TAG

Security

Security Auditing with Lynis

This post is about Security Auditing with Lynis Introduction I originally intended to write about how to secure a server/workstation system. However, I changed my mind...

Ubuntu vs OpenSUSE. What to Choose?

Welcome again! Today we will have to compare Ubuntu vs OpenSUSE. Eventually, all system administrators and DevOps engineers always looking for a stable Linux...

Detecting Log4Shell with Wazuh

This time, you will learn about Detecting Log4Shell with Wazuh The Apache Log4J is one of the most common logging libraries in Java, mainly used...

How to install APF on Debian 11

Hello, friends. In this post, you will learn how to install APF on Debian 11. But first, let’s talk a brief about it. What is...

How to Block SSH Brute Force Attacks Using SSHGUARD

SSHGuard is an open-source daemon that shields hosts from brute-force attacks. It accomplishes this through monitoring and aggregation of system logs, detecting attacks, and...

How to install Suricata on Debian 11

Hello, friends. In this post, you will learn how to install Suricata on Debian 11. This tool will help us to further protect our...

Install Fail2ban on Debian 11

Hello, friends. In this post, we will help you to install Fail2ban on Debian 11. Thanks to this tool you will be able to...

WAZUH Detecting and removing malware – Virus Total integration

VirusTotal is an online portal, owned by Google, that uses many antivirus engines to check for viruses and malware. It provides an API service...

Remove an expired key in APT

Hello, dear friends. Although it is not always recommended, many times to get recent versions of a package or a whole program, we need...

The Hive (Security Incident Response Platform)

This page is a step by step installation and configuration guide to get an TheHive 4 instance up and running. This guide is illustrated...

Latest news

- Advertisement -spot_img