Illegal Access to Adobe Source Code

Adobe Systems, Inc. (/əˈdoʊbiː/ ə-doh-bee), is an American multinational computer software company headquartered in San Jose, California, United States. The company has historically focused...

Knockd – Detailed And Simpler

As I could see there are lot of articles about knockd and it’s implementation. So, what are my efforts to make this unique? I...

Protect Your Online Privacy With PrivacyFix

PrivacyFix is yet another Google Chrome add-on from AVG that indicates you how your online activity is being tracked and help you to fill...

Top 3 Free Best Antivirus Apps For Android In 2013

Being one of the most popular operating systems for smarphones, Android is a target for malware and viruses. The statistics show that Android accounted...

Google Chrome 29 Has Been Released, 25 New Security Fixes

Hello Google Chrome Users! This article is a short update for all of you guys that use Google Chrome as your web browser or...

PeerGuardian: A Privacy Oriented Firewall

PeerGuardian is a privacy oriented firewall application. It blocks connections to and from hosts specified in huge blocklists (thousands or millions of IP ranges)....

How To Avoid Data Surveillance Programs

Probably you've heard about the NSA surveillance program PRISM, XKeyscore and the GCHQ's Tempora. If you did not, you should start looking up for...

Linux Trojan Stealing Bank Data From Linux Users

We love linux and one of the reason why we love it is the high security it offers. Shopping in a linux box is...

Why Do I Need a Firewall?

Unix/Linux is well known for its security and nobody doubts that. But why not work to make your machine even more secure. Securing your...

Pf vs iptables, Untangle, Pfsense – Why not both?

My name is Jacob Graham and I am a Junior Systems Administrator in Victoria, Canada. This will be my first writing for Unixmen and...

Introduction to SSH

Introduction What is SSH? Why use SSH? SSH is a network protocol similar to telnet or FTP, yet slightly different because it offers secure data communication....

ufw Firewall Usage on Ubuntu

There's an important piece of software sitting on your computer that you are probably completely unaware that it's even there. Or you simply take...

Sandboxed Gentoo

Introduction This article is a guide on installing Gentoo in another Linux distribution (Arch, in this case). Look at it like a BSD Jail. It's...

SSLH: A SSL/SSH Multiplexer for Linux

What is sslh? sslh accepts connections in HTTP, HTTPS, SSH, OpenVPN, tinc, XMPP, or any other protocol that can be tested using a regular expression,...

How to Secure Your Home Network with OpenDNS

OpenDNS is a free DNS alternative to your ISP DNS. It helps you to get faster and as well as safer browsing at absolutely...

Deadly Linux Commands

In every society there is always the good and the bad. The bad are working day in day out to harm the works of...

Larry Page, “Dear Google Users”

Internet media has reported that the NSA, the secretive United States Government Organization, has direct access to servers of some of the biggest web...

Protect Your Online Privacy with Tor Browser

Tor (The Onion Router) browser makes things more difficult to trace our Internet activities. Using Tor, we can keep our identity more secure around...

Latest Articles

Learn file management commnad line required for RHCSA

3.0 Introduction to Red Hat Linux Key file system Welcome back, in this ‘RHCSA examination preparation guide’ series two articles are published, this is third...

Review: Ubuntu 16.04 LTS (Xenial Xerus)

Introduction Here we are again staring down the face of a new release of Ubuntu. This time around we see the release of the new...

Learn man, vim editor and file globbing for RHCSA

4.1 What we will include in this RHCSA tutorial? Welcome back to this RHCSA exam preparation tutorial series, three chapters of this tutorial series has...

Password Management in Linux by using passwd command

A password(commonly knows as passwd in linux) is an unspaced sequence of characters used to determine that a computer user requesting access to a...

Proxmox VE 4.2 Released

IENNA, Austria – April 27, 2016 – Proxmox Server Solutions GmbH, the company developing the server virtualization platform Proxmox Virtual Environment (VE), today announced...

Follow us

71,427FansLike
3,870FollowersFollow
3,052FollowersFollow
10,242FollowersFollow
179SubscribersSubscribe