security

How to Start and Stop Monitor Mode in Linux

It’s a no-brainer to start and stop monitor mode in Linux when you know what command to use.

Read more

Sniffnet: Application to Comfortably Monitor your Network Traffic

Sniffnet is a great tool to use if you want to easily keep an eye on network traffic.

It has a simple GUI interface that lets you filter the network based on the application’s protocol and sends you an alert when a set threshold limit is reached.

Read more

How to Install Twilio Authy in Linux-based System Using both Snap and Non-Snap Methods

To generate TOTP codes, you don’t need a phone anymore; you can just get it on your Linux machine using Authy.

Read more

What Are utmp, wtmp, and btmp Files in Linux?

If you are aware of the Linux file structure, then you might already be aware of the “/var/log” directory that is responsible for keeping the system related logs.

However, there is another files in /var/ directory that you need focus.

Click here to learn more

A simple solution to the Private Key-Loss Conundrum

Statistically, over 10% of users forget or lose their passwords or private keys for encrypted data.

This is not a big problem if there is a password or private key recovery option, but it becomes a disaster when there is no way to recover the lost or forgotten password or private key.

To avoid such disastrous situations, users may use a simple four-step approach to generate easily recoverable private keys based on dynamical passwords.

Read more

The complete guide for NMAP Command

Nmap is one of the most popular free and open-source command-line utility network scannings. Nmap can be used to discover hosts and services use by the system on the same network.

A Nmap tool helps you to audit local and remote server open ports and the network details.

It is available in all major operating systems such as Windows, Linux, and macOS. There is another nmap product known as zenmap, which is GUI based version of nmap.

How to Change the SSH Port in Linux

By default, SSH listens on port 22. Changing the default SSH port adds an extra layer of security to your server by reducing the risk of automated attacks.
Instead of changing the port is much simpler and secure to configure your firewall to allow access to port 22 only from specific hosts. Learn More

Containers or virtual machines: ​Which is more secure? The answer will surprise you

Are virtual machines (VM) more secure than containers? You may think you know the answer, but IBM Research has found containers can be as secure, or more secure, than VMs.

James Bottomley, an IBM Research Distinguished Engineer and top Linux kernel developer, writes:

Shell Scripting and Security

Today the online world is quite a bit different, and a quick glimpse at the news demonstrates that it's not just global, but that bad actors, as they say in security circles, are online and have access to your system too. The idea that any device that's online is vulnerable is more true now than at any previous time in computing history.

How Red Hat Is Dealing With the Spectre of the CPU Meltdown

By now there's probably no one who follows tech even a little who hasn't heard about Meltdown and Spectre, two related security vulnerabilities that differ from garden variety security issues because they're hardware and not software vulnerabilities. They're also notable because they're built into just about every CPU that's been manufactured for decades.Read More.

Subscribe to RSS - security