How to install Univention Corporate Server

Preface Most of the IT or non-IT organization/companies generally possess hybrid environment .i.e. they have Linux based as well as Microsoft based desktops or servers.It...

Protecting Apache Server From Denial-of-Service (Dos) Attack

Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely...

Five Pentest Tools for you

A pentest, short-name for penetration test, is a software attack which looks for security weaknesses in a system. Penetration tests are a component of...

How to configure CacheGurard web gateway

About CacheGuard CacheGuard is an dedicated Gateway application OS along with web based management system. It protects users along with web applications, it is open...

How To Install And Use Untangle Firewall

Introduction Untangle is very lightweight, easy to install and easy to use but very effective  firewall operating system. It makes you enable to protect, monitor and...

Network Monitoring Tools You Have To Know

We all understand how system administrators love to have network monitoring tools which make their lives easier. Following is a list of the best...

How To Install OPNsense Firewall

Introduction OPNSense is an stateful firewall which comes with almost all of the features that are expected from a commercial firewall, it has a sleek graphical...

10 Practical Examples Of Linux ‘nmap’ Command

About Nmap Nmap is a tool used for determining the hosts that are running and what services the hosts are running. Nmap can be a...

Arachni the Security scanning tool for Web

Introduction: Arachni is a fully featured web security scanning tool, it is based on ruby framework.It is an open source, modular and high performance tool....

First Things To Do After Installing Debian 8

The Version 8.0 of Debian (known as Jessie) was relased on 25 April 2015. This version includes many changes and modifications. Jessie comes with a new...

How To Manage Multiple SSH Sessions Using Cluster SSH And PAC...

About SSH We, all, know what is SSH, right? SSH, stands for Secure Shell (sometimes known as Secure Socket Shell), is a Cryptographic Protocol that...

Dooble: A Web Browser, Specially Designed For Security And Privacy

Security and privacy are the two biggest concerns in Web, right? Indeed. In this highly sophisticated technological world, security and privacy are just dreams....

Security Measures To Protect Your Servers

Introduction External and internal attackers day after day are menacing your networks. Many intelligent methods are discovered in order to get access and damage your...

SELinux And Non-Default Home Directory Locations

SELinux greatly enhances security by going beyond discretionary access control (DAC) and implementing mandatory access control (MAC). MAC allows implementation of additional restrictions on...

Encrypted Communication: Encrypt And Send Emails Securely

About Encrypted Communication In this fast-faced and sophisticated world, you can't be secure 100% in Internet. And, the Security myth is no technology is 100%...

Remove The Password Of A Password Protected PDF Files

This brief tutorial describes how to remove the password protection from the PDF files. Please note that we are not going to hack or...

Security Onion: A Linux Distro For IDS, NSM, And Log Management

Introduction Security Onion is a Linux distribution for intrusion detection, network security monitoring, and log management. It’s based on Ubuntu and contains Snort, Suricata, Bro,...

MegaChat – A Web Based Encrypted Voice And Video Chat Service

Probably, you may have used Skype, a popular audio/video chat app developed by Microsoft, for free Audio and Video Chatting with your friends, family...

Latest Articles

Review: Ubuntu 16.04 LTS (Xenial Xerus)

Introduction Here we are again staring down the face of a new release of Ubuntu. This time around we see the release of the new...

Learn man, vim editor and file globbing for RHCSA

4.1 What we will include in this RHCSA tutorial? Welcome back to this RHCSA exam preparation tutorial series, three chapters of this tutorial series has...

Password Management in Linux by using passwd command

A password(commonly knows as passwd in linux) is an unspaced sequence of characters used to determine that a computer user requesting access to a...

Proxmox VE 4.2 Released

IENNA, Austria – April 27, 2016 – Proxmox Server Solutions GmbH, the company developing the server virtualization platform Proxmox Virtual Environment (VE), today announced...

Configure WordPress with Ubuntu 16.04

Introduction Wordpress  is a very popular  open source  CMS system, it comes with thousands of features, some  of  the themes are free and some of...

Follow us

71,427FansLike
3,869FollowersFollow
3,052FollowersFollow
10,243FollowersFollow
178SubscribersSubscribe