues. GitLab is a frequent source of attack by ...