Sign in

JB Benjamin
Privacy is a Human Right — Not a Privilege

Thoughts from the Founder of Kryotech

The founder’s thought is essentially that the decade starting with 2020 is going to be incredible. We will see societal changes like no other time. We are already seeing radical shifts in popular concepts and ideologies. We are seeing the remnants of the old world crumble around us, from the collapsing economic systems around us and pandemic to civil unrest rivaling the civil unrest of the 60’s and 70’s. When Derek Chauvin choked the breath out of George Floyd, he wasn’t just murdering another Black Man, he was snapping the neck of the Old…

How-to-Guides from Kryotech

What Do I Need?

Why do Processes Die?

Some unexpected behavior on the web server can at times be caused by system resource limitations. Processes often do this and sometimes quite excessively. Linux by its design aims to use all of the available physical memory as efficiently as possible. However, in practice, the Linux kernel follows a basic rule that a page of free ram is wasted RAM. The system holds a lot more in RAM than just application data; most importantly mirrored data from storage drives for faster access.

Unexpectedly Stopped…

How-to-Guides from Kryotech

What Do I Need?

What are Log Files?

Log files are the all-important records that Linux stores for administrators to keep track and monitor important events on the webserver, kernel, services, and the applications running on it. Linux provides a centralized repository of log files that can be located under the /var/log directory. All log files generated in a Linux environment can typically be classified into four different categories:

  • application logs,
  • event logs,
  • service logs,
  • system logs.

Monitor Log Files

Monitoring and analyzing log files can be a challenging task. The sheer volume…

How-to-Guides from Kryotech

What Do I Need?

What Can Go Wrong with Hardware?

Linux web servers are used for mission-critical business and consumer applications in many different types of infrastructures, including physical machines, virtualization, private, public, and hybrid cloud. Linux hardware infrastructure, including software-defined functionalities, relates to networking, storage, containers and multiple tools on Linux servers.

It takes some time to troubleshoot and solve hardware related issues on Linux. Even experienced sysadmins can spend hours working to solve mysterious software discrepancies.

Quick-Diagnosing Devices, Modules, and Drivers

The first step in troubleshooting usually is to display a list of the hardware installed on your Linux server. You…

What is End-to-End Encryption?

Most messaging apps use one of two different types of database to store and relay messages and content between users. One is a self-hosted, on-premises database instance utilising corporate level software. The other is a cloud provided provision that allows for near instant scalability anywhere in the world anytime. In those instances most messaging apps, even the popular ones, use Google’s Cloud Firebase. This is what a typical Firebase app looks like:

We are the Alternative to Mainstream Messaging Apps using Virgil e3Kit

Originally written by Rebecca Yarbrough of Virgil Security

If you have the data, you have the power. That’s how our modern digital economy works. Vox Messenger {Secure}, a new consumer and corporate messaging tool, gives that power back to the user. By using Virgil Security’s E3Kit end-to-end encryption toolkit to lock themselves and others out of access to their users’ messages, Vox Messenger {Secure} is positioning itself as a secure, ad-free alternative to other mainstream messaging apps.

In most chat apps, when you type up a message and press send, or if you upload a photo to your social media…

How-to-Guides from Kryotech

What Do I Need?

What is TrueCrypt?

TrueCrypt is an open-source, on-the-fly encryption system that ceased further development and maintenance by its creators in June 2014. This, however, hasn’t stopped this from becoming one of the more popular encryption systems for Linux, despite its subsequent deprecation. Still, an independent audit conducted in 2015 didn’t find any significant flaws present.

Install TrueCrypt on Ubuntu

You can simply install TrueCrypt in Ubuntu by adding the appropriate packages.

Open Terminal and add the package using the following commands:

sudo add-apt-repository ppa:stefansundin/truecrypt

Update your…

How-to-Guides from Kryotech

What Do I Need?

What is mCrypt?

Essentially the mcrypt extension is a replacement for the classic Unix crypt command. These commands serve as a way to encrypt files on Unix and Linux systems. The php-mcrypt extension serves as a connection between PHP and mcrypt. It provides a way for developers to utilize a wide range of encryption functions without having to make drastic changes to their codebase. …

JB Benjamin

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store