The Nmap hosted security tool can help you determine how well your firewall and security configuration is working. This guide will show you how to scan or check your Linux system for open ports using Nmap.
The Nmap hosted security tool can help you determine how well your firewall and security configuration is working. This guide will show you how to scan or check your Linux system for open ports using Nmap.
Squid is a Linux-based proxy application that can be used for filtering traffic, security, DNS lookups, and to speed up a web server by caching resources. This guide will walk you thru you setting up and installing Squid Proxy on Ubuntu.
Apache is part of the LAMP stack of software for Linux (Linux, Apache, MySQL, PHP). Apache is responsible for serving web pages to people looking at your website.
This guide will walk you through the steps to create or add a sudo user on CentOS 7. The “sudo” command stands for “Super User DO,” and temporarily elevates the privileges of a regular user for administrative tasks.
A brute force attack is among the most straightforward and least sophisticated hacking method. As the name implies, brute force attacks are far from subtle. The theory behind such an attack is that if you take an infinite number of attempts to guess a password, you are bound to be right eventually.
Data validation is not a new topic in web application development and here we take a brief look at data validation in Java ecosystem in general and Spring Framework specifically. Java platform has de facto a standard for implementing data validation that is Bean Validation specification.
In Linux, root privileges (or root access) refers to a user account that has full access to all files, applications, and system functions.
MySQL is a database management system. It’s operated under the Open Source software model and has become a very popular software package for web application software. Like many web services, MySQL has an administrator-level or root password. The root password allows a user to perform all top-level functions in the database.
In this tutorial, find out How To Use SSH to Connect to a Remote Server in Linux or Windows.
Firewalls have become an essential part of every network that has access to the Internet. Without firewalls, anyone would be able to access your network and servers and infect them with malicious software. Properly configured, a firewall can substantially decrease undesirable network communications in a local network.