All Posts
2
Sep
linux
How to Create x2go Cloud Desktop
Learn how to create your own x2go cloud desktop using Ubuntu 20.04 as the server and various platforms as the clients. X2go is a fast and secure remote desktop software for Linux systems.
Read more ...
31
Aug
security
Bell-LaPadula Model: A MAC Model for Achieving Multi-level Security
Learn what the Bell LaPadula Model is, how it works, why is it important, what are its pros and cons, and the application of Bell-LaPadula Model in this article. Find out how the model protects data confidentiality and multilevel security in government and military applications.
Read more ...
28
Aug
ethical hacking
How to Use Google Cache to Find Sensitive Content
Learn what Google Cache is, how it works, why it can reveal sensitive content, and how you can stop your web pages from being cached by Google. Read now to secure your website!
Read more ...
27
Aug
linux
Kernel Headers: What They Are and How to Install
Learn what kernel headers are, how to install them on different Linux distributions, and how to use them for compiling kernel modules or device drivers.
Read more ...
25
Aug
security
CORS: What Is It and How Does It Work?
Learn what CORS is and how it works in this article. Find out how to fix common CORS errors and what are some best practices for implementing CORS securely and efficiently.
Read more ...
24
Aug
networking
How to Check if a Port is Open in Linux and Secure It
Learn how to check if a port is open in Linux and secure it using firewalls, port knocking, changing default passwords, and removing unnecessary services.
Read more ...
23
Aug
linux
Tee Command in Linux with Examples
Learn how to use the tee command in Linux with this beginner's guide. Find out how to save and view the output of a command at the same time with examples and how is it different to >> command.
Read more ...
22
Aug
security
What is Insecure Randomness? | A Guide to Secure Randomness
Insecure randomness can compromise the security of your data. Learn what is insecure randomness, how it affects security, how to avoid it, and some examples of insecure randomness in practice.
Read more ...
18
Aug
security
The Ultimate Guide to SSH Keys: How to Generate, Manage, and Use
Learn how to generate SSH keys on Linux using different tools, how to copy them to remote servers using different methods, how to connect to remote servers using SSH keys without passwords, and how to manage and secure your SSH keys properly in this comprehensive guide.
Read more ...
12
Aug
security
SSTI: How to Secure Your Web Templates from Code Injection Attacks
Learn what server-side template injection (SSTI) is, how it works, what impact it can have, how to prevent and detect it, and why it is important to know about it.
Read more ...
10
Aug
security
Checksum Algorithm: A Guide to Data Verification
Checksums are sequences of numbers and letters that help you check data for errors. Learn what checksums are and how to use them effectively in this article.
Read more ...
3
Aug
security
Heartbleed Vulnerability Explained
Here we explain everything you need to know about Heartbleed, a serious security flaw that can expose your sensitive data. Find out how it operates, how to identify and repair it, and how to stay safe from it. Click here!
Read more ...
Showing 25 to 36 of 145 results