Configure CentOS/Rocky/Oracle Linux as a Linux Router
Follow through this guide to learn how to configure CentOS/Rocky/Oracle Linux as a Linux Router. A router is a device that connects two or more
Follow through this guide to learn how to configure CentOS/Rocky/Oracle Linux as a Linux Router. A router is a device that connects two or more
Web proxies have become popular in the past couple of years. With security and privacy becoming more important each day, it’s up to organizations and
In this tutorial, you will learn how to install and configure Snort 3 NIDS on Ubuntu 20.04. Snort is a lightweight network intrusion detection system.
In this tutorial, you will learn how to enable basic authentication on ELK stack. Elastic/ELK stack supports user authentication. This enables it to restrict access
In this tutorial, you will learn how to deploy WordPress using Docker compose. In an ever-evolving digital landscape, where websites serve as essential touch-points for
Nessus Scan policy template is a set of predefined configuration options related to performing a scan. They define specific actions that are performed during a
A VPN (a virtual private network) makes it possible to use the internet and connect to websites without revealing your identity or location. It gives
With cyber threats at an all-time high, IT security is a top priority for businesses of all sizes. Everyone inherits a responsibility to protect confidential
How to check SSL certificate expiration date command line? In this guide, you will learn how to check SSL certificate expiry date from the certificate
In this tutorial, you will learn how to install and configure AIDE on Debian 10. AIDE stands for Advanced Intrusion Detection Environment. AIDE is an intrusion detection system that detects changes