Secure your website

Nowadays, websites are necessary for most of the businesses and especially in e-commerce. Every attacker knows that your site holds customers data. You’ve worked hard on your site (and your brand) – so take some time to secure it. You should do the following steps to ensure your website is Read more…

 101 total views,  2 views today

Most commonly Used Linux Commands

Most commonly Used Linux Commands Basic linux commands with examples tar command examples Create a new tar archive. $ tar cvf archive_name.tar dirname/ Extract from an existing tar archive. $ tar xvf archive_name.tar View an existing tar archive. $ tar tvf archive_name.tar grep command examples Search for a given string Read more…

 216 total views,  1 views today

Best Firewalls For Linux

Firewalls For Linux To Protect Your Network   Linux is quite possibly the only open-source project that has managed to change the world at a very large scale. It is on your phones as Android, it is on the millions of servers that run the internet itself and also it is Read more…

 87 total views

HoneyPot & HoneyNet

Virtual attack and defense system   A honeypot is a term used to describe a computer or network setup with the purpose of attracting computer hackers. These computers allow a system administrator or security expert to analyze how a computer hacker may attempt to hack a network without risking the Read more…

 92 total views

T-UI Launcher

Turns Android Device into Linux Command Line Interface   Are you a command line guru, or do you simply want to make your Android device unusable for friends and family, then check out T-UI Launcher app. Unix/Linux users will definitely love this. T-UI Launcher is a free lightweight Android app Read more…

 52 total views