Security

General practices in protecting the privacy of your data

Tags: Security

Published on : October 8, 2019 by

General practices in protecting the privacy of your data

The ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively is called Privacy. With the advancement of the digital age, personal information vulnerabilities have increased and data security has become a concern. A need to limit the information to be made available public came along with […]

Continue Reading...


Understanding the netstat command

Tags: Security

Published on : August 12, 2019 by

Understanding the netstat command

Netstat is a command-line network utility useful for network troubleshooting and performance measurement. netstat (network statistics) is available in most versions of Windows, Linux, UNIX, and other operating systems. The command provides various network related information such as current TCP/IP connections, routing tables, interface statistics, etc. It is the basic tool which helps us to […]

Continue Reading...


Configuring Firewall with UFW

Tags: Security

Published on : August 8, 2019 by

Configuring Firewall with UFW

Managing firewall using the only tables can be a daunting task and it takes time to be proficient. Many frontends for iptables have been created over the years targeting different audiences. UFW is a frontend for iptables and is particularly well-suited for host-based firewalls. UFW or Uncomplicated Firewall is developed to provide an easy-to-use interface […]

Continue Reading...


Monitor changes made to a file using auditd

Tags: server monitoring

Published on : July 6, 2019 by

Monitor changes made to a file using auditd

Modern Linux kernel comes with auditd daemon. It is responsible for writing audit records to the disk. During startup, the rules in /etc/audit.rules are read by this daemon. You can open /etc/audit.rules file and make changes such as setup audit file log location and other option. The default file is good enough to get started […]

Continue Reading...


Hardware Firewalls vs Software Firewalls

Tags: Security

Published on : July 3, 2019 by

Hardware Firewalls vs Software Firewalls

Hardware Firewall Hardware firewall provides the first line of defence against common forms of attack coming from the outside world. They protect every machine on a local network and can generally be effective with little or no configuration. A technique called packet filtering is used in a typical broadband router as a hardware firewall, which examines the header of a packet to determine […]

Continue Reading...


Let's Connect

Categories

Your Cart

Cart is empty.

Subtotal
₹0.00
APPLY
0
Send this to a friend