TAG

Security

I2P SETUP FOR SQUID OUTPROXY

This post is about I2P SETUP FOR SQUID OUTPROXY. I2P INSTALLATION ON DEBIAN 10 The Invisible Internet Project (I2P) is a fully encrypted private network layer that has...

How To Setup AppArmor on Ubuntu 20.04 | 22.04 LTS

So, In this guide, we will show you how to install and use AppArmor on Ubuntu systems. AppArmor is an effective and easy-to-use Linux application...

How to generate SHA-256 Hash in Linux (Terminal)

Hello, friends. You will learn in this post how to generate SHA-256 Hash on Linux using the terminal. This although simple allows you to...

How to disable the “Block dangerous and deceptive content” Firefox feature

Hello, friends. Firefox is the best web browser out there (my opinion). However, it has sometimes a bit of annoying behaviors. Today, you will...

How To Install Metasploit on Ubuntu 20.04 | 22.04 LTS

In this guide, we will download and install Metasploit on Ubuntu systems The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development....

How to install Bitwarden Password Manager on Ubuntu 22.04

Today you will learn How to install Bitwarden Password Manager on Ubuntu 22.04 Bitwarden is a free open-source password manager that allows us to store...

How to install Fail2ban on Ubuntu 22.04 | Secure your server

Hello, friends. In this post, we will help you to install Fail2ban on Ubuntu 22.04. It is important in this tool to keep up...

Using SSH Keys

Introduction SSH supports authenticating users with keys. Although they require more setup ahead of time, they're generally more secure than typing in passwords. They're also...

Basic Setup of AppArmor on Arch Linux

Introduction Apparmor is an LSM (Linux Security Module) that allows us to restrict applications' capabilities with per-program profiles. It supplements the traditional Unix Discretionary Access...

Hardening SSH Configuration

This post is about Hardening SSH Configuration Introduction SSH has become the standard tool for remote management of UNIX-based systems. The SSH daemon (sshd) is installed...

Latest news

- Advertisement -spot_img