CATEGORY

Linux

How to install and configure Wildfly on CentOS 8

Introduction WildFly (formerly known as JBoss) is an application server written in Java and developed by Red Hat. It is an open source application server for...

How to install Python 3.10 on Debian 11?

Hello friends. In this rather short post, we will help you to install Python 3.10 on Debian 11. Debian 11 has Python, do I have...

How to Ping a Port Number in Linux

Introduction Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available for virtually all operating systems that have networking...

How to install and use SAR command (to Monitor system Performance) in Linux

Introduction System Activity Report (sar) is a Unix System V-derived system monitor command used to report on various system loads, including CPU activity, memory/paging, interrupts, device load, network and swap space utilization. Sar...

How to set up the Pretty Hostname

Introduction A pretty hostname avoids most of the limitations of other hostname types, giving users more freedom when naming their systems. In this tutorial, we will...

dust command in Linux

Hello, friends. In this post, we will help you with another great little utility for our terminal. Today you will learn how to use...

WAZUH Detecting and removing malware – Virus Total integration

VirusTotal is an online portal, owned by Google, that uses many antivirus engines to check for viruses and malware. It provides an API service...

Wazuh Blocking attacks with Active Response

Active response allows Wazuh to run commands on an agent in response to certain triggers. In this use case, we simulate an SSH Brute...

Install and Configure Logrotate on CentOS 8

Logs are beneficial to collect information. They can be beneficial while troubleshooting an issue. Logs can also be a pain to deal with but...

Cortex Installation Guide

Cortex solves two common problems frequently encountered by SOCs, CSIRTs and security researchers in the course of threat intelligence, digital forensics and incident response:How...

Latest news