Security

How to Scan & Find All Open Ports with Nmap

February 16, 2019

The Nmap hosted security tool can help you determine how well your firewall and security configuration is working. This guide will show you how to scan or check your Linux system for open ports using Nmap.

Read more

How to Set Up & Install Squid Proxy Server on Ubuntu 18.04

February 15, 2019

Squid is a Linux-based proxy application that can be used for filtering traffic, security, DNS lookups, and to speed up a web server by caching resources. This guide will walk you thru you setting up and installing Squid Proxy on Ubuntu.

Read more

How to View Apache Access & Error Logs

January 7, 2019

Apache is part of the LAMP stack of software for Linux (Linux, Apache, MySQL, PHP). Apache is responsible for serving web pages to people looking at your website.

Read more

How To Add User to Sudoers & Add User to Sudo Group on CentOS 7

December 5, 2018

This guide will walk you through the steps to create or add a sudo user on CentOS 7. The “sudo” command stands for “Super User DO,” and temporarily elevates the privileges of a regular user for administrative tasks.

Read more

How To Prevent Brute Force Attacks With 8 Easy Tactics

December 3, 2018

A brute force attack is among the most straightforward and least sophisticated hacking method. As the name implies, brute force attacks are far from subtle. The theory behind such an attack is that if you take an infinite number of attempts to guess a password, you are bound to be right eventually.

Read more

How to Implement Validation for RESTful Services with Spring

November 13, 2018

Data validation is not a new topic in web application development and here we take a brief look at data validation in Java ecosystem in general and Spring Framework specifically. Java platform has de facto a standard for implementing data validation that is Bean Validation specification.

Read more

How to Reset or Change the Root Password in Linux

October 22, 2018

In Linux, root privileges (or root access) refers to a user account that has full access to all files, applications, and system functions.

Read more

How to Reset or Change MySQL Root Password on Linux or Windows

October 21, 2018

MySQL is a database management system. It’s operated under the Open Source software model and has become a very popular software package for web application software. Like many web services, MySQL has an administrator-level or root password. The root password allows a user to perform all top-level functions in the database.

Read more

How to Use SSH to Connect to a Remote Server in Linux or Windows

September 24, 2018

In this tutorial, find out How To Use SSH to Connect to a Remote Server in Linux or Windows.

Read more

How to Configure Windows Server 2012 Firewall

September 17, 2018

Firewalls have become an essential part of every network that has access to the Internet. Without firewalls, anyone would be able to access your network and servers and infect them with malicious software. Properly configured, a firewall can substantially decrease undesirable network communications in a local network.

Read more