Advanced Search
Search Results
47 total results found
DocuSeal
DocuSeal is an open-source digital document management platform designed to simplify the process of creating, filling, and signing digital documents. It positions itself as a leading alternative to established services like DocuSign and PandaDoc, offering a s...
2FAuth
In the digital age, securing our online accounts is more crucial than ever. As cyber threats evolve, the need for robust security measures has led to the widespread adoption of Two-Factor Authentication (2FA). Enter 2FAuth – a web-based, self-hosted alternati...
Kasm Workspaces
Streaming containerized apps and desktops to end-users. The Secure Workspaces platform provides enterprise-class orchestration, data loss prevention, and web streaming technology to enable the delivery of containerized workloads to your browser. You can learn...
Enhance Installation
Enhance is a comprehensive hosting control panel designed for modern web hosting needs, offering a wide range of features to support web hosts, developers, and website owners. Its main advantages include a powerful multi-server hosting environment, secure and...
MeshCentral
MeshCentral is a powerful and versatile Remote Monitoring and Management (RMM) software tool designed to facilitate full remote control and management of devices over the internet. It's an open-source project, making it a popular choice for IT professionals, ...
WireGuard Easy
Welcome to our step-by-step guide on setting up your own secure VPN with WG Easy (Wireguard Easy)! In today’s digital age, safeguarding your online privacy has never been more crucial. That's why we're excited to show you how to easily install WG Easy VPN, a ...
Immich
Immich is an open-source, self-hosted photo and video backup solution designed to prioritize privacy and control. Under active development, Immich offers users a way to securely store and manage their media files without relying on third-party services. The p...
Authentik
Authentik Authentik is an open-source Identity Provider (IdP) designed to offer flexible and versatile authentication and authorization solutions. It integrates seamlessly into existing environments, supporting various protocols such as OAuth2, SAML, LDAP, and...
PenPot Installation
Penpot: An Open-Source Design and Prototyping Tool Penpot is the first open-source platform for design and prototyping, tailored for cross-functional teams. It stands out as an excellent alternative to proprietary tools like Figma, offering flexibility, self-...
CrowdSec Installation
What is Crowdsec? CrowdSec offers a crowd-based cybersecurity suite to protect your online services, visualize & act upon threats, and a TIP (Threat Intel Platform) to block malicious IPs. What does Crowdsec do? Observability. Dashboards are great steering to...
Basic Server Security
Introduction As cyber-attacks become increasingly prevalent, safeguarding your cloud server is more vital now than ever before. Protecting it from the various types of threats lurking online should be a top priority in order to ensure its security and longevi...
CrowdSec WordPress integration
Integrate CrowdSec server protection and secure your WordPress websites! For complete server installation, please check our installation guide. CrowdSec Installation Video Walkthrough Installation WordPress Plugin installation Install Crowdsec Plugin from m...
WordPress Admin Recovery
Have you ever found yourself locked out of your WordPress admin panel, desperately searching for a way to regain control of your website? Well, fear not, because in this tutorial, we're going to show you a powerful solution. Loosing your WordPress admin passw...
Complete WordPress & Server Security Guide
Introduction Server security and website security are both important and closely related. It's difficult to say if one is more important than the other, as they both serve to protect your online presence and data. However, neglecting either one can lead to se...
The Human Flaw in Cyber Defense
In this general guide, we delve into the often overlooked aspect of cybersecurity: the human element. Despite advanced technologies and sophisticated security protocols, the biggest vulnerability in any system is us, the users. This video and accompanying blo...
AI-Powered WordPress Automation with DeepSeek AI, n8n & Baserow!
Introduction Are you tired of juggling countless tools and paying hefty subscription fees just to keep your WordPress site running smoothly? In this tutorial, we’re diving into the infinite automation possibilities that open-source tools like n8n and Baserow ...