索莱尔l娱二乐,1号庄

Filter: 乐彩网购彩平台 - Security (Cancel)

http://www.zlgchina.com/module/newswire/viewby.php?filter=42
索莱尔l娱二乐,1号庄,龙8国际老虎机真人游戏下载安装,乐彩网购彩平台赶工隶书语焉不详

Search within this group:
-

  5,006 entries found:

( 1 2 3 4 5 6 ... 251 ) Next »

How to Configure a Firewall with UFW on Debian 9

In this tutorial, we will show you how to install and use the UFW firewall system on a Linux VPS running Debian 9. Security is a very important thing to consider when you run your own server.

Nmap command line info gathering magic

Nmap and its associated files provide a lot of valuable information, but you have to know how to get it.

Banner Grabbing - Penetration Testing Basics

Banner grabbing is a common reconnaissance technique used in penetration testing. Let's take a look at some tools used to perform banner grabbing and how to launch your first grab.

How To Securely Share Files From Commandline With ffsend In Linux

ffsend is a fully featured CLI client for Firefox Send. This article explains how to securely share files from commandline with ffsend on Linux.

Run a Security Audit of Exposed Ports and Services Using Nmap

Learn how to use Nmap and some of it's scripts to run a security audit on your system. Easily gain valuable information on the security posture of your system.

Microsoft previews Microsoft Defender ATP for Linux

Believe it or not, Microsoft is readying its Microsoft Defender Advanced Threat Protection for Linux servers. Yes, you read that right: Linux servers.

How to Build a Hacking Station with Raspberry Pi and Kali Linux

Learn how you can build a hacking station with Raspberry Pi and Kali Linux and use it to identify security vulnerabilities in your smart home system.

The only option brought me to success installing telegram-desktop on CentOS 8.1 appears to be snap

  • https://dbaxps.blogspot.com; By Boris Derzhavets (Posted by dba477 on Feb 19, 2020 2:34 PM EDT)
  • Story Type: Security, Tutorial; Groups: Red Hat
In meantime the only option brought me to success installing telegram-desktop on CentOS 8.1 appears to be snap.

How To Limit The Number Of SSH Logins Per User/Group/System On Linux

This brief tutorial explains how to limit the number of SSH logins per user or group or system on Linux using /etc/security/limits.conf file.

Give your Linux system's firewall a security boost

Firewalls are great but they're ineffective if something goes wrong with them. The /etc/hosts.allow and /etc/hosts.deny files are the second line of defense against intruders.

Kids Using Kali Linux Are the Next-Generation Hackers, UK Police Warn

A poster created by the West Midlands Regional Organised Crime Unit (WMROCU) and also featuring the logo of UK’s National Crime Agency (NCA) warns that the kids using software like Tor Browser, Kali Linux, Discover, and Metasploit could be the next-generation hackers.

This Week in Linux 92: Linux 5.5, Solus, Kali, Tails, elementary, Red Hat, Pine64, Laptops

DLN Xtend, Linux Kernel 5.5, Solus 4.1, Tails 4.2, Kali Linux, elementary OS, Sudo Bug, Pine64 HardROCK64, PinePhone, Canonical Anbox Cloud, Kdenlive, RawTherapee, Kubuntu Focus, WINE, Proton & more

How To Capture Network Traffic With Tcpdump

Tcpdump is a free and open-source command-line utility that can be used to capture the incoming and outgoing network traffic from your system. In this tutorial, we will show you how to capture packets using Tcpdump on Linux with some examples.

Guess Access / Kiosk Mode on a Linux System

Easily create a restricted user to allow guest access to your system or to create a Linux based kiosk. The xguest package makes this a snap!

Cracking Wireless Networks With Kali

This is sequel to my first post which is about Wireless Penetration Testing.Please check it out for more details.

Wireless Penetration Testing

The ability to connect devices without physical access to them, also makes it hard to control who has that access. In this tutorial, we will go through various methods of gaining access to protected wireless networks, which will give you the needed know-how that will help you to set up your wireless environment as secure as possible. Due to the open nature of Linux, there are loads of ready made Linux distributions out there, whose sole purpose is penetration testing, and among them there are a few specialized in wireless field.

New Sudo Vulnerability Could Allow Attackers to Obtain Full Root Privileges

The Debian Project published today a new security bulletin to inform users about a Sudo vulnerability that affects the Debian GNU/Linux 9 “Stretch” operating system series.

