Category: Security & Privacy

Keeping safe

The plot to revive Mt. Gox and repay victims’ Bitcoin

It was the Lehman Brothers of blockchain. 850,000 Bitcoin disappeared when cryptocurrency exchange Mt. Gox imploded in 2014 after a series of hacks. The incident cemented the industry’s reputation as frighteningly insecure. Now a controversial crypto celebrity named Brock Pierce is...

/ 7 February 2019

How to Check Integrity With AIDE in Fedora

AIDE (Advanced Intrusion Detection Environment) is a program for checking the integrity of a file and directory on any modern Unix-like system. It creates a database of files on the system, and then uses that database as a yardstick to...

/ 29 January 2019
blank

Tiger – The Unix Security Audit and Intrusion Detection Tool

Tiger is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It’s a security checker written entirely in shell language and employs various POSIX tools in the backend....

/ 7 January 2019
blank

Firejail – Securely Run Untrusted Applications in Linux

Sometimes you may want to use applications that have not been well tested in different environments, yet you must use them. In such cases, it is normal to be concerned about the security of your system. One thing that can...

/ 29 December 2018
blank

911 emergency services go down across the US after CenturyLink outage

911 emergency services in several states across the U.S. remain down after a massive outage at a CenturyLink data center. The outage began after 12pm ET on Thursday, according to CenturyLink’s status page, and continues to cause disruption across 911 call...

/ 29 December 2018
blank

How to Configure and Use PAM in Linux

Linux-PAM (short for Pluggable Authentication Modules which evolved from the Unix-PAM architecture) is a powerful suite of shared libraries used to dynamically authenticate a user to applications (or services) in a Linux system. It integrates multiple low-level authentication modules into...

/ 11 December 2018
blank

How to Enforce Secure Passwords on Your WordPress Website

We’re willing to bet that you probably know all about using secure passwords for your WordPress admin account. However, you can’t take for granted that other users will do the same. To make sure your site remains safe, you’ll want...

/ 11 December 2018
blank

How to Access a Remote Server Using a Jump Host

A jump host (also known as a jump server) is an intermediary host or an SSH gateway to a remote network, through which a connection can be made to another host in a dissimilar security zone, for example a demilitarized...

/ 29 November 2018
blank

How to Install, Configure and Use Firewalld in CentOS and Ubuntu

Firewalld (firewall daemon) is an alternative to the iptables service, for dynamically managing a system’s firewall with support for network (or firewall) zones and provides a D-Bus interface for managing configurations. It’s easy to use and configure, and it’s now...

/ 22 November 2018

Announcing the vSphere 6.7 Update 1 Security Configuration Guide

Back in March I released the vSphere 6.5 Update 1 Security Configuration Guide (a.k.a “The SCG”). At that time, I went in to detail on more than just the guide. I covered the topic of why some guidelines are removed...

/ 2 November 2018
blank

How to Use Fail2ban to Secure Your Linux Server

Improving your server security should be one of your top priorities, when it comes to managing a linux server. By reviewing your server logs, you may often find different attempts for brute force login, web floods, exploit seeking and many...

/ 9 October 2018
blank

Install and Configure ConfigServer Security & Firewall (CSF) in Linux

If you look at IT-related job postings anywhere, you will notice a steady demand for security pros. This does not only mean that cybersecurity is an interesting field of study, but also a very lucrative one. With that in mind,...

/ 7 September 2018