What is a managed dedicated server
A managed dedicated server is either one you rent or one you co-locate where someone else…
A managed dedicated server is either one you rent or one you co-locate where someone else…
Renting or Co-Locating a dedicated server that is not managed takes a lot of time and…
A dedicated server is a computer(server) that only runs one type of server software. The server…
Disabling root login via shh is a great way to tigthen security on your dedicated server.
This is a quick guide on adding IPs to a system manually. I would only suggest…
We’ve put together some of the more frequently used SSH commands or linux shell commands, and…
You can use your FTP software to set the proper permissions for your scripts in your…
DigitalOcean is a cloud provider similar to AWS, Microsoft Azure, Google Cloud Platform, and many others….
Due to increasing popularity of cloud-based instances for password cracking, we decided to focus our efforts…
A little while back, a bug with the LVM encrypted install in Kali Linux 1.0.4 was…
As the end of the year is coming up (some may say not quickly enough), we…
Now that our 2019.2 release is out, we thought we would take this opportunity to cover…
One of the many useful things we can do with APT is create metapackages, which are…
Users often request the addition of vulnerability scanners to Kali, most notably the ones that begin…
Introducing the KLCP Certification After almost two years in the making, it is with great pride…
Kali Linux in the Amazon EC2 Marketplace EDIT: For updated Kali Rolling images in the Amazon…
Whenever we are given the opportunity to describe Kali Linux, we use the word “powerful”. Have…
We have been hearing a lot about WireGuard lately and with it being recently added to…
WPA2 Key Reinstallation AttaCK or KRACK attack Recently, Mathy Vanhoef of imec-DistriNet, KU Leuven, discovered a…
We’ve been awfully quiet lately, which usually means something is brewing below the surface. In the…
Kali Linux contains a large number of very useful tools that are beneficial to information security…