Setup and Configure CentOS Server Part 2

In part one, we began by changing the root password and then creating an account that will be able to escalate to root privileges when needed. Now, you need to make sure that only that user can become root and not anyone else.
The easiest way to do this is to use the “wheel” group. You […]

Best Practices for Password Security

In most cases, your password is the only thing standing between your server and all of its treasures, and the horde of violent hackers waiting to rip it to pieces.  Your password is your safeguard.  Without it, you have no access, and if it falls into the wrong hands, you are deep trouble.
There are several […]