Category: Security

Keeping safe

How to Setup Two Factor Authentication for SSH on Fedora

Every day there seem to be lots of security breaches reported where our data is at danger. Despite the fact that SSH is a secure way to establish a connection remotely to a Linux...

C

Catching up with ClassicPress

In our previous article published late last year, “ClassicPress Beta is now available – should we adopt it?“, we took a look at the new WordPress fork called ClassicPress, which… More »

How to Generate a CSR (Certificate Signing Request) in Linux

SSL Certificates fall into two broad categories: 1) Self-Signed Certificate which is an identity certificate that is signed by the same entity whose identity it certifies-on signed with its own private key, and 2)...

How Blockchain Could End Identity Theft on Dark Web

We feel that our personal data is very important and priceless. However, the reality is very different. Stolen credit card information, addresses, phone numbers, social security numbers are sold on the dark web for as

Understanding UFW

I have always been scared of IP tables. If you want to know the reason check out the man page for the same. Though I have heard from many people that IPtables are more robust

How to Check Integrity With AIDE in Fedora

AIDE (Advanced Intrusion Detection Environment) is a program for checking the integrity of a file and directory on any modern Unix-like system. It creates a database of files on the system, and then uses...

Best Password Manager: LastPass vs Dashlane vs Bitwarden vs 1Password

Looking for the best password manager to keep your login credentials safe? If you’re reading this post, you probably don’t need me to tell you that it’s a scary world out there when it comes to digital security. In fact, if you use the same password on multiple sites, it’s probably been leaked already, putting you at digital risk.

How Did Russian Hackers Phish America’s Power Grid?

The kill chain, the phishing attack and the broken trust graph The Wall Street Journal published an explosive story about how state-sponsored Russian hackers used a variety of techniques and a spider web of compromised accounts

5 of the Best Online Cloud Backup Services to Keep Your Data Safe in 2019

Looking for a safe place to backup and store all your digital data? This post will help you get started. Here, we’ll look closely at five of the best online cloud backup services to check out where they shine and where they fall short.

Tiger – The Unix Security Audit and Intrusion Detection Tool

Tiger is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It’s a security checker written entirely in shell language and employs...

Who’s Really Behind the World’s Most Popular Free VPNs?

After big names like Whatsapp, Snapchat, and Facebook, VPNs are the most searched-for applications in the world. “VPN” is the second-highest non-branded search term behind “games”, and free apps completely dominate the search results. The

Firejail – Securely Run Untrusted Applications in Linux

Sometimes you may want to use applications that have not been well tested in different environments, yet you must use them. In such cases, it is normal to be concerned about the security of...

Website Speed Optimization: How to Do It in 2019

About a decade back, Google announced that that site speed would affect web search ranking. Although the post did not clarify the impact of speed on the rankings, webmasters reading the announcement understood that website speed optimization should be at the top of their development plans.

How to Configure and Use PAM in Linux

Linux-PAM (short for Pluggable Authentication Modules which evolved from the Unix-PAM architecture) is a powerful suite of shared libraries used to dynamically authenticate a user to applications (or services) in a Linux system. It...

Data Breaches: The Complete WIRED Guide

Another week, another massive new corporate security breach that exposes your personal data. Names, email addresses, passwords, Social Security numbers, dates of birth, credit card numbers, banking data, passport numbers, phone numbers, home addresses, driver’s

This Company Wants to Use the Blockchain to Stop Phishing

MetaCert has classified 10 billion URLs as either safe, a suspected source of phishes, or unknown.

How to Access a Remote Server Using a Jump Host

A jump host (also known as a jump server) is an intermediary host or an SSH gateway to a remote network, through which a connection can be made to another host in a dissimilar...

How to Install, Configure and Use Firewalld in CentOS and Ubuntu

Firewalld (firewall daemon) is an alternative to the iptables service, for dynamically managing a system’s firewall with support for network (or firewall) zones and provides a D-Bus interface for managing configurations. It’s easy to...

Cracking linux full disc encryption, luks with hashcat.

Luks (linux unified key system), and dm-crypt are the standard that linux, and many others use for doing whole disk encryption. When implemented correctly, it can be nearly impossible to brute force. However when using

5 of the Best VPN Services for WordPress Users (Or Anyone Else, Too!)

In this post, we compare the 5 best VPN services for WordPress users (or really anyone else). That is, while we’ll focus on how VPNs can help WordPress users, most of the things that make a VPN good for WordPress users make it good for regular folks, too.