The Ultimate Guide to Tor Browser (with Important Tips) 2020

If you’re curious about Tor browser, then you already know how important your privacy and anonymity online can be. And yes, Tor browser is a great tool that can help keep you safe. But there’s a lot of confusion about its pros and cons, and especially, about how it relates to VPNs

How to Install Naxsi Firewall with Nginx on Ubuntu 18.04

Naxsi is an open-source web application firewall specially designed for Nginx. Checkout my post about how to install and configure Naxsi on Ubuntu.

Canonical Releases Ubuntu 16.04 LTS Kernel Security Update to Address 9 Flaws

Canonical has released today a new Linux kernel security update for the Ubuntu 16.04 LTS (Xenial Xerus) operating system to address several vulnerabilities.

How to Encrypt Linux partitions with VeraCrypt on Debian 10

It is a good idea to keep your confidential data in an encrypted location to prevent unauthorized access. It becomes more important when you share your computer with others. Encryption encrypts the information so that it is unreadable to anyone. VeraCrypt is an open-source tool for encrypting files, folders and entire partitions, available not only for Linux, but also for Windows and Mac OS. In this article, I will describe how you can encrypt a partition under Linux with VeraCrypt.

Kali Linux Ethical Hacking OS Gets First 2020 Release

Offensive Security kicks of 2020 with the first release of their Kali Linux ethical hacking and penetration testing GNU/Linux distribution, Kali Linux 2020.1.

Sysadmin tools: How to use iptables

The iptables command is a powerful interface for your local Linux firewall. It provides thousands of network traffic management options through a simple syntax.

How to Install OpenVAS Vulnerability Assessment System on Ubuntu 18.04

OpenVAS is an open-source Vulnerability Assessment System that can be used to run the test against servers for known vulnerabilities. Checkout the post on how to install and configure openVAS on Ubuntu.

How to Install And Configure Snort NIDS on CentOS 8

Tutorial on how to install and configure Network Intrusion Detection System Snort on Centos 8.

IPFire Linux Firewall Distribution Improves Its Intrusion Prevention System

A new version of IPFire, the only Linux-based and open-source firewall distribution, has seen the light of day to bring more improvements and updated components.

How to Protect Your Server with Fail2ban on CentOS 8

Fail2ban is a free, open-source and most widely used IPS (Intrusion Prevention System) application that can be used to protect your server against brute force password login attacks. In this post I have explained how to configure and install Fail2ban utility on Centos 8. Also Check out how you can protect your SSH and HTTP against different kinds of attacks using Fail2Ban.

How To Limit User's Access To The Linux System

Using Restricted Shell, we can easily limit user's access to the Linux system. Once you put the users in restricted shell mode, they are allowed to execute only limited set of commands.

Destination Linux 156 - CES 2020, Disaster Recovery Tips, Fallback Safe Distros?, Firefox

openEuler, New Firefox 72 Released, Linus Say No To ZFS In Kernel, New Dell Linux Laptop, Nvidia Wakes Up

How to temporarily drop Admin privileges to Administrators using Delayed Admin In Linux

Delayed Admin utility will temporarily drop admin privileges to administrators. It will not remove the admin privileges of an administrative user account completely, but delays them for a particular time.

Linux kernel hardening: Kernel parameters with sysctl

Linux kernel security can be increased at runtime using sysctl, allowing to mitigate potential vulnerabilities and exploits.

Privacy-Focused Tails OS 4.2 Improves Automatic Upgrades, Adds Tor Browser 9.0.3

Tails, the amnesic incognito live system based on Debian GNU/Linux, which focuses on delivering online privacy to those who need a portable operating system, has been updated to version 4.2.

How to monitor file integrity on Linux using Osquery

The basic concept involved with the use of the osquery application is the "tabular abstraction" of many aspects of the operating system, such as processes, users, etc. The data is stored in tables which can be queried using SQL syntax, directly via the osqueryi shell, or via the osquerydemon. In this tutorial we will see how to install the application, how to run basic queries, and how to use FIM (File Integrity Monitoring).

Canonical Outs Major Linux Kernel Update for All Supported Ubuntu Releases

Canonical released today the first Linux kernel security update for all of its supported Ubuntu Linux releases to address more than 30 security vulnerabilities.

3 Privacy & Security Focused Operating Systems to Try in 2020

  • Putorius.net; By Marco Cherisi (Posted by savona on Jan 6, 2020 7:14 AM EDT)
  • Story Type: Security; Groups: Linux
We explore 3 examples of privacy and security focused Linux distributions. Each of these operating systems approach security in a different manner. We provide an overview of how each works and outline the some benefits of each.

