Category Archive: Security

Mar 11 2017

Linux iptables Firewall Simplified Examples

In the previous post, we’ve talked about how to Secure Linux Server Using Hardening Best Practices and some people ask me about firewall section which was a brief introduction about iptables firewall. Today we will discuss in detail the Linux iptables firewall and how to secure our servers traffic using that awesome tool. Source: Linux …

Continue reading »

Feb 27 2017

Detect Webcam & Microphone Activity on Mac with Oversight

Though Mac users don’t usually have to worry excessively about “camfecting” malware and spyware, some security conscious users may find it nice to know if a process or application is attempting to access their computers web camera or microphone. Source: Detect Webcam & Microphone Activity on Mac with Oversight

Jan 04 2017

Raspberry Pi as a SOCKS proxy and SSH file server Tutorial

A couple redditors showed interest in how I set up my Pi as a SOCKS proxy and recommended I make a separate post as a tutorial, so I’ll do my best to explain everything. Background SOCKS stands for Socket Secure, and is essentially just a middle man for a server and client for send information …

Continue reading »

Dec 30 2016

How to Improve the Security of Your Linux System with Firejail

If you are looking to improve the security of your Linux system, check out Firejail that can sandbox all processes and reduce the risk of security breaches Source: How to Improve the Security of Your Linux System with Firejail – Make Tech Easier

Dec 26 2016

Before You Pay that Ransomware Demand… — Krebs on Security

A decade ago, if a desktop computer got infected with malware the chief symptom probably was an intrusive browser toolbar of some kind. Five years ago you were more likely to get whacked by a banking trojan that stole all your passwords and credit card numbers. These days if your mobile or desktop computer is …

Continue reading »

Nov 17 2016

The Differences between Su, Sudo Su, Sudo -s and Sudo -i

In Linux, there are several ways to switch to the root user and it can be confusing. Learn the differences between each command and their use cases. Source: The Differences between Su, Sudo Su, Sudo -s and Sudo -i (Make Tech Easier)

Oct 10 2016

[OS X] Don’t Put Tape On Your Webcam, This Free App Alerts You When Someone Hacks It

It is a known issue that a hacker access the webcam and mic on your device without your consent and awareness. You can take the help of a tape but it can’t be considered a wise solution. An ex-NSA hacker has created an anti spying tool for OS X which alerts you when an application …

Continue reading »

Oct 08 2016

Disposing Of A PC? Nuke The Drive First. | Gizmo’s Freeware

Deleting your files isn’t good enough. Not even if you empty the recycle bin afterwards. Nor is formatting the drive. There are plenty of ways to recover data in such circumstances. Instead, you need a specialist program that can wipe the entire drive by storing random data onto every part of it, multiple times. Source: …

Continue reading »

Sep 13 2016

10 Best Password Managers For Linux Operating Systems

There are many password managers for Windows and OS X, but here we’ll look at some of the best password managers for Linux. With so many online accounts on the internet, it can be tediously difficult to remember all your passwords. Many people write them down or store them in a document, but that’s plain …

Continue reading »

Aug 18 2016

Simple IPTables Tricks – Idol Star Astronomer

Securing your linux system using iptables can be a daunting task. There are some utilities that can help, but when it comes to security a deep understanding is often very useful. Fundamentally, iptables are lists of rules, executed in order, to determine if a packet should be accepted, dropped, or forwarded along. It has some …

Continue reading »

Older posts «

%d bloggers like this: