[Tips] Securing your Linux System
As a system administrator, the periodic system, a comprehensive security check is very important. On this post, I am going to share some tips for securing your Linux system. Whether...
As a system administrator, the periodic system, a comprehensive security check is very important. On this post, I am going to share some tips for securing your Linux system. Whether...
Ways to protect Web-server, there are so many. Starting with the need to protect and hide the update versions of the used software. Then you can set the WAF ( the Web the Application the Firewall ) –...
Traditional network security technologies focus on systems intrusion detection, anti-virus or firewall software. What about internal security? Network security configuration, the switches and routers is very important, in the ISO...
Introduction to SNMP Simple Network Management Protocol (SNMP), consisting of a set of network management standards, contains an application layer protocol, a database schema, and a set of data objects....
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.The best known example application is for remote login to computer systems by users....
by do son · Published December 17, 2016 · Last modified November 4, 2024
Shodan, the official definition of himself Computer Search Engine (Computer Resource Search Engine), is American man John Mase Li spent nearly 10 years to build a search engine that can...
Tips and Tricks / Web Exploitation / Web Vulnerability Analysis / WebApp PenTest
by do son · Published December 12, 2016 · Last modified November 4, 2024
Introduction The Tor Browser is the official web browser of the Tor Project. Its design focuses on allowing the user to browse the web with a high level of anonymity....
Transparent Proxy through TOR, I2P, Privoxy, Polipo and modify DNS, for a simple and better privacy and security; Include Anonymizing Relay Monitor (arm), macchanger, hostname and wipe (Cleans ram/cache &...
OSINT framework focused on gathering information from free tools or resources. The intention is to help people find OSINT resources that return free information. Some of the sites included my...
Linux commands for viewing system information root@ddos:~# cat /proc/cpuinfo root@ddos:~# cat /proc/meminfo root@ddos:~# more /proc/cpuinfo | grep “model name” getconf LONG_BIT root@ddos:~# getconf LONG_BIT 64 root@ddos:~# free -m root@ddos:~# free...
[root@ddos ~]# mysql -u root -p Enter password: ERROR 1040 (00000): Too many connections [root@ddos ~]# vi /etc/my.cnf max_connections=1000 max_user_connections=300 [root@ddos ~]# service mysqld stop Shutting down MySQL…....
Your server appearing pretty slow could be many things from wrong configs, scripts and dodgy hardware – but sometimes it could be because someone is flooding your server with traffic...