- # engineering# security
How I use GPG in my day to day workflows
GPG is a powerful tool that allows you to encrypt and sign your data and communications. In this post, I will explain how I use GPG in my day to day workflows.
- # engineering# security
What is GPG and why you should start using it
GPG is a tool that allows you to encrypt and sign your data and communications. In this post, I will explain what GPG is and why you should start using it in your workflows if you aren't already.
- # security
The Dangers Lurking in Free Public WiFi
Picture this: you're sitting at a cozy cafΓ©, sipping on your latte, and surfing the internet on the free public WiFi. Seems harmless, right? But hold on a sec β let's talk about the not-so-friendly company you're sharing that network with. Join me as we unravel the risks of using that enticing, but potentially treacherous, free public WiFi.
- # security
Mastering App Security: 7 Crucial Risks Every Developer Must Mitigate
In the world of software development, ensuring the security of your applications is paramount. From protecting user data to safeguarding against malicious attacks, developers must be aware of the potential risks and take proactive measures to mitigate them. In this comprehensive guide, we will explore seven key security risks that every developer should know when building their app. Get ready to enhance your app's resilience and protect your users' sensitive information.
- # linux# security
Exploding your system: The deadly Fork Bomb in Linux
Are you familiar with the term 'fork bomb' in Linux? If not, it is a potentially dangerous command that can severely impact system performance and stability. In this article, we will explore what a fork bomb is, how it works, and how to protect your Linux system from its harmful effects.
- # security
Zero Day Attacks: Understanding the Unannounced Threats
Discover the dangerous world of zero day attacks and learn how they can exploit vulnerabilities in software to cause harm to businesses and individuals alike. From the definition to real-life examples, this article covers all you need to know about zero day attacks.
- # security
Denial of Service Attacks: What They Are and How to Protect Against Them
Discover the basics of Denial of Service (DoS) attacks and learn how to safeguard your website and online presence from these malicious attacks.
- # linux# security
Stay Secure β Essential SSH Security Practices for Linux Servers
Protect your Linux server from potential threats by following best practices for SSH security. Learn about using strong passwords, disabling root login, enabling public key authentication, and more in our comprehensive guide.
- # linux# security
Protect Your Linux Server with UFW Firewall: A Step-by-Step Guide
Ensure the security of your Linux server by setting up a firewall. UFW (Uncomplicated Firewall) is a user-friendly firewall that's easy to set up and configure. In this guide, we'll walk you through the process of installing UFW, creating firewall rules, and managing firewall rules in Linux.
- # cloudflare# security
How to protect your website from attacks using Cloudflare WAF and Rate Limiting
In this article, I will explain how I was able to protect my website from attackers and how you can too using Cloudflare WAF and rate limiting.
- # security
Add a Honeypot in your Forms to avoid Spam Submissions
Learn how to quickly add a spam filter to reduce spam submissions in any of your forms on your website.