CrowdSec - Open Source Security Automation Tool
CrowdSec is a massively multiplayer firewall designed to protect Linux servers, services, containers, or virtual machines exposed on the internet with a server-side agent. It was inspired by Fail2Ban and aims to be a modernized, collaborative version of that intrusion-prevention tool. CrowdSec is free and...
NMap - A Basic Security Audit of Exposed Ports and Services
Learn how to use NMap to do basic scans for open ports. Use additional NMap vulnerability scanning scripts for important security audits.
3 Privacy & Security Focused Linux Distributions to Try in 2020
3 Linux based operating systems to help preserve your online anonymity, privacy and security. 3 operating systems with 3 different approaches to security.
Securely Erase a SATA Hard Drive for Disposal using hdparm in Linux
Learn how to securely erase a SATA hard drive before disposal using hdparm in Linux. Ensure your data is safe.
Automatically Install Updates on RHEL8 or Fedora
Learn how to configure your systems to automatically install updates using dnf. Perfect for that Red Hat or Fedora workstation that needs to patched.
SFTP, FTPS, and SCP - What's the Difference?
What is the difference between SCP, SFTP, and FTPS? In this article we try to highlight the differences, strengths and limitations of each protocol.
4 Way Honey Tokens Help Detect Cybercriminals
4 ways honey tokens can be used to detect cyber criminals. Learn what a honey token is and how it is used by cybersecurity professionals.
Shred Command - Securely Erase Files or Entire Disk on Linux
The shred command allows you to securely delete files on a Linux system. We will cover how to use shred and it's command line options.
Automatically Accept SSH Fingerprint
How to automatically accepting the SSH fingerprint so you can automate connections to remote systems using command line options or the ssh-keyscan utility.
Brute Force Attacks - Pen Testing Using Hydra and RSMangler
How to use Hyrdra and RSMangler to launch a brute force attack. Penetration testing professionals use these tools for cybersecurity evaluation of a system.