Bitdefender Antivirus Plus installation tutorial Though antivirus software is very useful, somehow I usually hate installing it on my PC. The reason for this is...
What is Browser Hijacking and How to protect yourself from it? Are you a victim of browser hijacking? May be you are. Browser Hijacking are becoming serious threat to internet users....
Does your mail read that you Won a lottery? Or your Bank account has been compromised? I win frequently in some lottery, get my credit card details changed, get free ransom gift vouchers and job opportunities...
How to install a SSL certificate and configure SSL Support in Nginx We learnt from our previous articles, how to install, configure and run nginx on RHEL/CentOS. Typically, SSL is used to...
Anenigma’s Data Security product – Desktop Safe helps you keep all your files private and protected Security and privacy are the two keywords, which are turning to be trending now-a-days! Anenigma has the Desktop Safe product...
Google and Bing Search Engines show-up sponsored malware on top when you search for “iTunes” Here is a finest example where advertisements go really bad! Someone has got very smart to create ad with high...
How to Encrypt and Decrypt files/folders in Linux using GnuPG Recently one of our reader had a question : “How to encrypt and decrypt few files/folders in Linux preferably CLI...
[Linux]: How to setup LogWatch on CentOs/RHEL/Fedora to monitor System Logs Most of the system administrators find it most difficult in monitoring their system and keep it secured. I must say...
8 Best practices with sudo on Linux – Do’s and Dont’s of sudo All Linux users these days would be familiar with sudo command (stands for “superuser do”). We need to popularize sudo...
Adblock Plus can be used to block even more, not just ads! Would you not be happy if you get tailored results? Suppose you want to buy a laptop and search the...
[Linux] :Top 12 security features to Enable in SSH server ! A couple of ways you can find to access a shell (command line) remotely on most Linux/Unix systems. One of...
[Linux] : How to stop automated bot based SSH attacks ? I’ve seen many a times in my LogWatch report about “Refused incoming connections” from a number of IP’s. These are may be...
Password Protect Secret folders using Anvide Lock Folder for Windows Are you looking for a simple application that can password protect a folder on Windows? I recently came across an...
13 dig command examples to Dig through DNS records Dig, the Domain Information Groper is one of the useful utility to lookup Domain Name System (DNS). The command helps...
How to Test and Validate DNSSEC using dig and Web Tools? Have you enabled DNSSEC on DNS Server? If not, learn how to enable DNSSEC on Bind based DNS Server. Once...
Configuring DNSSEC on Bind 9.8.2 on CentOS, RHEL,Ubuntu and Debian This tutorial will help you to configure DNSSEC on Bind9 (version 9.8.2) on CentOS operating system. However, the procedure will...
Here’s the list of Top Companies who Track you Online to Make Money – Opt Out now! Your Online Privacy has been invaded by the top Internet giants such as Google, Yahoo, Facebook, Twitter and Bing. They...
How to allow or deny remote login to specific user accounts on Linux server If an attacker gains root login to your system, he can do more damage than if he gains normal user...
How to disable or drop Ping (ICMP) packets to your server? [Linux Basics] One of our regular reader at Techglimpse, asked me this question. Question: How can i disable ping requests to my...
A Definitive guide to Secure your Web Server – 50 Best Practices A Web server connected to the internet is often the target of various exploit attempts. Since the pages served by...