Blog

Here you can find articles we have written

All Posts

black flat screen computer monitor beside black computer keyboard
2
Sep
linux

How to Create x2go Cloud Desktop

Learn how to create your own x2go cloud desktop using Ubuntu 20.04 as the server and various platforms as the clients. X2go is a fast and secure remote desktop software for Linux systems.

Read more ...

sheets of layered colored paper
31
Aug
security

Bell-LaPadula Model: A MAC Model for Achieving Multi-level Security

Learn what the Bell LaPadula Model is, how it works, why is it important, what are its pros and cons, and the application of Bell-LaPadula Model in this article. Find out how the model protects data confidentiality and multilevel security in government and military applications.

Read more ...

white and black turntable in grayscale photography
28
Aug
ethical hacking

How to Use Google Cache to Find Sensitive Content

Learn what Google Cache is, how it works, why it can reveal sensitive content, and how you can stop your web pages from being cached by Google. Read now to secure your website!

Read more ...

verrazano-narrows bridge
27
Aug
linux

Kernel Headers: What They Are and How to Install

Learn what kernel headers are, how to install them on different Linux distributions, and how to use them for compiling kernel modules or device drivers.

Read more ...

two rope with carbiner hooked on brown wooden post
25
Aug
security

CORS: What Is It and How Does It Work?

Learn what CORS is and how it works in this article. Find out how to fix common CORS errors and what are some best practices for implementing CORS securely and efficiently.

Read more ...

white and red love neon light signage
24
Aug
networking

How to Check if a Port is Open in Linux and Secure It

Learn how to check if a port is open in Linux and secure it using firewalls, port knocking, changing default passwords, and removing unnecessary services.

Read more ...

a street sign with an arrow
23
Aug
linux

Tee Command in Linux with Examples

Learn how to use the tee command in Linux with this beginner's guide. Find out how to save and view the output of a command at the same time with examples and how is it different to >> command.

Read more ...

stack of jigsaw puzzle pieces
22
Aug
security

What is Insecure Randomness? | A Guide to Secure Randomness

Insecure randomness can compromise the security of your data. Learn what is insecure randomness, how it affects security, how to avoid it, and some examples of insecure randomness in practice.

Read more ...

brass padlock on green metal gate
18
Aug
security

The Ultimate Guide to SSH Keys: How to Generate, Manage, and Use

Learn how to generate SSH keys on Linux using different tools, how to copy them to remote servers using different methods, how to connect to remote servers using SSH keys without passwords, and how to manage and secure your SSH keys properly in this comprehensive guide.

Read more ...

hugo template code
12
Aug
security

SSTI: How to Secure Your Web Templates from Code Injection Attacks

Learn what server-side template injection (SSTI) is, how it works, what impact it can have, how to prevent and detect it, and why it is important to know about it.

Read more ...

person using laptop
10
Aug
security

Checksum Algorithm: A Guide to Data Verification

Checksums are sequences of numbers and letters that help you check data for errors. Learn what checksums are and how to use them effectively in this article.

Read more ...

red and white heart shape illustration
3
Aug
security

Heartbleed Vulnerability Explained

Here we explain everything you need to know about Heartbleed, a serious security flaw that can expose your sensitive data. Find out how it operates, how to identify and repair it, and how to stay safe from it. Click here!

Read more ...

Showing 25 to 36 of 145 results