Tag: security

DDoS Attacks Explained: What You Need to Know to Prevent Them
Every growing website needs to be aware of DDoS attacks, and other common threats that can quickly take down an unprotected server. They can be devastating if you don’t know what’s going on or how …

An exposed password let a hacker access internal Comodo files
A hacker gained access to internal files and documents owned by security company and SSL certificate issuer Comodo by using an email address and password mistakenly exposed on the internet. The credentials were found in …

Google’s own data proves two-factor is the best defense against most account hacks
Every once in a while someone will ask me what is the best security advice. The long answer is “it depends on your threat model,” which is just a fancy way of saying what’s good …

What you missed in cybersecurity this week
It’s been a busy week — it’s tough to keep up with all the cybersecurity news. We’ve collected some of the biggest cybersecurity stories from the week — from TechCrunch and afar — to keep …

How to Install Memcached (Caching Server) on CentOS 7
Memcached is an open source distributed memory object caching program that allows us to improve and speed up the performance of dynamic web applications by caching data and objects in Memory. Memcached is also used …

How to Secure a Website With the ‘Holy Trinity’ of Site Security
No matter how large or small your site is, or what niche it occupies, it’s likely to be the target for at least a few attacks over its lifespan. Protecting it is essential if you …

How to Setup Two Factor Authentication for SSH on Fedora
Every day there seem to be lots of security breaches reported where our data is at danger. Despite the fact that SSH is a secure way to establish a connection remotely to a Linux system, …

Facebook won’t let you opt-out of its phone number ‘look up’ setting
Users are complaining that the phone number Facebook hassled them to use to secure their account with two-factor authentication has also been associated with their user profile — which anyone can use to “look up” …

How to Check Integrity With AIDE in Fedora
AIDE (Advanced Intrusion Detection Environment) is a program for checking the integrity of a file and directory on any modern Unix-like system. It creates a database of files on the system, and then uses that …

Tiger – The Unix Security Audit and Intrusion Detection Tool
Tiger is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It’s a security checker written entirely in shell language and employs various …

Firejail – Securely Run Untrusted Applications in Linux
Sometimes you may want to use applications that have not been well tested in different environments, yet you must use them. In such cases, it is normal to be concerned about the security of your …