Install And Configure DenyHosts In CentOS
Permalink

Install And Configure DenyHosts In CentOS

Introduction DenyHosts is a script intended to be running by Linux system administrators in order…

Continue Reading →

How To Install ConfigServer Security And Firewall In Linux
Permalink

How To Install ConfigServer Security And Firewall In Linux

About ConfigServer Security and Firewall ConfigServer Security and Firewall, also known as CSF, is an…

Continue Reading →

Prevent Brute Force Attacks Using These Tools
Permalink

Prevent Brute Force Attacks Using These Tools

About Brute Force Attacks We, all, know the popular saying: “Prevention is better than cure”.…

Continue Reading →

Install MySecureShell SFTP Server In Linux
Permalink

Install MySecureShell SFTP Server In Linux

About MySecureShell MySecureShell is an Open Source, Multi-platform, very secure FTP server based on OpenSSH.…

Continue Reading →

Arachni the Security scanning tool for Web
Permalink

Arachni the Security scanning tool for Web

Introduction: Arachni is a fully featured web security scanning tool, it is based on ruby…

Continue Reading →

First Things To Do After Installing Debian 8
Permalink

First Things To Do After Installing Debian 8

The┬áVersion 8.0 of Debian (known as Jessie) was relased on 25 April 2015. This version…

Continue Reading →

Install And Configure OpenLDAP In Ubuntu 15.04 And Debian 8
Permalink

Install And Configure OpenLDAP In Ubuntu 15.04 And Debian 8

About OpenLDAP OpenLDAP is a free open source Light Weight Directory Access protocol developed by…

Continue Reading →

How To Manage Multiple SSH Sessions Using Cluster SSH And PAC Manager
Permalink

How To Manage Multiple SSH Sessions Using Cluster SSH And PAC Manager

About SSH We, all, know what is SSH, right? SSH, stands for Secure Shell (sometimes…

Continue Reading →

X2Go: An Open Source Remote Desktop Solution For Linux
Permalink

X2Go: An Open Source Remote Desktop Solution For Linux

About X2Go X2Go is an Open Source remote desktop application for GNU/Linux that uses NX…

Continue Reading →

John The Ripper: The Fast, Multi-platform Password Cracking Tool
Permalink

John The Ripper: The Fast, Multi-platform Password Cracking Tool

Weak passwords are the most common threats to the Information Security. Many users, still, are…

Continue Reading →

Ways To Secure Your Ubuntu 14.04 Server Running LAMP
Permalink

Ways To Secure Your Ubuntu 14.04 Server Running LAMP

Securing your Ubuntu Linux server to become unpredictable, below are some tips to get you…

Continue Reading →

Install AVG Free Antivirus On Ubuntu
Permalink

Install AVG Free Antivirus On Ubuntu

SELinux And Non-Default Home Directory Locations
Permalink

SELinux And Non-Default Home Directory Locations

SELinux greatly enhances security by going beyond discretionary access control (DAC) and implementing mandatory access…

Continue Reading →

Encrypted Communication: Encrypt And Send Emails Securely
Permalink

Encrypted Communication: Encrypt And Send Emails Securely

About Encrypted Communication In this fast-faced and sophisticated world, you can’t be secure 100% in…

Continue Reading →

How To Send Alerts From Nagios Core Using Gmail And Yahoo
Permalink

How To Send Alerts From Nagios Core Using Gmail And Yahoo

Introduction One of the most important feature of the monitoring platform is the notification system;…

Continue Reading →

VeraCrypt: Secure Your Data On An Encrypted Volume
Permalink

VeraCrypt: Secure Your Data On An Encrypted Volume

Introduction As you may know, CIA, Confidentiality/Integrity/Availability, is the main key elements of Information Security.…

Continue Reading →

Security Onion: A Linux Distro For IDS, NSM, And Log Management
Permalink

Security Onion: A Linux Distro For IDS, NSM, And Log Management

Introduction Security Onion is a Linux distribution for intrusion detection, network security monitoring, and log…

Continue Reading →

An Introduction To Access Control Lists (ACL)
Permalink

An Introduction To Access Control Lists (ACL)

What Is Access Control List (ACL) Access Control List (ACL) provides an additional, more flexible…

Continue Reading →