Configuring DNSSEC on Bind 9.8.2 on CentOS, RHEL,Ubuntu and Debian This tutorial will help you to configure DNSSEC on Bind9 (version 9.8.2) on CentOS operating system. However, the procedure will...
Here’s the list of Top Companies who Track you Online to Make Money – Opt Out now! Your Online Privacy has been invaded by the top Internet giants such as Google, Yahoo, Facebook, Twitter and Bing. They...
How to disable or drop Ping (ICMP) packets to your server? [Linux Basics] One of our regular reader at Techglimpse, asked me this question. Question: How can i disable ping requests to my...
How to disable remote login for root user on Linux machine These days by default a user called root would be created on every Linux system. In distros like RHEL, fedora,...
Beginners guide to DNSSEC and how it can secure the Internet This article assumes that you have gone through What is DNS and how it works? Domain Name System (DNS) is...
What is DNS Cache Poisoning? and How you could be trapped by DNS Spoofing? Domain Name System, is one of the important component that works behind Internet. Whenever a user connects to a domain...
20 OpenSSL Commands Examples that you must know OpenSSL is an open source toolkit used to implement the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols....
How to disable or Lock down WordPress user account after Invalid Login attempts? WordPress is the one most popular community driven CMS with thousands of plugins and themes available to transform your website...
How to hide the DNS Server’s software name and its version? [DNS Security] It’s a good practice to hide DNS server’s software name and its version information from resolvers. These information can assist...
How to identify remote DNS server’s software name and its version? As we started writing more about DNS, our readers started asking more queries. One of our regular reader Mr. Fedrick...
How to Password protect Data and Wi-Fi on your Android? Internet Lock App Sometimes you might want to lock Data or Wi-Fi on your Android device. If you are looking to password protect...
How to save Snapchats videos or pictures? Try SnapHack Snapchat is a secret messaging app where users can send images or videos to a controlled list of recipients and...
This is disturbing! The iPhone 5s recognizes nipples, toes, nose and even cats’ paws! Well, seems like you will start loving Apple’s high-tech fingerprint Touch ID sensor! It works well with things far by...
A worm named “Priyanka” is spreading across WhatsApp users – Here’s a fix If you are a big fan of WhatsApp, then beware of this virus named “Priyanka” spreading through your contacts file....
How to block libwww-perl access in Apache webserver to keep away bots,spammers,crackers? The world of hackers, crackers, bots and spammers are keep growing and it has become serious threat to many websites....
What are WordPress Security Keys and Why you should add them in wp-config.php? WordPress Security Keys will make your website tough to hack. These security keys were introduced in WordPress version 2.6. The...
How to remove unnecessary meta tags and data from WordPress pages? If you were wondering how to remove unnecessary meta tags added to HTML source code of your wordpress site, then...
Securely manage your Passwords for all online accounts using LastPass Well, let me ask you a very simple question. How many online accounts do you have? Though the question simple,...
How to fix Cron Authentication Failure error in Linux? Recently I was bogged with an error “Authentication Failure” for all of my cron jobs in Linux. After googling, I...
How to provide Android support remotely using Zikk mobile to mobile app? What’s the use of knowing the technology if you don’t support your loved ones? Sometimes you might be in a...