Internet media has reported that the NSA, the secretive United States Government Organization, has direct access to servers of some of the biggest web and technology companies in the world. Google, Microsoft, Skype and Facebook have all been in the headlines. The NSA has developed a project called PRISM which allows officials to collect private […]
One of the core component of network of all organizations is security. Many large companies will have hardware firewalls to protect their network. Those hardware firewalls cost must be hundreds of thousands of dollars. The SOHO(Small office or Home Office) users can’t afford that much of cost. It is worth trying the Linux distribution called […]
Our on-line content, bank accounts, shopping accounts and social network accounts are as safe as our passwords are. Most people don’t consider password security important and they ignore the fact that one day they may be victims of personal data theft, credit card theft or botnets. Do you want to be a botnet zombie? Maybe […]
Who should read this article? Everyone who is interested in computer security and computer networking. Introduction If you run a network small or big, you need a flexible and productive way to monitor network traffic. You need to provide security to machines connected to your network, especially if you have a wi-fi network. Monitoring the […]
The minimum you can do to protect yourself is to avoid weak passwords. In most cases people do not know what weak passwords are and why are called such. Passwords that can be easily guessed or cracked are called weak passwords. Many security breaches worldwide are often the result of poor password choices. These poor […]
Lynis is an auditing tool for unix/linux like systems which is used to scan the entire unix/linux systems for security issues, installed software informations, general system information, configuration issues or mistakes, software patch management, malware and vulnerability, firewall auditing, user accounts without passwords, invalid file permissions and many more.
Facebook, Twitter, and Microsoft (in no particular order) were recently attacked by hackers. This led to a number of questions being raised. How did they manage to get into the servers of such big corporations? Why did they want to do it? And most importantly: Is Google any safer than these websites? To find the […]
Linux, unfortunately has been long surrounded by myths. Despite the speedy adoption of Linux as mainstream operating systems for enterprises particularly, the common misconceptions about Linux seem to continue. The post enlists five traditional myths about Linux Security and attempts to debunk each; discussing real facts.
The world of computing and the internet is a very normal and accepted entity to most geeks. But to some unknown, unsuspecting and unfamiliar users, the whole concept can seem quite strange, almost alien!