Skip to content
ITNotes ITNotes

From Terminal to Cloud

  • AI
  • DevOps
  • HomeLab
  • Linux
  • Networking
  • Programming
  • AI
  • DevOps
  • HomeLab
  • Linux
  • Networking
  • Programming
Security tutorial - IT technology blog
Posted inSecurity

Linux Incident Response: 6 Months of Battle-Tested Survival Tactics

April 4, 2026
A battle-tested Linux incident response workflow. Learn how to use busybox-static and auditd to detect server breaches and handle high-pressure forensic investigations.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Hardening Ubuntu: Using AppArmor to Sandbox Applications

April 3, 2026
Secure your Ubuntu server with AppArmor. This guide walks you through creating custom profiles, using complain mode for testing, and enforcing kernel-level application sandboxing.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Watching the Hackers: Building an SSH Honeypot with Cowrie

April 3, 2026
I ran an SSH honeypot for six months and captured 50GB of logs. Here is how you can use Cowrie to monitor real-world attackers and improve your Linux security.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Secure Data Deletion on Linux: Why ‘rm’ Isn’t Enough and How to Fix It

April 2, 2026
Think 'rm' deletes your files? Think again. Discover how to use shred, wipe, and dd to permanently erase sensitive data on Linux and why SSDs require a different approach.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Stop the Guesswork: Using Auditd for Linux Incident Response

March 30, 2026
Move beyond basic Linux logging. This guide shows you how to use Auditd to track file modifications and command execution at the kernel level to solve production incidents faster.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Linux File Integrity Monitoring: Catching Stealthy Changes with AIDE

March 30, 2026
Learn how to use AIDE (Advanced Intrusion Detection Environment) for File Integrity Monitoring on Linux. This guide covers setting up a baseline database, detecting unauthorized changes, and automating security reports.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Hashing vs. Encryption: Why MD5, SHA-256, and Base64 Are Not Interchangeable

March 29, 2026
Don't confuse encoding with security. Learn when to use MD5 for checksums, SHA-256 for integrity, and why Base64 is never a substitute for encryption.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Centralized Authentication on Linux with FreeIPA: A Production Guide to User and Group Management

March 29, 2026
FreeIPA gives you centralized Kerberos SSO, LDAP-backed user management, HBAC policies, and sudo rules — all in one stack built for Linux. This guide compares auth approaches, covers the real trade-offs, and walks through a production-ready FreeIPA deployment step by step.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Installing & Configuring ModSecurity WAF for Apache/Nginx Web App Protection

March 29, 2026
Learn how to install and configure ModSecurity WAF for both Apache and Nginx web servers. This guide covers core concepts, detailed setup instructions, and essential best practices to protect your web applications from common cyber threats like SQL injection and XSS.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Building a Fortified Browser: A 6-Month Personal Review for Enhanced Privacy and Malware Defense

March 27, 2026
Significantly enhance your web browser's security and privacy with this practical guide. I'll share my detailed 6-month experience, covering everything from initial setup and essential extensions to advanced configurations and ongoing monitoring for robust malware defense. This article reflects my real-world approach to browser hardening and verification.
Read More

Posts pagination

1 2 3 Next page
Copyright 2026 — ITNotes. All rights reserved.
Privacy Policy | Terms of Service | Contact: [email protected] DMCA.com Protection Status
Scroll to Top