Security

Deadly Linux Commands

In every society there is always the good and the bad. The bad are working day in day out to harm the works of...

Larry Page, “Dear Google Users”

Internet media has reported that the NSA, the secretive United States Government Organization, has direct access to servers of some of the biggest web...

Protect Your Online Privacy with Tor Browser

Tor (The Onion Router) browser makes things more difficult to trace our Internet activities. Using Tor, we can keep our identity more secure around...

How Secure is Your Password? Create a Strong Password and Sleep...

Our on-line content, bank accounts, shopping accounts and social network accounts are as safe as our passwords are. Most people don't  consider password security...

A Secure Password

The minimum you can do to protect yourself is to avoid weak passwords. In most cases people do not know what weak passwords are...

Lightweight Portable Security (LPS)-A Linux distro from the US Department of...

Lightweight Portable Security (LPS), created by USA's Department of Defence, is a small Linux live CD focusing on privacy and security, for  this reason,...

OIN-A patent pool to protect Linux users from lawsuits

OIN or the Open Invention Network is an industry-supporting independent group consisting of Linux users in a royalty-free environment and be protected from lawsuits...

How to use your cam as a Security video camera with...

ZoneMinder is intended for use in single or multi-camera video security applications, including commercial or home CCTV, theft prevention and child or family member...

How to Protect apache directories with a password in Ubuntu

Question : How to Protect apache directories with a password in Ubuntu? Answer: To  enable  this  option we  have  to use  2 terms  .htaccess  and ...

EDITOR PICKS

Follow us

0FansLike
0FollowersFollow
12,304FollowersFollow
528SubscribersSubscribe

Latest Articles

Switching To Linux Mint

Switching To Linux Mint: The Benefits and Drawbacks

Deciding to spend hundreds of dollars on new hardware – be it a laptop or a desktop component – is always a tough call....
hands typing on a laptop

Bash Alias: How It Works and Why You Need One

The bash shell incorporates some of the best features of the C and Korn shells, such as job control, directory manipulation, and aliases.  Aliases are...

Best VPNs for Linux with and without GUI

The Linux operating system takes up a tiny portion of the market because it appears daunting to the average person. It’s commonly known as...

How to hire a cyber security developer to protect your business [2023]

In today's digital age, cyber security is of the utmost importance for businesses of all sizes. However, finding and hiring a skilled cybersecurity software...

What You Need to Become a Linux Programmer

Are you looking to become a Linux programmer? The open-source operating system is a popular choice among developers and is widely used in the...

Popular Post

Everything you should know about RHCSA Certification

Things you should know about RHCSA Certification Exam RHCSA or Red Hat Certified System administration exam is designed to test your knowledge and skills which...