Installing utorrent on Linux and windows
Category: Tutorials and Courses
Using Android Webviews with authenticated proxy
SSHFS (Secure Shell FileSystem), is a tool that allows us to securely access and mount remote filesystems to local machine over the SSH protocol.
Open Source Backup Software for Linux
Iperf is a commonly used network testing tool that can create TCP and UDP data...
Release cached memory, Buffer and Swap Space on Linux
At some server hardening situation, we may need to disable the PING response, and we can do it as the following.
We can safely mount, read-only, copy and explore files on Linux Ext2/3/4, and LVM volumes from windows OS, using the following great 3 free tools..
A breakout for Atmel ATmega8 controller on 7×5 LED dot matrix display.
Nginx, & Apache NON-WWW Redirection regards to HTTP(s) protocol
Initialize Ubuntu Host Device and Set Up a Basic Firewall Working on Ubuntu 16.04 sever....
Content management, forum and other website software often require directories that are writable in order to function properly.
Repo Installation we’ll need to Install REMI and EPEL repositories, so open up a SSH connection...
PHP vulnerabilities are the norm, there is not much that can be done to prevent uploads of malicious files on a PHP site when there are world writable directories especially when your website is using a well known opensource community driven software product to power your website.
This article will take you through generating RSA keys using PuTTYgen on Windows for secure SSH connection, settings Putty password-less SSH login,and settings timeouts for connection session.
When browsing the Internet or sending mail when away from your home computer, there is no real way of ensuring it is secure.
In this article you will learn how to install and configure fail2ban, a security tool that can help protecting your VPS/Server from brute force attacks.
Continuing on checking your VPS/Server for possible security compromises.
Continuing with the scanning for rootkits articles, we now concentrate on installing and configuring rkhunter....
Up-to-date and secure installations, firewalls, limited ssh access and strong passwords are all basic and...
We are not living in a perfect world, and it is possible for a VPS/Servers...
Tcpdump is a powerful network debugging tool which can be used for intercepting and displaying packets on a network interface. Moreover, only interested packets can be displayed by using its filtering feature.
One of the key aspects of understanding and administering postfix is that it is designed to be a modular package.
Spam. No one likes it. No one wants it. No one needs it. However, it is there and is likely to be there for the foreseeable future.
In this last entry in our series on Linux file permissions we look at the umask and some more advanced file permissions. We also throw in some discussion of other file types you may see in a directory listing.