Monday, October 26, 2020

Configure LibModsecurity with Nginx on CentOS 8

0
In this guide, we are going to learn how to configure LibModsecurity with Nginx on CentOS 8. LibMosecurity is the newest version of ModSecurity version 2.9 and below. It is therefore known as ModSecurity version 3. Configure LibModsecurity with Nginx on CentOS 8 Run System Update Begin...

Encrypt Emails using Enigmail on Thunderbird

2
Hello there, today we are going to learn how to encrypt emails using Enigmail on Thunderbird. Enigmail is a data encryption and decryption extension for Mozilla Thunderbird that allows you to use OpenPGP to encrypt and digitally sign your emails as well as decrypt and verify email messages you receive. In order to use Enigmail, ensure that you have...

Top 10 Colleges with Cyber Security Programs

0
Choosing a university is important for every student. The rapid changes and innovation in the cybersecurity field serve to make this decision process much more difficult especially for students who want to pursue security courses. Fortunately, most universities around the world are offering degree programs. And this has allowed students to participate in research...

Scan a Web Application Using Acutenix Scanner

0
This guide describes how to scan a web application using Acutenix Scanner. If you need to learn how to install Acutenix trial edition on Ubuntu 18.04, check the link below; How to Install Acutenix on Ubuntu 18.04 Scan a Web Application Using Acutenix Scanner In this guide, we are going to demonstrate how to scan a web application using Acutenix web...

How to Fix QRadar CE failing Gluster 3.8 repos on CentOS-7.3

0
In our previous article, we learnt how to Install IBM Qradar Community Edition on VirtualBox. Installation of QRadar CE 7.30 on CentOS 7 may fail with the error "One of the configured repositories failed (CentOS-7 - Gluster 3.8) and yum doesn't have enough cached data to continue". As a result, this guide presents a simple way on how...

Enable SSH 2-Factor Authentication on Ubuntu 18.04

0
Welcome to our guide on how to enable SSH 2-Factor authentication on Ubuntu 18.04 system. Under normal circumstances, we usually login to a remote system with SSH using either a normal username and password combination or a public key. In order to add another layer of security such that you need to verify who you tell the system you are,...

4 Reasons Why Home and Remote Workers Should Use a VPN

0
Technology has made it easy for people to work from anywhere in the globe, even if they have never met their employers. And while some companies may not consider this option, sometimes employees end up carrying home some unfinished projects or tasks to handle them from there. All these...