Security

application security

Do Not Miss These 10 Steps in Application Security Assessment

If you are a web-based company or even a company that uses the internet for any purpose, application security assessment…

Secure Email Server Against Hacking

How to Secure Email Server Against Hacking with VPN (Debian/Ubuntu)

In this tutorial, I’m going to share with you my tips and tricks to secure email servers against hacking with…

Set Up ModSecurity with Nginx on Debian Ubuntu

How to Set Up ModSecurity with Nginx on Debian/Ubuntu

This tutorial is going to show you how to install and use ModSecurity with Nginx on Debian/Ubuntu servers. ModSecurity is…

Set Up ModSecurity with Apache on Debian Ubuntu

How to Set Up ModSecurity with Apache on Debian/Ubuntu

This tutorial is going to show you how to install and use ModSecurity with Apache on Debian/Ubuntu servers. ModSecurity is…

getting started with UFW

How to Use UFW Firewall on Debian, Ubuntu, Linux Mint

This tutorial is going to show you how to use UFW (Uncomplicated FireWall) on Debian/Ubuntu/Linux Mint with some real-world examples.…

pgp signature

How to Verify PGP Signature of Downloaded Software on Linux

PGP (Pretty Good Privacy) is a public key cryptography software that can be used to encrypt and sign data communication.…

tls certificate

Why You Should Use WebRoot Plugin to Obtain Let’s Encrypt TLS Certificate

For those who don’t know Let’s Encrypt, it’s a free, automated (to some extent) and open certificate authority that issues…

wpscan

Install and Use WPScan on Linux – A WordPress Vulnerability Scanner

WPScan is a command-line WordPress vulnerability scanner that can be used to scan WordPress vulnerabilities. It comes pre-installed on the following…

harden openssh server ubuntu

5 Effective Tips to Harden SSH Server on Ubuntu

In this post I’m going to share 5 tips you can use to secure SSH on a public-facing Ubuntu server.…

port knocking

Secure SSH Service Using Port Knocking on Debian and Ubuntu

In this tutorial, I’m going to show you how to use port knocking to secure SSH service on Debian and…

public key

A Practical Guide to GPG – Part 3 Working with Public Key

In part 2 of this GPG tutorial series, you learned how to encrypt message with public key and decrypt message…

Digital Signature

A Practical Guide to GPG – Part 4 Digital Signature

Previous 3 parts of this GPG tutorial series covered GPG encryption. In this part, we will take a look at…

GPG Guide

A Practical GPG Guide – Part 2 Encrypt and Decrypt Message

This is part 2 of my tutorials on GPG. In part 1, you generated your public/private keypair and a revocation…

GPG

A Practical Guide to GPG – Part 1 Generate Your Keypair

This tutorial series will teach you how to use GPG in Linux terminal. I will not tell you a bunch…

HSTS

What Is HSTS and How To Enable It on Nginx

What is HSTS HSTS stands for HTTP Strict Transport Security. HSTS tells web browsers that they should always interact with…

ssl/tls handshak explained

SSL/TLS Handshake Explained With Wireshark Screenshot

An encrypted connection is established betwen the browser or other client with the server through a series of handshakes. In…