Security

qBittorrent Fixes The Heartbleed Bug

A new version of the qBittorent BitTorrent client has been released with a fix for the Heartbleed bug, a very serious bug discovered a...

Cyber-Attacks on Industrial Infrastructure are Intensifying

Cybercriminals are now attacking the whole world in a very different way. In the past, they were just limited to the normal power users...

Security Measures To Protect Your Servers

Introduction External and internal attackers day after day are menacing your networks. Many intelligent methods are discovered in order to get access and damage your...

OIN-A patent pool to protect Linux users from lawsuits

OIN or the Open Invention Network is an industry-supporting independent group consisting of Linux users in a royalty-free environment and be protected from lawsuits...

IPFire – An Open Source, And Free Firewall Distribution

IPFire is an open-source Linux distribution with many useful features such as web based GUI, web proxy, intrusion detection, VPN, virus scanner, and many....

SSLH: A SSL/SSH Multiplexer for Linux

What is sslh? sslh accepts connections in HTTP, HTTPS, SSH, OpenVPN, tinc, XMPP, or any other protocol that can be tested using a regular expression,...

3 Reasons Why Linux is the Best Choice to Achieve Optimal...

With technological advancements, hackers are becoming increasingly adept at identifying vulnerabilities and gaps in security systems. This makes unauthorized access to secure data and...

Knockd – Detailed And Simpler

As I could see there are lot of articles about knockd and it’s implementation. So, what are my efforts to make this unique? I...

Enhancing Linux Security with Network Access Control Software: Safeguarding Your Networks...

In an era where cyber threats continue to evolve, ensuring the security of computer networks and sensitive data is paramount. As a widely used...

Why Do I Need a Firewall?

Unix/Linux is well known for its security and nobody doubts that. But why not work to make your machine even more secure. Securing your...

Network Monitoring Tools You Have To Know

We all understand how system administrators love to have network monitoring tools which make their lives easier. Following is a list of the best...

5 Most Common Cyber Attacks In 2023

Building a company and keeping it afloat amidst financial turmoil is challenging, and it isn’t made any easier by the number of hackers who...

How to hire a cyber security developer to protect your business...

In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...

Twelve Vulnerabilities Have Been Fixed In Ubuntu 12.04, Time To Update

Canonical has released security updates for Ubuntu 12.04 LTS and advices to update your system as soon as possible. There are 12 vulnerabilities discovered...

How Secure is Your Password? Create a Strong Password and Sleep...

Our on-line content, bank accounts, shopping accounts and social network accounts are as safe as our passwords are. Most people don't  consider password security...

Arachni the Security scanning tool for Web

Introduction: Arachni is a fully featured web security scanning tool, it is based on ruby framework.It is an open source, modular and high performance tool....

How to Configure Sshguard With IPFW Firewall On FreeBsd ?

There is an old saying that the only safe computer is one that’s disconnected from the network, turned off, and locked in an underground...

Why I can’t live without Linux

This is written targeting users who might want to try Linux. But also with some facts that Linux users should be aware and feel...