When administering servers, one of the first things that must be configured to increase the security of them is to configure a Firewall, Luckily in Linux is included a default called Iptables but this firewall many see it a bit complex to configure and manage. There are simpler alternatives to use, such as UFW.
Previously, We have seen what a proxy server is, it's advantages and some web that tells you about your connection. However, you must be clear that proxy and VPN are not the same and that a proxy server does hide your IP but does not eliminate more identifying data. Next, we are going to show you how to connect to a proxy.
As a web developer, you must have come across the term password hashing at least once. Let us quickly understand what is password hashing and why we even need it.
Basically, in 10 weeks we will have more than half of the websites exposed to potential security problems if after the new year there is a vulnerability in PHP 5.x.
Today I am going to do a quick demonstration of how to easily install a suite of security testing tools from Kali Linux onto a Ubuntu machine. For a bit of background information, Kali Linux is a distribution derived from Debian. Its sole purpose is to provide a suite of tools for penetration testing (pentesting) and forensics. It is provided by Offensive Security, an organization dedicated to providing security training. There is a very long list of tools available for Kali. Such tools include (but are not limited to) forensics, vulnerability checks, access checks, and stress testing.
The latest attack of a worldwide malware, the already famous WannCrypt, has not only made clear the security of hundreds of companies in the world but also how much we sometimes get involved in handling the terminology of these threats. Is a virus the same as a malware? And what is a ransomware and how is it different from other threats?
In this time where everybody is attempting to ensure their information and protection, we hear a considerable measure about the TOR network. Some sing acclaim while others think of it as an apparatus for crooks. In this article, we give you the working standards of TOR by portraying likewise its preferences and drawbacks.
Security is a major concern when designing web apps. And I am not talking about DDOS protection, using a strong password or 2 step verification. I am talking about the biggest threat to a web app. It is known as CSRF short for Cross Site Resource Forgery.
Have you ever wondered whether Linux is strong enough to secure your system? This is a frequently asked question especially for those starting out with Linux. The answer is yes. But the second consideration here narrows down to, what is your experience level with Linux if you can configure some of its firewalls or just the capability to use these firewalls which sometimes can be a nut to crack.
Most Read Articles
Translate Our Site
Notice : Please be careful, after translation commands will change.
This website uses marketing and tracking technologies. Opting out of this will opt you out of all cookies, except for those needed to run the website. Note that some products may not work as well without tracking cookies.Opt Out of Cookies