Hello guys, In this tutorial we’ll be discussing how to secure your WiFi from Intruders, Crackers etc. Here’s a list of stuff that we are going to discuss in this tutorial:
- Router Features
- Strong Encryption
- Low WiFi Strength and Proximity
- MAC Filtering
- Strong Password
- Hiding WiFi SSID
- Deactivate WPS
- Upgrading Your Firmware
The first most step towards security is to see whether your device has the appropriate features to make itself secure. As for Routers especially the one’s with WiFi. Security features are a must to avoid intruders to break in and take pleasure of your shit 😛
Always choose a Router which has most of the Security Features, Some of the important one’s I’ll list below:
Continue reading “Securing your WiFi Network”
With the drastic change in technology, machines are getting smaller and feature rich. In other words machines are being made more Portable as per human needs but this concept of Portability has bought a new level of threat to Security. A person can carry a portable computer having installed a penetration testing OS or any other tool on it,to penetrate deep into a company’s network without the device or the person getting detected.
Continue reading “Portability – A new Security Threat”
Setting up a Dev Server on your system can be easy but it can be a security hazard too! Why? Because if you have your server running, a person can access your web server page via your IP which can be dangerous. Anyone inside your local network can access it so as from the INTERNET if your External IP is known.
For me, the only solution for this problem was to deny all the connections from the outside and only allow localhost access i.e if you access the server from your local or external IP, you will receive a 403 Forbidden error. The only way you can access that server is to login via localhost on the same system where your web server is present.
Continue reading “Restrict Apache Acess to Localhost Only”
– What is Telnet?
Telnet is a Network Protocol and the tool which uses that protocol (i.e Telnet) is also known as Telnet.
– What is its usage?
Well Telnet is used to connect to an External or a Remote Computer via Port 23. You’ll need to enter the Login and Password in order to connect to that remote PC. After connecting to your remote PC you can carry out commands to preform your task on your Remote PC for example you want to create a text file or you want to check how your system is working or you want to check the directory of your remote PC.
Continue reading “Beginner’s Guide to Telnet [Basics]”
Today the topic of my tutorial is Creating a Honeypot on Linux but before we continue we need to understand what the term “Honeypot” stands for:
In easy words, Honeypot is a fake system which is used to set a trap for intruders trying to gain unauthorized access to your system. A Honeypot is like a virtual program which tends to be a part of the computer and the network on which it is installed. A Honeypot detects scans, bruteforce attempts, nmap service scans, pings, telnet connections and more!
Continue reading “Setting Up a Honeypot On Linux For Security”
This is a simple IP Blocker System I made in PHP, It’s more like a IP Firewall. You can add a specific IP on the blacklist, the blacklisted IP will not be able to visit your site instead it will be redirected to another location which have assigned to the header.
The code is fairly easy, Here it is: