Introduction With the increasing use of technology and the internet, industries are becoming more vulnerable to cyber...
Linux Network Articles
Cloud-specific security considerations
As businesses continue to migrate to the cloud, security concerns remain at the forefront of everyone's mind. With the...
Why do I need to secure my Linux hosts?
Linux is an open-source operating system that powers millions of devices, from smartphones and laptops to web servers...
Removing our Firewall Configuration in Linux
A firewall is a critical aspect of security for a Linux system. It acts as a barrier between a computer system and the...
nftables basic configuration
Introduction Nftables is a firewall and packet filtering system that replaces iptables in Linux. It provides a clean...
Configuring nftables
Introduction The world of networking and firewalls is constantly changing and evolving, with new tools and...
The mangle table
Introduction The mangle table is a unique and practical piece of furniture that has been around for centuries. It’s a...
The NAT table
Have you ever wondered how internet service providers (ISPs) manage to connect multiple devices to the internet using...
Configuring iptables
What is iptables? iptables is a powerful firewall tool for Linux, it is the firewall that is pre-installed in most...
Layer 4 – TCP and the three-way handshake
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol (IP) suite and operates...
Remote port enumeration using native tools
Introduction When it comes to security assessments and penetration testing, one of the most critical steps is...
Remote port and service enumeration – nmap
As the internet continues to grow, so does the number of devices and services that are connected to it. It's essential...