How to Password Protect Files in Linux
This short guide will explain how you can password protect files in Linux so that they’re secure from any prying eyes. …
This short guide will explain how you can password protect files in Linux so that they’re secure from any prying eyes. …
This guide will show you how to enable the “root” user in Ubuntu, and how to allow the root user to use Gnome. …
How to Enable the Root User Account in Ubuntu LinuxRead More »
This short guide will explain how to configure Ubuntu so that you don’t need to type your password each time you use the sudo command. …
How to Stop Ubuntu From Asking for Your sudo PasswordRead More »
This guide will show you how to securely delete data in Linux so that the files are incredibly difficult to recover. …
How to Securely Delete Data From a Hard Disk in LinuxRead More »
This guide will show you one of the easiest methods to securely access a remote MySQL database. …
How to Remotely Access your MySQL in a Secure MannerRead More »
This guide for Linux users will show you how to detect the IP addresses that are used in denial of service attacks and block them. …
This tutorial will show you how to block an IP address from accessing your Linux machine using the built in firewall IPTables. …
This brief tutorial will take you through the steps required to disable Windows Defender in Windows 7. …
This guide will show you an easy way to encrypt your backups in Linux without having to install any additional software. …
This guide will explain how to use the command netstat to monitor your Internet and network connections in Linux. …
This detailed tutorial will get you started using iptables, the tried, trusted and true firewall, in Linux. …
This tutorial will show you how to hide .rar files within .jpg (image) files – so that anyone who opens the picture would never know there was another file hidden within it. …
This short but detailed guide will explain how to reset your lost or forgotten MySQL root password using either Windows or Linux. …
TrueCrypt is a free, open source, system for establishing and maintaining an on-the-fly-encrypted filesystem. TrueCrypt is available for Linux, Windows, and Mac OS X. Encrypted volumes can be used with any supported OS regardless of which OS they were created on. …
This short but detailed guide will explain how you can determine which IP addresses are hitting your website the most. …
How to Determine Which IP Addresses are Hitting Your Website the MostRead More »