Security

IPTABLES VS FIREWALLD

Today we will walk through iptables and firewalld and we will learn about the history of these two along with installation & how we can...

Top 3 Free Best Antivirus Apps For Android In 2013

Being one of the most popular operating systems for smarphones, Android is a target for malware and viruses. The statistics show that Android accounted...

How to hire a cyber security developer to protect your business...

In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...

Arachni the Security scanning tool for Web

Introduction: Arachni is a fully featured web security scanning tool, it is based on ruby framework.It is an open source, modular and high performance tool....

Introduction to SSH

Introduction What is SSH? Why use SSH? SSH is a network protocol similar to telnet or FTP, yet slightly different because it offers secure data communication....

pfSense: Open Source Firewall Distribution

Ok guys, a firewall can be a software or a piece of hardware, but what does it do and why do we need one? Ok...

How to Secure Your Home Network with OpenDNS

OpenDNS is a free DNS alternative to your ISP DNS. It helps you to get faster and as well as safer browsing at absolutely...

Twelve Vulnerabilities Have Been Fixed In Ubuntu 12.04, Time To Update

Canonical has released security updates for Ubuntu 12.04 LTS and advices to update your system as soon as possible. There are 12 vulnerabilities discovered...

SSLH: A SSL/SSH Multiplexer for Linux

What is sslh? sslh accepts connections in HTTP, HTTPS, SSH, OpenVPN, tinc, XMPP, or any other protocol that can be tested using a regular expression,...

How to Leverage Cybersecurity With Linux Systems

Linux is one of the operating systems such as Windows, Mac OS, and IOS. Linux also powers the Android system that most popular platforms...

3 Reasons Why Linux is the Best Choice to Achieve Optimal...

With technological advancements, hackers are becoming increasingly adept at identifying vulnerabilities and gaps in security systems. This makes unauthorized access to secure data and...

Pf vs iptables, Untangle, Pfsense – Why not both?

My name is Jacob Graham and I am a Junior Systems Administrator in Victoria, Canada. This will be my first writing for Unixmen and...

Let’s Encrypt your Apache webserver on CentOS 7

Introduction It was September when, with a post on its blog, Google announced that starting from Chrome 56, its browser will mark non-secure pages containing...

Protecting Apache Server From Denial-of-Service (Dos) Attack

Denial-of-Service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely...

Essential Cybersecurity Tools for Linux in 2023

In today's digital happenings, taking serious cybersecurity measures is crucial to protect sensitive information from cybercriminals, especially for corporate organizations with high levels of...

How To Manage Multiple SSH Sessions Using Cluster SSH And PAC...

About SSH We, all, know what is SSH, right? SSH, stands for Secure Shell (sometimes known as Secure Socket Shell), is a Cryptographic Protocol that...

News from Kaspersky Lab: Tor is protecting criminals

In a previous article I wrote a bit about Tor. Free browser, relays bouncing your IP all over the world. Guaranteed anonymity. This is...

A Pentesting Release for the Raspberry Pi

The Raspberry Pi is a credit-card-sized single-board computer developed in the UK by the Raspberry Pi Foundation with the intention of promoting the teaching...