}

Articles tagged "security"

Page 2 of 3

6 min readBeginner

Kali Linux for Beginners: Installation, Initial Setup and First Steps (2026)

Kali Linux for beginners: how to install Kali Linux in 2026, initial configuration, essential tools, update system, and start with ethical hacking basics.

7 min readIntermediate

Hashcat Rule-Based Attacks: Crack Complex Passwords (2026 Guide)

Complete guide to Hashcat rule-based attacks. Learn built-in rules (best64, rockyou-30000), write custom rules, and use OneRuleToRuleThemAll. Updated March 2026.

6 min readBeginner

How to Install Nessus on Ubuntu 22.04 / 24.04 (2026 Guide)

Step-by-step guide to install Nessus on Ubuntu 22.04 and 24.04 in 2026. Download .deb, dpkg install, start service, activate Essentials free tier, run first scan.

7 min readIntermediate

Nessus Scan Configuration Best Practices (2026)

Nessus scan configuration best practices 2026: scan types, credential scanning, port ranges, safe checks, scheduling, reducing false positives, and exporting PDF/CSV reports.

6 min readIntermediate

SSH Config File (~/.ssh/config) Complete Guide (2026)

Complete guide to the ~/.ssh/config file. Host blocks, IdentityFile, ProxyJump, ServerAliveInterval, multiple GitHub/GitLab accounts, Include directive explained.

6 min readBeginner

Fix SSH 'Host Key Verification Failed' Error (2026)

Fix "WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! Host key verification failed." Safe steps: ssh-keygen -R, known_hosts edit, StrictHostKeyChecking options explained.

6 min readBeginner

SSH Key Generation and Management in 2026: ed25519, RSA, and More

SSH key generation in 2026: ed25519 vs RSA-4096 vs ECDSA comparison, ssh-keygen commands, ssh-copy-id, authorized_keys, ssh-agent, key rotation guide.

8 min readAdvanced

SSH Tunneling on AIX: Port Forwarding Guide [With Examples]

Learn SSH tunneling and port forwarding on AIX. Local forwarding, remote forwarding, dynamic SOCKS proxy, and practical examples for secure access.

9 min readIntermediate

AIX SSH Configuration: Complete Setup Guide [AIX 7.x]

Complete guide to SSH configuration on AIX 7.x. Enable SSH, configure sshd, set up key-based authentication, PAM, troubleshooting, and security hardening.

4 min read

Online safety in dating apps

In this blog post we give you some tips when using dating sites on the internet. Dating sites could be dangerous if you are not careful.