Tagged: security

Useful Tricks and Tips ( Know-How )

Disable IPv6 on Linux Here’s how to disable the protocol on a Red Hat-based system: Open a terminal window.Change to the root user.Issue the command sysctl -w net.ipv6.conf.all.disable_ipv6=1Issue the command sysctl -w net.ipv6.conf.default.disable_ipv6=1 To...

Securing Amazon EC2 Instances

Amazon EC2 can be interpreted as the fully managed virtual machines in the cloud. Once your resource leaves the internal secured premise of your company, it gets automatically vulnerable to external threads and virus....

Managing User Accounts on Your Linux Instance

Each Linux instance type launches with a default Linux system user account. For Amazon Linux 2 or the Amazon Linux AMI, the user name is ec2-user. For Centos, the user name is centos. For Debian, the...

Apache as forward/reverse proxy server

Apache HTTPD and NGINX are some of the famous names in the world of open source for proxy solutions. What exactly does the term web proxy mean? It is something of a cross between...

MAC Flooding & Port Security

What is MAC Flooding? In computer networking, a media access control attack or MAC flooding is a technique employed to compromise the security of network switches. The attack works by forcing legitimate MAC table contents out of the switch and forcing a unicast...

error: Content is protected !!