• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » security

By Abhishek Ghosh July 12, 2017 8:38 am Updated on July 12, 2017

How To Install Metasploit on Ubuntu 16.04 LTS To Test Security

White hat or Black hat, hacking demands good grasp of all sysadmin works. The usage style we show on this website are intended for testing security of own servers - that is white hat way. We have a list of essential security tools for GNU/Linux servers. Metasploit framework needs Ruby, Postgre SQL, Java etc. Here is how to install Metasploit on Ubuntu 16.04 LTS to test security of servers. Off … [Read more...]

By Abhishek Ghosh May 24, 2017 6:06 pm Updated on May 24, 2017

How To Install, Configure & Run Malware Detect (maldet) On Linux Server

Previously, we talked about a bunch of anti malware for GNU/Linux servers. That list essentially was for the purpose of our future guides around those softwares. Here is a step by step complete guide on how to install, configure & run malware detect (maldet) on linux server with Ubuntu server commands as example. Reader needs not much experience to get used and work. Again - Linux Malware … [Read more...]

By Abhishek Ghosh May 24, 2017 6:13 am Updated on October 16, 2021

List Of Anti Malware For GNU/Linux Server

We noticed that we need to deliver guides around some known things which are possibly not known to the new users. Somehow, many we missed talking about them since the year 2010. Anti Malware is not a fully correct phrase for Linux but the meaning is obvious. Here is a usable list of Anti-malware for GNU/Linux server. Malware is a program that aims to disrupt the normal operation of a server. … [Read more...]

By Abhishek Ghosh May 20, 2017 9:28 am Updated on May 20, 2017

Wannacrypt Ransomware : Security Alert

Once again we should give thanks to Edward Snowden. WannaCry ransomware is a global attack. Wannacrypt encrypts whatever files it can find. After infecting, Wannacry ransomware possibly will display a screen on the infected system asking for $300 to $600 worth of Bitcoins to decrypt. Wannacrypt ransomware originated from NSA and now waiving the flag of Governmental democratic nuisance. It is not … [Read more...]

By Abhishek Ghosh April 17, 2017 11:01 am Updated on April 17, 2017

New Security Header : Expect CT Header Nginx Directive

At least Chrome going to require all certificates issued in October 2017 and onward will have to be logged in Certificate Transparency logs. That Certificate Transparency is via expect CT Header declaration. This guide shows deployment of Expect CT Header as Nginx directive. As we are not machines, we will talk a little bit on Certificate Transparency.   Where From This Expect CT … [Read more...]

By Abhishek Ghosh April 13, 2017 10:47 am Updated on April 13, 2017

HTTPS Everywhere Atlas Vs HSTS Preload List

SSL rather TLS has been available to all after Let's Encrypt (project is certbot now) project became usable. In This Article We Have Explained Real Life Matters Around HTTPS Everywhere Atlas Vs HSTS Preload List For the WebMasters and Developers. We talked around Nginx configuration for HSTS, but with time things need update.   HTTPS Everywhere Atlas Vs HSTS Preload List in … [Read more...]

By Abhishek Ghosh April 7, 2017 4:49 am Updated on April 7, 2017

What is CAA DNS Record And How to Add?

A decision of CA/Browser Forum taken in March 2017 by vote to make CAA mandatory which be in action by September 2017. Here is our guide around CAA DNS Record and how to add CAA DNS Record. Previously we discussed about DNS-based Authentication of Named Entities – DANE and how to add DANE. CAA stands for Certification Authority Authorization.   What is CAA DNS Record?   In this … [Read more...]

By Abhishek Ghosh March 6, 2017 7:21 am Updated on March 6, 2017

Secure Hash Algorithm 1 (SHA-1) Circumvented by Google

Around 2 years back we talk about how to upgrade to SHA-256 and ECC SSL (ECDSA) certificate for the TLS/SSL certificate users. Secure Hash Algorithm 1 is a Cryptographic hashing function. Secure Hash Algorithm 1 (SHA-1) is Circumvented by Google Research For Testing Vulnerability. Some researchers theorised vulnerabilities of SHA-1 from 2005 and now have been exploited for the first time with an … [Read more...]

By Abhishek Ghosh February 3, 2017 7:15 am Updated on February 3, 2017

New Firefox, Chrome Will Warn Non-HTTPS Websites as Insecure

The idea of adding some warning for the non-HTTPS websites is not new, it was planned from 2014. As Expected, From First Half of 2017, New Versions of Firefox & Chrome Will Warn Non-HTTPS Websites as Insecure. After availability of Free Let's Encrypt SSL certificate as well as low cost DV SSL (read the comparison of Free Let's Encrypt SSL with paid DV SSL), there can not be much reasons for … [Read more...]

By Abhishek Ghosh August 18, 2016 6:11 pm Updated on August 18, 2016

Warning : TCP Stack Vulnerability in the Linux Kernel (CVE-2016-5696)

Researchers at the University of California have identified a dangerous vulnerability in the TCP (Transmission Control Protocol) used by Linux. The finding of flaw dates back to the end of 2012 but was discovered only recently. They are working with the community for some preventive measures (like an update for clients and hosts) as a pending official patch. The TCP protocol adopted by Linux is … [Read more...]

By Abhishek Ghosh July 2, 2015 7:20 am Updated on July 2, 2015

Keybase.io : Definitely a Great Idea From Security POV

Keybase.io Definitely a Great Idea From Security Point of View. At least none really ever attempted a well designed website with GUI with PGP. Few weeks back, Author of this article received invitation for joining KeyBase.io. If you are wondering about what is KeyBase.io, short answer - it is a kind of hub of peoples who are usually invited and has to do with coding and has minimum idea about the … [Read more...]

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 52
  • Next Page »

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023
  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023
  • What is a Data Mesh? January 25, 2023

About This Article

Cite this article as: Abhishek Ghosh, "," in The Customize Windows, , February 2, 2023, .

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT