Spyware – Security

Read all posts Tagged for this section

StartSSL Distrusted, Migrate to LetsEncrypt!

TRUST is the word that comes to our mind when we speak about Certificate Authority. StartSSL, a certificate authority that provides free SSL certificate with a validity of one year for non-commercial use. An initiative that aimed to secure the internet traffic has now ...

Setup command in CentOS 7 throws Error – FirewallD is active, please use firewall-cmd!

I generally use setup or system-config-firewall commands to configure firewall in CentOS machines. But the same commands in CentOS 7 failed with an error message ERROR: FirewallD is active, please use firewall-cmd. $setup ERROR: FirewallD is active, please use firewall-cmd. ...

How to Disable Annoying Banners/Ads in uTorrent Windows Application

Annoyed of advertisement banners in uTorrent application? It's quite easy to disable it. All you need to do is, click on the Settings gear icon to open Preferences dialog and click Advanced from the tree menu in the left sidebar. ...

How to Disable/Remove Banner Ads in Skype app for Windows?

The Skype app for Windows was updated and the new banner ads started appearing and the worse part is there's no option in the Settings to disable it completely. The banner ads appears in the sidebar when 'Compact Sidebar View' ...

How to Prevent Twitter Apps from Posting Tweets?

How annoying when you see a tweet posted on to your profile without your permission? My friend does not tweet much, but at least once in two months I see a tweet posted on her account that says "I have been on ...

How to get rid of Annoying Ads on Charging screen in Android?

Are you seeing a charging screen with an advertisement while your Android device is charging? It could be possible that your device is installed with a malicious app that might be pushing ads. When you download and install an application from Google ...

How to Fix DROWN Vulnerability in Apache/NGINX Web server and SMTP?

Here's a latest vulnerability called DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) that aims to attack servers using weak SSL version 2.0 (SSLv2) protocol for HTTPs, SMTP, IMAP, POP etc...Basically any service that uses SSL/TLS is subject ...

6 Ways to Stop Microsoft From Spying What you do in Windows 10!

Windows 10 is a huge hit, says Internet and reports from Microsoft. But wait, there are few serious bugs and privacy concerns surrounding Windows 10. I recently came across an article, that says Microsoft is monitoring everything you do with ...

How to Check if SSL Certificate is SHA1 or SHA2 using OpenSSL?

Question: How to check if a particular website is using SHA1 or SHA2 Certificate? I would like to know the steps to check via web browsers and also using OpenSSL commands. How to check Signature Algorithm of SSL certificate using OpenSSL Command? The ...

vps germany

How to Convert PPK File to OpenSSH Keys and Login using SSH in Linux?

Question: Thanks for the tutorial on "How to login to Linux instance using keys". I used PPK key file via PuTTy to login to my Linux instance. Could you tell me how to convert PPK file into OpenSSH keys format, ...

How to Disable LogWatch Email Reports in CentOS/RHEL/Fedora?

I have been using LogWatch on my CentOS box to monitor Kernel errors, mailbox usage, disk usage, refused SSH connections, HTTP errors, sudo usage etc...(checkout this tutorial to Configure LogWatch). I have also configured it to generate daily reports ...

How to Check if Bash has Shellshock Vulnerability?

Shellshock vulnerability was found during the late 2014 (to be precise, the impact was posted on CVE-2014-6271 on 24 September 2014). Later an update was released in bash version 4.1.2-15 with a fix for Shellshock vulnerability. Well, the entire world ...

Block Out Spam Referral Traffic from qualitymarketzone.com in Google Analytics

Less than a month ago, I wrote few articles on Ghost spams and how to block an unwanted web traffic via spam referrals. Today, I saw another spam referral in Google analytics - this time, the spammer is ...

How to Scan your Linux Box for Trojan, Malware and Virus using ClamAV

This tutorial will take you through the ClamAV installation on CentOS, which can help you to detect Virus, Malware, Trojans and other malicious threats on your Linux machine. Before we get into the installation steps, I'll quickly brief you about ...

7 Ways to Detect Virtualization from your VM [Xen,VirtualBox,KVM,OpenStack with KVM]

At Techglimpse we frequently receive mails from our readers asking us to write a tutorial on 'Virtualization Detection' from a VPS or a Virtual machine. However, we were not able to respond to those emails immediately, as we didn't have a test ...

Did you Enable Bot Filtering in Google Analytics?

For the past couple of months, my website received huge number of traffic from bots, spams referrals and unusual direct visits  - check out my articles on blocking clictune and WeSEE_Bot. During the process of fixing those, I ...

What goes around comes back around – Ashley Madison cheating on her users!

While your social media is taunting you with pictures of your once insane batch mates and friends taking a plunge into sanity by tying a knot with another ex-insanitie (two negatives make a positive), people who’ve long taken the route and ...

When Silicon Valley is Bogged Down with Evils, Witch Joey Talley comes to the Rescue!

We all are bound by limitations and therefore, words like evolution and discovery trail half-baked cakes like us everywhere. We haven't found it all and maybe, (I am dead sure of that) we would never ever find it all (as Christine ...

  1. Pages:
  2. 1
  3. 2
  4. 3
  5. ...
  6. 8