| by Arround The Web

How to Use Two-Factor Authentication with Ubuntu

The post How to Use Two-Factor Authentication with Ubuntu first appeared on Tecmint: Linux Howtos, Tutorials & Guides .
Over time, the traditional username and password authentication has proven inadequate in providing robust security to applications a…

Share Button
Read More
| by Scott Kilroy

How to Enable Automatic Updates on Ubuntu 20.04

The post How to Enable Automatic Updates on Ubuntu 20.04 appeared first on LinOxide.

Share Button
Read More
| by Scott Kilroy

How to Install GVM Vulnerability Scanner on Ubuntu 20.04

The post How to Install GVM Vulnerability Scanner on Ubuntu 20.04 appeared first on LinOxide.

Share Button
Read More
| by Scott Kilroy

How to Install GVM Vulnerability Scanner on Ubuntu 20.04

The post How to Install GVM Vulnerability Scanner on Ubuntu 20.04 appeared first on LinOxide.

Share Button
Read More
| by Scott Kilroy

How To Install Kali Linux in Virtualbox

In our previous article, we have discussed about how to download the kali linux image file and how to install virtualbox. Now let’s get you started with the virtual machine. Step 01 : Open Virtualbox VirtualBox should open once it has installed. Now you should be greeted by the VirtualBox Manager Step 02 : Create […]

The post How To Install Kali Linux in Virtualbox appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Kali Linux : The OS That Hackers Use

If you are familiar with cyber security stuff, you must have heard about kali linux. Kali linux is a operating system developed by offensive security and it was specifically targeted for penetration testers. This linux distribution is built on Debian and it comes pre installed with many more security tools. In this guide, we will […]

The post Kali Linux : The OS That Hackers Use appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Debsecan : You will not miss another security update

Do you ever wonder how to keep up with the new security updates releasing daily? Debsecan is a great tool that you can use to simplify this task. This utility will help you to evaluate your current security status without searching for the new security updates manually. And also it comes with the feature to […]

The post Debsecan : You will not miss another security update appeared first on The Linux Juggernaut.

Share Button
Read More
| by Arround The Web

Install and Configure StrongSwan VPN on Ubuntu 20.04

A virtual private network is used to create a private network from a public internet connection to protect your identity. VPN uses an encrypted tunnel to send and receive the data securely. strongSwan is one of the most famous VPN […]
The post Instal…

Share Button
Read More
| by Scott Kilroy

A guide to Setting advanced file permissions in linux

In our previous post, we have discussed about how to set the standard file permissions in our linux system. In this guide we will see how to set more advanced permissions to our files. sticky bit on directory You can set the sticky bit on a directory to prevent users from removing files that they […]

The post A guide to Setting advanced file permissions in linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

How to set standard file permissions in linux

Linux operating system allows multiple users to work on the same system simultaneously without disrupting each other. Because of this feature, Individuals sharing access to files pose a risk exposing classified information or even data loss if other users access their files or directories. To address this, we can specify how much power each user […]

The post How to set standard file permissions in linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

How to manage ownership of files in linux

In Linux operating system, there are three types of owners; User: A user is the one who created the file. By default, whosoever, creates the file becomes the owner of the file. A user can create, delete, or modify the file. Group: A group can contain multiple users. All the users belonging to a group have same […]

The post How to manage ownership of files in linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

3 ways to create and secure passwords in linux

In this guide, Three methods for setting passwords are explained; Using the passwd command Using openssl Using the crypt function in a C program passwd Passwords of users can be set with the passwd command. Users will have to provide their old password before twice entering the new one. As you can see, the passwd […]

The post 3 ways to create and secure passwords in linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

How to check who’s logged in to your linux machine

If you have a linux server, It is absolutely necessary to know how to check the users that are logged in to your system and what they are doing. To do that, you have to get yourself familiar with number of different linux commands. In this guide, we will show you how to identify the […]

The post How to check who’s logged in to your linux machine appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Encrypting directories with eCryptfs in linux

eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux. It is derived from Erez Zadok’s Cryptfs, implemented through the FiST framework for generating stacked filesystems. eCryptfs extends Cryptfs to provide advanced key management and policy features. eCryptfs is already included in the official Ubuntu repositories and encrypting directories is a simple matter of mounting […]

The post Encrypting directories with eCryptfs in linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Encrypting files in linux

You may work for a super-secret government agency, or you may be just a regular citizen. Either way, you still have sensitive data in your linux system that you need to protect from prying eyes. For that, we can use GNU Privacy Guard to encrypt or cryptographically sign files or messages in our linux machine. […]

The post Encrypting files in linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Create Snapshot backups using Timeshift in linux

Timeshift is a linux application that we can use to create snapshots in our linux system,. If something bad happens to our linux system (For an example, all the system files and settings are deleted after cyber attack) we can use the snapshot that we create using timeshift to restore the system back and undo […]

The post Create Snapshot backups using Timeshift in linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Auditing network services with netstat in linux

The following are two reasons why you would want to keep track of what network services are running on your system: To ensure that no legitimate network services that you don’t need are running To ensure that you don’t have any malware that’s listening for network connections from its master You can use the following […]

The post Auditing network services with netstat in linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Web server scanning with Nikto in Linux

Nikto is a special-purpose tool with only one purpose; that is, it’s meant to scan web servers, and only web servers. It’s easy to install, easy to use, and capable of doing a comprehensive scan of a web server fairly quickly. Nikto is built on LibWhisker2 (by RFP) and can run on any platform which […]

The post Web server scanning with Nikto in Linux appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Linux log review with logwatch

You know how important it is to do a daily log review. But you also know how much of a drag it is, and that you’d rather take a severe beating. Fortunately, there are various utilities that can make the job easier. Of the various choices in the normal Linux distro repositories, Logwatch is a […]

The post Linux log review with logwatch appeared first on The Linux Juggernaut.

Share Button
Read More
| by Scott Kilroy

Collect logs with journald in linux

You’ll find the journald logging system on any Linux distro that uses the systemd ecosystem. Instead of sending its messages to text files, journald sends messages to binary files. Instead of using normal Linux text file utilities to extract information, you have to use the journalctl utility. #journalctl To view the journald log file in […]

The post Collect logs with journald in linux appeared first on The Linux Juggernaut.

Share Button
Read More
  • 1
  • 2