What Should Companies Do To Increase IT Safety
With cyber threats at an all-time high, IT security is a top priority for businesses of all sizes. Everyone inherits a responsibility to protect confidential
With cyber threats at an all-time high, IT security is a top priority for businesses of all sizes. Everyone inherits a responsibility to protect confidential
Follow through this tutorial to learn how to configure Ubuntu 20.04 as Linux router. Linux is awesome, It can function as “anything”, -:). Just like
In this guide, you will learn how to install and setup GVM 20.08 on Debian 10. Greenbone Vulnerability Management (GVM), previously known as OpenVAS, is a network
In this tutorial, you will learn how to enable basic authentication on ELK stack. Elastic/ELK stack supports user authentication. This enables it to restrict access
In this guide, you will learn how to install GVM 21.04 on Debian 11/Debian 10. Greenbone Vulnerability Management (GVM), previously known as OpenVAS, is a network security scanner which
In this tutorial, you will learn how to install Wazuh agent on Rocky Linux 8. Our previous setup was on setting up Wazuh server with
In this tutorial, you will learn how to install Bitwarden password manager on Ubuntu 22.04. Bitwarden is an “open-source password manager which provides an easiest and safest way
This is a quick tutorial on how to configure OpenVPN clients to use specific DNS server. OpenVPN server can be configured to enable the clients
In this tutorial, we are going to learn how to add and scan a target host for any vulnerability using OpenVAS Scanner. Want to use
A VPN (a virtual private network) makes it possible to use the internet and connect to websites without revealing your identity or location. It gives