Tag: security

DDoS Attacks Explained: What You Need to Know to Prevent Them

Every growing website needs to be aware of DDoS attacks, and other common threats that can quickly take down an unprotected server. They can be devastating if you don’t know what’s going on or how

blank

An exposed password let a hacker access internal Comodo files

A hacker gained access to internal files and documents owned by security company and SSL certificate issuer Comodo by using an email address and password mistakenly exposed on the internet. The credentials were found in

blank

What you missed in cybersecurity this week

It’s been a busy week — it’s tough to keep up with all the cybersecurity news. We’ve collected some of the biggest cybersecurity stories from the week — from TechCrunch and afar — to keep

blank

How to Install Memcached (Caching Server) on CentOS 7

Memcached is an open source distributed memory object caching program that allows us to improve and speed up the performance of dynamic web applications by caching data and objects in Memory. Memcached is also used

blank

How to Secure a Website With the ‘Holy Trinity’ of Site Security

No matter how large or small your site is, or what niche it occupies, it’s likely to be the target for at least a few attacks over its lifespan. Protecting it is essential if you

blank

How to Setup Two Factor Authentication for SSH on Fedora

Every day there seem to be lots of security breaches reported where our data is at danger. Despite the fact that SSH is a secure way to establish a connection remotely to a Linux system,

blank

Facebook won’t let you opt-out of its phone number ‘look up’ setting

Users are complaining that the phone number Facebook hassled them to use to secure their account with two-factor authentication has also been associated with their user profile — which anyone can use to “look up”

blank

How to Check Integrity With AIDE in Fedora

AIDE (Advanced Intrusion Detection Environment) is a program for checking the integrity of a file and directory on any modern Unix-like system. It creates a database of files on the system, and then uses that

blank

Tiger – The Unix Security Audit and Intrusion Detection Tool

Tiger is a free, open source collections of shell scripts for security audit and host intrusion detection, for Unix-like systems such as Linux. It’s a security checker written entirely in shell language and employs various

blank

Firejail – Securely Run Untrusted Applications in Linux

Sometimes you may want to use applications that have not been well tested in different environments, yet you must use them. In such cases, it is normal to be concerned about the security of your

blank