Security is a major concern when designing web apps. And I am not talking about DDOS protection, using a strong password or 2 step verification. I am talking about the biggest threat to a web app. It is known as CSRF short for Cross Site Resource Forgery.
Have you ever wondered whether Linux is strong enough to secure your system? This is a frequently asked question especially for those starting out with Linux. The answer is yes. But the second consideration here narrows down to, what is your experience level with Linux if you can configure some of its firewalls or just the capability to use these firewalls which sometimes can be a nut to crack.
SSH is a famous way to connect to remote machines securely and easily. You can use SSH to connect to your cloud server/VM or a friend’s PC or almost anyone remotely to perform certain activities you want. For instance, I use SSH to connect to my Google Cloud Console so that I can manage my VM via my terminal rather than opening an ssh connection in the browser. Your reason can be different but in the end the goal is to connect to a remote machine locally.
Imagine this scenario: you have files on your computer that you would much rather keep safe. Such files could contain sensitive data such as passwords and bank details. Keeping them on your computer is a convenient solution; however, if your computer was hacked or stolen, someone could easily access your files if your drive wasn’t encrypted. Passwords to unlock your PC are no object to someone who knows what they are doing, especially passwords that are ridiculously weak.
The beginning of the year 2018 brought new challenges in the form of Spectre and Meltdown vulnerabilities in most of the processor architectures. In layman terms, both of these vulnerabilities allow hackers to steal sensitive data like passwords. This vulnerability is applicable to Intel, AMD, and ARM. This means the problem is universal as it affects almost all devices ranging from embedded devices, smartphones, desktops, and servers to supercomputers.
Everyone is talking about Meltdown and Spectre, the two security flaws found in Intel, AMD(less vulnerable) and ARM CPUs. Using the flaws attackers can read system memory which may have your passwords and other sensitive information. The worst part of it is that most systems are affected by it. So you're most likely affected by these flaws. Let's see how much an Internet surfer like you is affected by Meltdown.
Today Google security blog has posted about the two vulnerabilities that put virtually many computers, phones, laptops using Intel, AMD and ARM CPUs at risk. Using the two major flaws hackers can gain read access to the system memory that may include sensitive data including passwords, encryption keys etc.
Keeping control of our network is vital to prevent any program from overusing it and slows down the overall system operation. There are several network monitoring tools for different operating systems today. In this article, we will talk about 10 network monitoring tools for Linux that will run from a terminal, ideal for users who do not use GUI or for those who want to keep a control of the network use of a server through from ssh.
Firewall! A great online protection tool for us, which protects us during online activity from various kind of viruses, hacking and other kinds of threats. Untangle firewall is also a similar, lightweight firewall which allows you to browse online without any kind of worry. Untangle firewall comes in basically two editions i.e. Free and Paid. We are gonna review the Free edition as it serves our purpose and all we need for simple home protection.
Most Read Articles
Translate Our Site
Notice : Please be careful, after translation commands will change.
This website uses marketing and tracking technologies. Opting out of this will opt you out of all cookies, except for those needed to run the website. Note that some products may not work as well without tracking cookies.Opt Out of Cookies