Monitor Changes to Critical Files on Windows Systems using Wazuh and ELK
In this tutorial, you will learn how to monitor changes to critical files on Windows systems using Wazuh and ELK Stack. File operations are logged
In this tutorial, you will learn how to monitor changes to critical files on Windows systems using Wazuh and ELK Stack. File operations are logged
In this guide, we are going to learn how to configure LibModsecurity with Nginx on CentOS 8. LibMosecurity is the newest version of ModSecurity version
In this tutorial, you will learn how to install and configure AIDE on Ubuntu 20.04. AIDE stands for Advanced Intrusion Detection Environment. AIDE is an intrusion detection system that detects
In this tutorial, we are going to learn how to install and setup Squid Proxy on Debian 11/Debian 10. Squid is a full-featured web proxy cache
Nothing is more frustrating than investing in a service that doesn’t meet your expectations. Penetration testing is an important step in ensuring the security of
In this tutorial, you will learn how to enable self-service password reset in Request Tracker (RT). By default, RT doesn’t ship with a built-in password
In this tutorial, you will learn how to analyze PCAP files using Malcolm network traffic analysis tool. Malcolm can be used to analyze offline full
In this guide, we are going to learn how to setup IPSec VPN using StrongSwan on Debian 10. StrongSwan is an opensource VPN software for
In this tutorial, we are going to learn how to install and use ClamAV on Ubuntu 20.04. ClamAV is an open source antivirus engine for
If you’re looking for a VPN service that’s easy to use, then you should consider ExpressVPN. This service has been designed to be user-friendly, and