Submitted by trendoceans on Thu, 05/18/2023 - 13:35
It’s a no-brainer to start and stop monitor mode in Linux when you know what command to use.
Read more
Submitted by trendoceans on Sat, 03/25/2023 - 16:04
Sniffnet is a great tool to use if you want to easily keep an eye on network traffic.
It has a simple GUI interface that lets you filter the network based on the application’s protocol and sends you an alert when a set threshold limit is reached.
Read more
Submitted by trendoceans on Wed, 03/15/2023 - 09:25
To generate TOTP codes, you don’t need a phone anymore; you can just get it on your Linux machine using Authy.
Read more
Submitted by Jake on Tue, 01/17/2023 - 04:18
If you are aware of the Linux file structure, then you might already be aware of the “/var/log” directory that is responsible for keeping the system related logs.
However, there is another files in /var/ directory that you need focus.
Click here to learn more
Submitted by trendoceans on Sat, 01/08/2022 - 05:03
Statistically, over 10% of users forget or lose their passwords or private keys for encrypted data.
This is not a big problem if there is a password or private key recovery option, but it becomes a disaster when there is no way to recover the lost or forgotten password or private key.
To avoid such disastrous situations, users may use a simple four-step approach to generate easily recoverable private keys based on dynamical passwords.
Read more
Submitted by trendoceans on Sat, 12/26/2020 - 13:40
Nmap is one of the most popular free and open-source command-line utility network scannings. Nmap can be used to discover hosts and services use by the system on the same network.
A Nmap tool helps you to audit local and remote server open ports and the network details.
It is available in all major operating systems such as Windows, Linux, and macOS. There is another nmap product known as zenmap, which is GUI based version of nmap.
Submitted by admin on Tue, 03/19/2019 - 01:56
By default, SSH listens on port 22. Changing the default SSH port adds an extra layer of security to your server by reducing the risk of automated attacks.
Instead of changing the port is much simpler and secure to configure your firewall to allow access to port 22 only from specific hosts. Learn More
Submitted by tuxtops on Tue, 07/17/2018 - 20:19
Are virtual machines (VM) more secure than containers? You may think you know the answer, but IBM Research has found containers can be as secure, or more secure, than VMs.
James Bottomley, an IBM Research Distinguished Engineer and top Linux kernel developer, writes:
Submitted by tuxtops on Wed, 02/14/2018 - 01:52
Today the online world is quite a bit different, and a quick glimpse at the news demonstrates that it's not just global, but that bad actors, as they say in security circles, are online and have access to your system too. The idea that any device that's online is vulnerable is more true now than at any previous time in computing history.
Submitted by rk on Sun, 01/07/2018 - 06:48
By now there's probably no one who follows tech even a little who hasn't heard about Meltdown and Spectre, two related security vulnerabilities that differ from garden variety security issues because they're hardware and not software vulnerabilities. They're also notable because they're built into just about every CPU that's been manufactured for decades.Read More.