SHOWING RESULTS FOR:

How to Convert Ubuntu 20.04 In Zentyal Firewall

Introduction Greeting for the day! We are going to convert Ubuntu 20.04 in Zentyal today. The Server is a very popular OS among Linux admins...

Configure Pi-Hole with Ubuntu 20.04 Headless Server

Introduction Today we will discuss Pi-hole configurations and their usability. Though it was not planned, for the last few days, I was writing on...

BUILD YOUR NETWORK FIREWALL WITH CLEAROS

Introduction Welcome again! today will learn to build a Firewall with ClearOS. in the very last article I listed up the top five firewalls....

How to Block SSH Brute Force Attacks Using SSHGUARD

SSHGuard is an open-source daemon that shields hosts from brute-force attacks. It accomplishes this through monitoring and aggregation of system logs, detecting attacks, and...

Pfsense High Availability

This post is about pfSense High Availability This recipe describes a simple three interface HA configuration. The three interfaces are LAN, WAN, and Sync. This...

Mount a remote folder with sshfs

Sometimes you just need to copy some files between two computers, you can do that with scp, sftp or rsync. But some of those...

Oracle Weblogic 14c on CentOS 8

Modern business environment demands Web and e-commerce applications that accelerate your entry into new markets like a boom ! help you find new ways...

Understand Cyber Security and Cryptography

What is Cryptography? So Cyber Security and Cryptography both are key elements to protect communication over the internet. We are in an era of undercommented...

Install NMAP on CentOS 8

Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it...

SSH Tunneling and Proxying

Introduction: SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to...

Latest news