How to Monitor your web server bandwidth usage with vnstat To use nethogs on a Ubuntu/Debian server or desktop it is easy. First start by installing it using the command: apt-get install -y nethogs The you can use it this way: # Start nethogs on the default network interface nethogs # Specify which network interface […]
Category Archives: Security
How to Prevent IP Spoofing on linux Open a Terminal and enter the following : sudo vi /etc/host.conf Add or edit the following lines : order bind,hosts nospoof on
HOw to Protect su by limiting access only to admin group. To limit the use of su by admin users only we need to create an admin group, then add users and limit the use of su to the admin group. Add a admin group to the system and add your own admin username to […]
SSH Hardening – disable root login and change port. The easiest way to secure SSH is to disable root login and change the SSH port to something different than the standard port 22. Before disabling the root login create a new SSH user and make sure the user belongs to the admin group . If […]
Facebook developed an experimental feature called “Dark Profiles” which would give secret accounts to people who did not even sign up, a new book by a former employee of the social networking site has claimed. Engineers wanted to create shadow pages for those who were tagged in photos by their friends in the hope they […]
Virtual Machine for Android Reverse Engineering Do you need to analyze a piece of Android malware, but dont have all your analysis tools with your machine ?The Android Reverse Engineering (A.R.E.) Virtual Machine, put together by Anthony Desnos , is here to help. A.R.E. combines the latest Android malware analysis tools in a readily […]
The Federal Bureau of Investigation announced Tuesday the arrest of 26 people for allegedly engaging in identity theft and other computer crimes. The arrests were a product of a two-year undercover effort dubbed “Operation Card Shop.” At the heart of the operation was CarderProfit.cc, a fake website for buying and selling credit card numbers that […]
He’s big, he’s bad, and he’s unnerving to face. We all have that terrifying bully at school and the characteristic brow-beater in the playground. But today, harassment doesn’t stop there. With the hoard of teens and tweens moving into cyber space, the world has another breed of bully- the cyber bully! Internet to blame? Cyber […]
Anonymous India‘s protest against Web censorship Cyber-vigilantes to some, terrorists to others, andrecently described as some of the most influential people in the world. The decentralized Anonymous group has been called many things since it rose to prominence in 2008. Four years later it has its eye on India, and later this week, Anonymous India, […]