On 19th March 2015, multiple high and moderate severity level vulnerabilities released in OpenSSL, a Secure Sockets Layer toolkit used in a Linux and Unix-like systems. How can I fix these vulnerabilities on a CentOS/RHEL/Ubuntu and Debian Linux based server? How do I verify that my Linux server has been fixed against the OpenSSL vulnerability?
I work from a small office/home office and I need to set up an IPSec site-to-site VPN between a Cisco/OpeNBSD IPSec-enabled gateway and firewall running PFSense. How do I configure the VPN tunnel so that I can access remote subnet and servers behiend a Cisco firewall/router securely? How do I setup a tunnel mode configuration which will provide you with an encrypted site-to-site network, allowing networks at multiple remote locations to be able to securely communicate using my PFSense located in my SOHO?
I know how to cange a passphrase for openssh using ssh-keygen command. How do I change a GPG encryption key’s passphrase on Linux or Unix like operating systems? How do I change the passphrase of the secret key using gpg?
Google Chrome/Chromium, Firefox and Opera browser support SPDY networking protocol. It enables faster browsing on supported sites. SPDY is similar to HTTP, with particular goals to reduce web page load latency and improve web security. SPDY achieves reduced latency through compression, multiplexing, and prioritization. How do I enable nginx SPDY support running on Debian or Ubuntu Linux server?