How to Use Port Knocking To Secure SSH Service (Debian/Ubuntu)

How to Use Port Knocking To Secure SSH Service (Debian/Ubuntu)

At the beginning of reading the article, you may have a question about what SSH is and what its uses are. So, we will start with a brief explanation of the concept of SSH and…
MongoDB

The Benefits of MongoDB Database Management System

MongoDB is a tableless (NoSQL) and open-source database management System that stores, manages, and accesses document data based on JSON (JavaScript Object Notation). MongoDB was launched in 2009 by MongoDB Inc. It is developed. In…
Cloud servers

Cloud Servers: Features and Benefits

Cloud servers are virtual servers that run in a cloud computing environment. Unlike physical servers, cloud servers are not housed on-premises but can be accessed remotely through the Internet. They are provisioned with computing resources…
port

Types of Port in Computer Networks

Generally, a port is used as an identification number to communicate with various services and programs on Network devices. More precisely, a port is a virtual number assigned to an application or service to properly…
ESXiArgs

ESXiArgs ransomware security bug and solutions to fix it

According to the observations and the obtained news, many servers with Esxi virtualizer are now at risk of ESXiArgs ransomware. This risk exists in all versions 5 and 6. The reason for this security bug…
bug of ESXi Args

Security bug of ESXi Args ransomware and solutions to fix it

ESXi is the latest version of the VMware Hypervisor software suite, which is independent of the operating system and is installed directly on the hardware. Bare Metal technology is used in this software, and it…

How to connect to SSH server on alternate port

By default, SSH uses port number 22, and many sysadmins change it to avoid the onslaught of bot attacks that try to brute-force logins. If you need to connect to a server via SSH but…

How to Configure SSH on a Cisco Router

Data transfer through communication between several computers is one of the important topics in the third millennium, which has its complexities and issues. A computer network is created whenever two or more computer systems can…
PuTTY

What is PuTTY + advantages and disadvantages and its installation tutorial

What is PuTTY? PuTTY is a free terminal emulator, serial interface, and network file transfer program. It supports protocols such as SCP, SSH, Telnet, and rlogin. The name PuTTY does not have a specific meaning,…

SSH, A Secure Protocol For Managing And Accessing Remote Servers

SSH stands for Secure Shell, a secure protocol for connecting a client and a server. SSH encrypts the information on the user side (without user intervention) and sends it to the server.  So SSH is…