security

The complete guide for NMAP Command

Nmap is one of the most popular free and open-source command-line utility network scannings. Nmap can be used to discover hosts and services use by the system on the same network.

A Nmap tool helps you to audit local and remote server open ports and the network details.

It is available in all major operating systems such as Windows, Linux, and macOS. There is another nmap product known as zenmap, which is GUI based version of nmap.

How to Change the SSH Port in Linux

By default, SSH listens on port 22. Changing the default SSH port adds an extra layer of security to your server by reducing the risk of automated attacks.
Instead of changing the port is much simpler and secure to configure your firewall to allow access to port 22 only from specific hosts. Learn More

Containers or virtual machines: ​Which is more secure? The answer will surprise you

Are virtual machines (VM) more secure than containers? You may think you know the answer, but IBM Research has found containers can be as secure, or more secure, than VMs.

James Bottomley, an IBM Research Distinguished Engineer and top Linux kernel developer, writes:

Shell Scripting and Security

Today the online world is quite a bit different, and a quick glimpse at the news demonstrates that it's not just global, but that bad actors, as they say in security circles, are online and have access to your system too. The idea that any device that's online is vulnerable is more true now than at any previous time in computing history.

How Red Hat Is Dealing With the Spectre of the CPU Meltdown

By now there's probably no one who follows tech even a little who hasn't heard about Meltdown and Spectre, two related security vulnerabilities that differ from garden variety security issues because they're hardware and not software vulnerabilities. They're also notable because they're built into just about every CPU that's been manufactured for decades.Read More.

Subscribe to RSS - security