Article by Giuseppe Sanna One of the most important things for eveybody is undoubtedly the security ! Sure, the software can be reinstalled, the hardware can be bought back … But your information? Those can not be re-installed or repurchased. In the event of a crash … you could lost all forever! For this reason, […]
I’ve already talked about fail2ban and logcheck, 2 tools that can scan your logs and do actions, based on rules that you can give/modify, usually modify your iptables rules to stop active attacks against your server or simply send you a warning if some thing is found in the logs. Today we’ll see a similar […]
Article by James Hawkins This is the second part of our guide on Nmap, you can find the first part here, in this part of the tutorial we’ll see other configurations that you can use with Nmap to avoid firewalls or debug the information obtained.
Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other […]
Article by Dominique Cimafranca first published on his blog regarding Ubuntu, and Linux in general. A simple but effective procedure for evaluating security on your computer is to check what sites it’s connecting to, or what sites are connecting to it. Most critical malware nowadays turn computers into zombies for botnets — typically zombified hosts will […]