×

This article covers the best Integrated Development Environments (IDEs) that despite providing a coding environment, also provide assistance and support along with speed and efficiency to enhance the software developers’ overall coding experience. PhpStorm, Eclipse, BlueFish, VSCode, and Sublime Text – all IDEs are part of our list of top-performing IDEs. Each IDE is cross-platform compatible thereby enabling software developers across all the platforms, i.e. Windows, macOS, and Linux, and making development easy, efficient and equal for all.

Basically, Developing software solutions is a need and demand of many users, companies, and enterprises across the globe. In this advanced world of information technology, it has almost become impossible to expect advancements and improvements or even sustenance without relying on a software solution.



This article covers how to create a new SSH key pair and set up an SSH key-based authentication. You can set up same key to multiple remote hosts on CentOS system. Also, you will learn how to disable SSH password authentication.

SSH, or secure shell, is an encrypted protocol used to administer and communicate with servers. When working with a CentOS server, chances are, you will spend most of your time in a terminal session connected to your server through SSH.

SSH keys are typically configured in an authorized_keys file in . ssh subdirectory in the user's home directory. Typically a system administrator would first create a key using ssh-keygen and then install it as an authorized key on a server using the ssh-copy-id tool.

The public key should be stored in the ~/. ssh/authorized_keys file on the server.


To Create the RSA Key Pair:

1. Execute the command below to create a key pair on the client machine (usually your computer):

$ ssh-keygen

2. Press ENTER to save the key pair into the .ssh/ subdirectory in your home directory, or specify an alternate path.


Best Practices to improve SSH Key Security:

  • Discover all SSH Keys and Bring Under Active Management.
  • Ensure SSH Keys Are Associated With a Single Individual.
  • Enforce Minimal Levels of User Rights Through PoLP.
  • Stay Attentive to SSH Key Rotation.
  • Eliminate Hardcoded SSH Keys.
  • Audit All Privileged Session Activity.



This article covers how to install the Zabbix Agent on a Ubuntu 20.04 system very conveniently.
You can ensure the successful installation of the Zabbix Agent by checking its Active status on your system. However, you can also uninstall it anytime you want.
Zabbix agent is installed on the remote host (target) to monitor the hard drive, memory processor, etc. The agent collects data and sends back to Zabbix Server.
Zabbix agents can use passive or active checks to pass information.
In passive check, Zabbix server (poller) requests an agent for certain information, and the agent sends back a value.
In the active check, the agent process all data and pushes it to the Zabbix server.
However, agent periodically connects the server to collect metric which needs to be monitored.


To Configure Zabbix agent:
Make necessary changes on the Zabbix Agent configuration file "/etc/zabbix/zabbix_agentd.conf".
After making changes, Save the changes and exit the file.
Then restart Zabbix agent service to the changes to be effected.

$ sudo systemctl restart zabbix-agent


To Configure the firewall on Zabbix agent:
1. If you have UFW firewall enables, execute the commands:

$ sudo ufw allow 10050/tcp

2. Then reload the firewall

$ sudo ufw reload

3. And verify that the port has been opened or allowed on the firewall.

$ sudo ufw status




More Linux Tutorials

We create Linux HowTos and Tutorials for Sys Admins. Visit us on IbmiMedia.com

Also for Tech related tips, Visit forum.outsourcepath.com or General Technical tips on www.outsourcepath.com