how-to-disable-modsecurity-in-cpanel

How to Disable ModSecurity in cPanel

ModSecurity is server software for Apache that comes bundled with cPanel. ModSecurity helps protect your site from brute force attacks and, by default, automatically runs on all new accounts. ModSecurity should usually remain on. In certain situations, such as a WordPress admin lockdown caused by brute force attacks, you may need to temporarily deactivate ModSecurity to…

Read More
your-favorite-websites-can-be-hacked-watering-holes-typo-squatting-free-security-ep-4

your favorite websites can be HACKED! (watering holes, typo squatting) // FREE Security+ // EP 4

READY TO TAKE THE SECURITY+ EXAM? Get 10% at the CompTIA store: https://bit.ly/36mSRlw (affiliate) This is episode 4 of the FREE Security+ course covering the SY0-501 AND SY0-601 exams. This episode covers watering holes, typo squatting and prepending. Security+ Playlist: http://bit.ly/secplus_TII ??Get EARLY access to the course here: https://bit.ly/thisisitio Read moreKali Linux 2020.3 Release (ZSH,…

Read More
lazpaint-a-free-open-source-paint

LazPaint: A Free & Open Source Paint.NET Alternative

Brief: LazPaint is an open-source Paint.NET alternative with cross-platform support. It is a lightweight program with a bunch of essential options to edit images quickly. Here’s an overview of LazPaint. LazPaint: Open Source Paint.NET Alternative for Linux If you are fond of using tools to quickly edit and manipulate images and screenshots, you may have…

Read More
solving-python-challenges-python-basics-with-sam

Solving Python Challenges – Python Basics with Sam

Learn the basics of Python live from Sam Focht. In today’s stream, you will learn about second conversion, automating file naming, finding specific files, and more. This is part of a series that will cover the entire Python Programming language. Check out Sam’s YouTube channel: https://www.youtube.com/python_basics Read moreWhat is the difference between shared & dedicated…

Read More
cybersecurity-defenses-for-iiot

Cybersecurity defenses for IIoT

Cybersecurity attacks on industrial IoT solutions can have detrimental consequences. This is the case because IoT devices record privacy-sensitive data and control production assets. Therefore, demonstrable trustworthiness is prerequisite to IoT adoption in industrial settings. Fortunately, IT security is a mature field. Experts have identified classes of threats devices may be subject to. Let’s discuss…

Read More
http-error-codes

HTTP Error Codes

No matter what you’re doing on the web, if you’ve got two computers talking to each other, there’s going to be some messages that get garbled in the process. This is where having a knowledge (or, at least, a list) of HTTP error codes can be your guiding light. 400 – Client HTTP Error Codes…

Read More
mark-shuttleworth-on-overcoming-software-complexity

Mark Shuttleworth on overcoming software complexity

While today we see an enormous amount of incredible software being published, both by tech giants and niche providers, there is a significant lag in the telco industry’s ability to leverage it.  The promise of a software-defined technology landscape is, of course, agility.  Read moreKaboxer – Kali Applications Boxer | Kali Linux BlogBut what is…

Read More
how-hackers-sniff-capture-network-traffic-mitm-attack

how Hackers SNiFF (capture) network traffic // MiTM attack

become a HACKER (ethical) with ITProTV: (30% OFF): https://bit.ly/itprotvnetchuck or use code “networkchuck” (affiliate link) **This video and my entire CEHv10 journey is sponsored by ITProTV watch the entire series: https://bit.ly/cehseries Read moreKali Linux 2020.3 Release (ZSH, Win-Kex, HiDPI & Bluetooth Arsenal) | Kali Linux BlogGet a Raspberry Pi: https://geni.us/BmCeEgp Download Wireshark: https://www.wireshark.org/ Learn how…

Read More