Why I can’t live without Linux
This is written targeting users who might want to try Linux. But also with some facts that Linux users should be aware and feel...
ChatCrypt: Let us Chat Secure
Just like most of you, I also really hate to be monitored by third parties when i am communicating with Friends/Colleagues on Internet. Now...
A Pentesting Release for the Raspberry Pi
The Raspberry Pi is a credit-card-sized single-board computer developed in the UK by the Raspberry Pi Foundation with the intention of promoting the teaching...
pfSense: Open Source Firewall Distribution
Ok guys, a firewall can be a software or a piece of hardware, but what does it do and why do we need one? Ok...
Illegal Access to Adobe Source Code
Adobe Systems, Inc. (/əˈdoʊbiː/ ə-doh-bee), is an American multinational computer software company headquartered in San Jose, California, United States. The company has historically focused...
Knockd – Detailed And Simpler
As I could see there are lot of articles about knockd and it’s implementation. So, what are my efforts to make this unique? I...
Protect Your Online Privacy With PrivacyFix
PrivacyFix is yet another Google Chrome add-on from AVG that indicates you how your online activity is being tracked and help you to fill...
Top 3 Free Best Antivirus Apps For Android In 2013
Being one of the most popular operating systems for smarphones, Android is a target for malware and viruses. The statistics show that Android accounted...
Google Chrome 29 Has Been Released, 25 New Security Fixes
Hello Google Chrome Users! This article is a short update for all of you guys that use Google Chrome as your web browser or...
PeerGuardian: A Privacy Oriented Firewall
PeerGuardian is a privacy oriented firewall application. It blocks connections to and from hosts specified in huge blocklists (thousands or millions of IP ranges)....
How To Avoid Data Surveillance Programs
Probably you've heard about the NSA surveillance program PRISM, XKeyscore and the GCHQ's Tempora. If you did not, you should start looking up for...
Linux Trojan Stealing Bank Data From Linux Users
We love linux and one of the reason why we love it is the high security it offers. Shopping in a linux box is...
Why Do I Need a Firewall?
Unix/Linux is well known for its security and nobody doubts that. But why not work to make your machine even more secure. Securing your...
Pf vs iptables, Untangle, Pfsense – Why not both?
My name is Jacob Graham and I am a Junior Systems Administrator in Victoria, Canada. This will be my first writing for Unixmen and...
Introduction to SSH
Introduction What is SSH? Why use SSH? SSH is a network protocol similar to telnet or FTP, yet slightly different because it offers secure data communication....
ufw Firewall Usage on Ubuntu
There's an important piece of software sitting on your computer that you are probably completely unaware that it's even there. Or you simply take...
Sandboxed Gentoo
Introduction This article is a guide on installing Gentoo in another Linux distribution (Arch, in this case). Look at it like a BSD Jail. It's...
SSLH: A SSL/SSH Multiplexer for Linux
What is sslh? sslh accepts connections in HTTP, HTTPS, SSH, OpenVPN, tinc, XMPP, or any other protocol that can be tested using a regular expression,...