Category: Security & Privacy

Keeping safe

How to Enforce Secure Passwords on Your WordPress Website

We’re willing to bet that you probably know all about using secure passwords for your WordPress admin account. However, you can’t take for granted that other users will do the same. To make sure your site remains safe, you’ll want...

/ December 11, 2018

How to Access a Remote Server Using a Jump Host

A jump host (also known as a jump server) is an intermediary host or an SSH gateway to a remote network, through which a connection can be made to another host in a dissimilar security zone, for example a demilitarized...

/ November 29, 2018

How to Install, Configure and Use Firewalld in CentOS and Ubuntu

Firewalld (firewall daemon) is an alternative to the iptables service, for dynamically managing a system’s firewall with support for network (or firewall) zones and provides a D-Bus interface for managing configurations. It’s easy to use and configure, and it’s now...

/ November 22, 2018

Announcing the vSphere 6.7 Update 1 Security Configuration Guide

Back in March I released the vSphere 6.5 Update 1 Security Configuration Guide (a.k.a “The SCG”). At that time, I went in to detail on more than just the guide. I covered the topic of why some guidelines are removed...

/ November 2, 2018

How to Use Fail2ban to Secure Your Linux Server

Improving your server security should be one of your top priorities, when it comes to managing a linux server. By reviewing your server logs, you may often find different attempts for brute force login, web floods, exploit seeking and many...

/ October 9, 2018

Install and Configure ConfigServer Security & Firewall (CSF) in Linux

If you look at IT-related job postings anywhere, you will notice a steady demand for security pros. This does not only mean that cybersecurity is an interesting field of study, but also a very lucrative one. With that in mind,...

/ September 7, 2018

Malware Analysis using Osquery | Part 2

In the first part of this series, we saw how you can use Osquery to analyze and extract valuable information about malware’s behavior. In that post, we followed the activity of the known Emotet loader, popular for distributing banking trojans....

/ September 7, 2018

InfoSec Career Paths vs Programming Skills — The Basics

Image from https://www.2-sec.com/2017/08/day-life-2-sec-penetration-tester/ I’ve recently was asked for a numerous time?—?“Is being a great developer vital when choosing information security as a professional career?”, so I decided to write a more in-depth answer to the question. My answer below: Beneficial?...

/ August 22, 2018

Entering God Mode — The Kernel Space Mirroring Attack

How Alibaba are researching using the hardware features of ARM MMU to enable God Mode in Android 8 terminals Wang Yong, a.k.a. Thomas King, is a researcher from Alibaba Security’s Pandora Lab. The lab focuses on mobile security, including research...

/ August 14, 2018

Universal Logon Framework: Another Blockchain Technology Disruption

The world as we see it today has no doubts become digitized. Nearly almost all transactions are carried out online. From booking an airplane ticket, international money transfers to ordering for foods and even booking a taxi. The internet paved...

/ August 12, 2018

5 Tools to Scan a Linux Server for Malware and Rootkits

There are constant level of high attacks and port scans on Linux servers all the time, while a properly configured firewall and regular security system updates adds a extra layer to keep the system safe, but you should also frequently...

/ August 9, 2018

Cryptmount – A Utility to Create Encrypted Filesystems in Linux

Cryptmount is a powerful utility which allows any user to access encrypted filesystems on-demand under GNU/Linux systems without requiring root privileges. It requires Linux 2.6 or higher. It handles both encrypted partitions as well as encrypted files. It makes it...

/ February 19, 2018

How to Change FTP Port in Linux

FTP or File Transfer Protocol is one of the oldest network protocol used today as standard file transfers over computer networks. FTP protocol uses the standard port 21/TCP as command port. Although, there are a lot of implementations of FTP...

/ January 27, 2018