Linux Filesystem Structure
How the Linux Filesystem is organized
How the Linux Filesystem is organized
How the concept of users works in Linux
Learn the Linux Shell
Here are a few ways to start making money with just your HTML and CSS skills
Most GNU/Linux operating systems come with Python 2 and 3 preinstalled. These versions are usually several releases behind the current version. In this guide, we are going to install a recent Python version without interfering with the default configuration
Store your notes and To-do lists privately
Create encrypted containers for sensitive data
Multi-factor authentication allows a user to log in to a service by presenting additional proof of identity other than the username and password
Host emails for other domains using a Mail-in-a-Box server
Set up a private email server on a VPS
Fileless malware
Set up private DNS in Android 9
DDoS
Zombie computing devices used my hackers to commit illicit activities online
In a password brute force attack, a hacker attempts all possible usernames and passwords to gain illegal access into a system
Phishing techniques and mitigation
Homoglyph attacks
Cryptojacking
Running multiple operating systems concurrently
Get rid of data securely
Evil twin Wi-Fi attacks
Hijacking the address resolution protocol
Verify the file integrity to detect tampering
Auditing servers using lynis
A firewall is a hardware or software device that filters and blocks incoming or outgoing traffic based on a predefined set of rules.
Keep your data safe against unauthorized physical access.