SSH is a famous way to connect to remote machines securely and easily. You can use SSH to connect to your cloud server/VM or a friend’s PC or almost anyone remotely to perform certain activities you want. For instance, I use SSH to connect to my Google Cloud Console so that I can manage my VM via my terminal rather than opening an ssh connection in the browser. Your reason can be different but in the end the goal is to connect to a remote machine locally.
Imagine this scenario: you have files on your computer that you would much rather keep safe. Such files could contain sensitive data such as passwords and bank details. Keeping them on your computer is a convenient solution; however, if your computer was hacked or stolen, someone could easily access your files if your drive wasn’t encrypted. Passwords to unlock your PC are no object to someone who knows what they are doing, especially passwords that are ridiculously weak.
The beginning of the year 2018 brought new challenges in the form of Spectre and Meltdown vulnerabilities in most of the processor architectures. In layman terms, both of these vulnerabilities allow hackers to steal sensitive data like passwords. This vulnerability is applicable to Intel, AMD, and ARM. This means the problem is universal as it affects almost all devices ranging from embedded devices, smartphones, desktops, and servers to supercomputers.
Everyone is talking about Meltdown and Spectre, the two security flaws found in Intel, AMD(less vulnerable) and ARM CPUs. Using the flaws attackers can read system memory which may have your passwords and other sensitive information. The worst part of it is that most systems are affected by it. So you're most likely affected by these flaws. Let's see how much an Internet surfer like you is affected by Meltdown.
Today Google security blog has posted about the two vulnerabilities that put virtually many computers, phones, laptops using Intel, AMD and ARM CPUs at risk. Using the two major flaws hackers can gain read access to the system memory that may include sensitive data including passwords, encryption keys etc.
Keeping control of our network is vital to prevent any program from overusing it and slows down the overall system operation. There are several network monitoring tools for different operating systems today. In this article, we will talk about 10 network monitoring tools for Linux that will run from a terminal, ideal for users who do not use GUI or for those who want to keep a control of the network use of a server through from ssh.
Firewall! A great online protection tool for us, which protects us during online activity from various kind of viruses, hacking and other kinds of threats. Untangle firewall is also a similar, lightweight firewall which allows you to browse online without any kind of worry. Untangle firewall comes in basically two editions i.e. Free and Paid. We are gonna review the Free edition as it serves our purpose and all we need for simple home protection.
Linux distro is mostly loved for its security features. When we people want more security we use TOR and VPN. Today I am going to tell you about an application called Firejail that helps to protect your personal files via sandbox technique.
Dnscrypt is a protocol that is used to improve DNS security by authenticating communications between a DNS client and a DNS resolver. DNSCrypt prevents DNS spoofing. It uses cryptographic signatures to verify that responses originate from the chosen DNS resolver and haven’t been tampered with. DNSCrypt is available for multi-platforms including Windows, MacOS, Unix, Android, iOS, Linux and even routers.
Iptables is a great firewall included in the netfilter framework of Linux. A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.