Upgrading glibc for the GHOST Vulnerability GHOST is a vulnerability that was announced on January 27th 2015, which affects the glibc library on Linux systems. This vulnerability affects all Linux... Read more

Create a Self-Signed TLS Certificate What is a Self-Signed TLS Certificate? Self-signed TLS certificates are suitable for personal use or for applications that are used internally within an organization. If... Read more
Mitigating memcached Amplification Attacks What is Memcrashed? Recently there has been a significant increase in large-scale UDP reflection and amplification attacks across the internet. These attacks were all using the... Read more

How to Configure a Firewall with UFW What is UFW? UFW, or uncomplicated firewall, is a frontend for managing firewall rules in Arch Linux, Debian or Ubuntu. UFW is used... Read more

How to check your servers for Bash ShellShock (CVE-2014-6271, CVE-2014-7169) ShellShock, what a fitting name. The latest major headache for Sys Admins, Developers…well pretty much anyone who has a*nix system... Read more
How to Use GPG Keys to Send Encrypted Messages What is GnuPG? GNU Privacy Guard (GnuPG), also known as GPG, is a tool for secure communication that was created by... Read more

Download a Local Copy of your Linode Backup The Linode Backups service can create automatic and manual snapshots of your Linode. A completed backup can be directly restored to the... Read more