How to use dnscrypt-proxy to secure DNS queries in Linux

This article describes how to install and configure dnscrypt-proxy to use DNSCrypt and DNS-over-HTTPS (DoH) with DNSSEC.

10 articles to enhance your security aptitude

If security is a process (and it is), then it stands to reason that different projects (and contributors) are in different places. Some applications have years of security testing, with design done by people who have worked in information security for decades. Others are brand new projects by developers working on their first open source project. It comes as no surprise that Opensource.com's top security articles of 2019 represent this range of experience.

BlackArch Linux Ethical Hacking OS Gets First 2020 Release with 120 New Tools

BlackArch Linux developers announced today the release of new ISOs and OVA image for their penetration testing and ethical hacking operating system with new tools and many improvements.

Secure Debian with ClamAV Antivirus

Although Linux is popular for being mostly virus-free, there might still exist some-especially if you usually download stuff from unreliable sources. Since viruses are not a major issue in Linux, there is not a huge pool of antivirus available for this operating system. One of the best among these is the ClamAV antivirus which does its job pretty well. In this article, we will explain how you can install and use ClamAV and ClamTK GUI to scan Debian for viruses.

Destination Linux 153 - Linux Mint 19.3, GNOME, Purism, Life is Strange 2, FUSE Goes Closed Source

Topics covered in this episode: Linux Mint 19.3 Released, Dual GPU Improvements Coming to Gnome, Purism Announces Librem Server, FUSE For macOS Goes Closed Source, Life Is Strange 2

US military loves Linux

  • fudzilla; By Nick Farrell (Posted by bob on Dec 24, 2019 1:41 AM EDT)
  • Story Type: Security; Groups: Red Hat
Linux has now already been certified to meet the three different security certifications required by the United States Department of Defense.

SSH Command

Secure Shell (SSH) is a cryptographic network protocol used for an encrypted connection between a client and a server. The ssh client creates a secure connection to the SSH server on a remote machine. The encrypted connection can be used to execute commands on the server, X11 tunneling, port forwarding, and more. Learn how to use the OpenSSH command-line client to log in to a remote machine and run commands.

How To Safely Install Packages Using Npm Or Yarn On Linux

Safely install Npm packages by auditing them for known vulnerabilities using "Npq" in Linux.

Firejail DNS over HTTPS Proxy Server

fdns is a DNS-over-HTTPS proxy server targeted at small networks and Linux desktops. To speed up the name resolution fdns caches the responses, and uses a configurable adblocker and privacy filter to cut down unnecessary traffic. The software is written in C and it is released as part of Firejail project under GPLv3 license.

Add Two-Factor Authentication In WordPress

Setting up Two-factor authentication is very important for any online service we use today. It secures account from having any unauthenticated person access to your account even with the login credentials.

Toplip - A Very Strong File Encryption And Decryption CLI Utility

Toplip is a free and open source encryption utility that uses a very strong encryption method called AES256, along with an XTS-AES design to safeguard your confidential data.

Fancy privacy in Chrome? Yeah, we'll get to that after we start app detection says Google

Privacy developers concerned over Chocolate Factory plans. A nascent web API called getInstalledRelatedApps offers a glimpse of why online privacy remains such an uncertain proposition. In development since 2015, Google has been experimenting with the API since the release of Chrome 59 in 2017. As its name suggests, it is designed to let web apps and sites determine whether a corresponding native app is installed on a user's device.…

Destination Linux 150 - Librem 5, Zorin OS, Private Internet Access, UBports, Fedora, Bitwarden

ZorinOS Privacy Concerns Ubuntu Touch Runs On Raspberry Pi Librem 5 Birch Has Shipped Fedora Users Concerned GNOME Software Proprietary Software Linux Powered Handheld Returns

Sen. Cantwell Leads With New Consumer Data Privacy Bill

  • Electronic Frontier Foundation; By Adam Schwartz (Posted by bob on Dec 5, 2019 1:05 AM EDT)
  • Story Type: Security
There is a lot to like about U.S. Sen. Cantwell’s new Consumer Online Privacy Rights Act (COPRA). It is an important step towards the comprehensive consumer data privacy legislation that we need to protect us from corporations that place their profits ahead of our privacy.

Security attacks: 3 habits of the most resilient companies

Is your organization highly resilient to cyber attacks? Consider these three approaches to building resilience into strategy

( 1 2 3 4 5 6 ... 251 ) Next »

  Add more filters
Filter by Groups:

Filter by Story Type:

 
Timer: 125.34 jiffies (1.25337 seconds)