Cyber Security… Linux Log Files | LSB 1 Dec 20174 Dec 2017 I am a new Linux user. I would like to know where are the log files located under Debian/Ubuntu or CentOS/RHEL/Fedora Linux server? How do I open or view log…
Cyber Security… Create an effective business continuity plan 25 Nov 2017 A business continuity plan outlines procedures and instructions an organization must follow in the face of disaster, whether fire, flood or cyberattack. Here's how to create one that gives your…
Cloud Security… Create Your Own VPN with AWS 24 Nov 201723 May 2019 Internet users are spoiled for choice when it comes to VPN services, but they either require a monthly subscription, aren’t secure, or are just plain slow. Thankfully, alternatives do exist.…
Cyber Security… LSB Afilliate Programs 22 Nov 201728 Nov 2017 I thank each and every one of you for visiting my blog, you are the reason we are still able to keep LSB alive. As you may or may not…
AppSec… Exploiting CSRF under NoScript Conditions 22 Nov 201716 Mar 2019 CSRFs -- or Cross-Site Request Forgery vulnerabilities -- occur when a server accepts requests that can be “spoofed” from a site running on a different domain. The attack goes something like this:…
Dark Net… Best Darkweb Links 20 Nov 201724 Jul 2020 Disclaimer: We are not responsible for anything you may access or view on the darkweb. This post is for educational purposes. Please be cautious and enter at your own risk,…
AppSec… A Guide to Not Getting Hacked 20 Nov 20175 Mar 2019 Hackers steal hundreds of millions of passwords in one swoop and occasionally cause large-scale blackouts. The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks, smart home robots that could kill…
Cyber Security… Best firewalls for business 16 Nov 201716 Nov 2017 "There are countless options to choose from when considering firewall protection. Should you invest in an external firewall, stick with a virtual firewall or take the plunge with both? The…