Brian Kingsolodev.app·Dec 11, 2024SSH Setup for Ubuntu 24.04 LTS.TL;DR. SSH Setup for Ubuntu 24.04 LTS involves installing and configuring OpenSSH Server on the remote server, generating an RSA key pair on the local system, and uploading the local, public key to the remote system for secure, password-less authenti...The Ops SeriesUbuntu 24.04
Weskillweskill.hashnode.dev·Dec 8, 2024Cyber Security and Its Importance in Today's WorldIn the rapidly advancing digital age, cyber security has emerged as one of the most critical concerns for businesses, governments, and individuals alike. As technology evolves, so do the threats targeting our online environments. From personal data b...cyber security
Brian Kingsolodev.app·Dec 8, 2024Security and Hardening for Ubuntu 24.04 LTS.TL;DR. This post provides a comprehensive guide to securing and hardening an Ubuntu 24.04 LTS system. It covers essential steps such as updating the system, configuring unattended upgrades, setting up a firewall with UFW, installing Fail2Ban to preve...The Ops SeriesUbuntu Security
Opara Blessingoparablessing.hashnode.dev·Nov 27, 2024Top 10 Cybersecurity Best Practices to Protect Yourself in the Digital AgeIntroduction: In today’s digital world, cybersecurity is more critical than ever. With the rise of cyber threats like hacking, identity theft, and data breaches, protecting your online presence is no longer optional it’s a necessity. From individuals...#cybersecurity
Mobile Securitymobilesecurity.hashnode.dev·Nov 15, 2024The Importance of Cybersecurity Blogs: Staying Informed in a Digital WorldIn today’s digital age, cybersecurity has become one of the most critical components for both individuals and businesses. With increasing threats to online security, such as data breaches, phishing scams, and malware attacks, staying updated on cyber...cyber security
Kratika Saraswatkratikasaraswatblogs.hashnode.dev·Nov 12, 2024Cybersecurity 101: Essential Tips for Staying Safe Online1. Use Strong, Unique Passwords A weak password is one of the easiest ways for cybercriminals to access your accounts. Here’s how to make sure your passwords are as strong as possible: Use Long, Complex Combinations: A strong password should be at l...cybersecurity
Mostafaflance4u.hashnode.dev·Nov 8, 2024What is Cybersecurity?Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks, damage, or unauthorized access. The goal of cybersecurity is to ensure the confidentiality, integrity, and availability (often abbreviated as CIA...#cybersecurity
Isuka sanujisuk4.hashnode.dev·Oct 31, 2024PHP Object Injection | POIDo you know this serialized object can destroy a web O:6:"Person":2:{s:4:"name";s:5:"Alice";s:3:"age";i:25;} Huh?Its nothing seems to be dangerous but things like this O:6:"Person":2:{s:4:"name";s:15:"evil_function()";s:3:"age";i:25;} So first of a...webdev
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Oct 28, 2024Tools You Can Use for Open Source Intelligence (OSINT) GatheringWelcome to the world of Open-Source Intelligence (OSINT). OSINT is all about gathering public information from various online sources. OSINT can come from social media, websites, search engines, and even public databases. You’d be surprised at how mu...cyber security
Victor Uzoagbacyberfriend.hashnode.dev·Oct 23, 2024Zero Trust Architecture: Advantages and Challenges in ImplementationIntroduction As changes are taking place regarding the digital platform, conventional security models cannot cope with the threats that prevail today. Perimeter-based security relies primarily on the proposition that threats from outside an organizat...securityawareness