Security

Remove The Password Of A Password Protected PDF Files

This brief tutorial describes how to remove the password protection from the PDF files. Please note that we are not going to hack or...

Security Onion: A Linux Distro For IDS, NSM, And Log Management

Introduction Security Onion is a Linux distribution for intrusion detection, network security monitoring, and log management. It’s based on Ubuntu and contains Snort, Suricata, Bro,...

MegaChat – A Web Based Encrypted Voice And Video Chat Service

Probably, you may have used Skype, a popular audio/video chat app developed by Microsoft, for free Audio and Video Chatting with your friends, family...

How To Configure Vsftpd With SSL/TLS On CentOS 7

A few weeks before, We have shown you how to install and configure a basic FTP server on CentOS 7. Today, In this brief...

Trick or treating with the Pandora FMS new version?

We are very pleased to announce the new Service Pack 1 for version 5.1 of Pandora FMS, with many new features and numerous bug...

How To Monitor The Performance With Cisco IPSLA

In the early 70’s the computer networks appeared for the first time. These networks were rapidly converted into an absolute necessity for all the...

IPFire Fixes ShellShock Bug In Bash Shell

IPFire, the linux-based firewall distribution, has been updated with the intention of fixing the GNU Bash vulnerability, a very serious security bug that allows...

IPFire – An Open Source, And Free Firewall Distribution

IPFire is an open-source Linux distribution with many useful features such as web based GUI, web proxy, intrusion detection, VPN, virus scanner, and many....

qBittorrent Fixes The Heartbleed Bug

A new version of the qBittorent BitTorrent client has been released with a fix for the Heartbleed bug, a very serious bug discovered a...

Protect Yourselves From Attacks On Public WiFi Networks With WiFi Protector

All the anti-virus programs in the world won’t help you if you log on the public WiFi at a coffee shop. Most of us...

News from Kaspersky Lab: Tor is protecting criminals

In a previous article I wrote a bit about Tor. Free browser, relays bouncing your IP all over the world. Guaranteed anonymity. This is...

Interview With Sancho Lerena From Pandora FMS

Hello Unixmen readers, today we have a special guest here at our desk! Ladies and gentlemen, we  present you our friend Sancho Lerena from Pandora...

Pandora FMS – An Universal Monitoring System For Your Organization

What is Pandora FMS? Pandora FMS is an open source Flexible Monitoring System developed by Artica, a Spanish based company founded in 2005. The project...

Updated Debian 7: 7.3 released!

The Debian project is pleased to announce the third update of its stable distribution Debian 7 (codename "wheezy"). This update mainly adds corrections for...

How To Install Linux Kernel 3.12.4 In Ubuntu

Linux Kernel 3.12.4 has been officially released with fixes for inet6_init() cleanup order, seqlock deadlock in ip6_finish_output2 and Report Descriptor for Logitech MOMO Force. In this...

Twelve Vulnerabilities Have Been Fixed In Ubuntu 12.04, Time To Update

Canonical has released security updates for Ubuntu 12.04 LTS and advices to update your system as soon as possible. There are 12 vulnerabilities discovered...

Play A Crossword Game With Adobe’s Leaked Passwords

Play A Crossword Game With Adobe’s Leaked Passwords A crossword game with Adobe’s Leaked Passwords is now available for playing at http://zed0.co.uk/crossword/. The author of...

Why I can’t live without Linux

This is written targeting users who might want to try Linux. But also with some facts that Linux users should be aware and feel...

EDITOR PICKS

Follow us

0FansLike
0FollowersFollow
12,304FollowersFollow
528SubscribersSubscribe

Latest Articles

Switching To Linux Mint

Switching To Linux Mint: The Benefits and Drawbacks

Deciding to spend hundreds of dollars on new hardware – be it a laptop or a desktop component – is always a tough call....
hands typing on a laptop

Bash Alias: How It Works and Why You Need One

The bash shell incorporates some of the best features of the C and Korn shells, such as job control, directory manipulation, and aliases.  Aliases are...

Best VPNs for Linux with and without GUI

The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...

How to hire a cyber security developer to protect your business [2023]

In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...

What You Need to Become a Linux Programmer

Are you looking to become a Linux programmer? The open-source operating system is a popular choice among developers and is widely used in the...

Popular Post

Everything you should know about RHCSA Certification

Things you should know about RHCSA Certification Exam RHCSA or Red Hat Certified System administration exam is designed to test your knowledge and skills which...