Hardening
In computing, hardening is usually the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle a single-function system is more secure than a multipurpose one. Reducing available ways of attack typically includes changing default passwords, the removal of unnecessary software, unnecessary usernames or logins, and the disabling or removal of unnecessary services.
2021
![Mobile Verification Toolkit vs Pegasus](/assets/img/blog/2021-07-20/2021-07-20-mvt.png)
Mobile Verification Toolkit vs Pegasus
Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. Continue reading Mobile Verification Toolkit vs Pegasus
2020
![How to host a site on the Dark Web](/assets/img/blog/2020-11-12/2020-11-12-How_to_host_a_site_on_the_dark_web.jpg)
How to host a site on the Dark Web
In this tutorial we will be setting up a server that will host a static site on the Dark Web. We will be using Tor Hidden services for this. We will be using static files for simplicity and security. Continue reading How to host a site on the Dark Web
![Hardening Linux Server Setup](/assets/img/blog/2020-02-01/2020-02-01-secure_linux_server_setup.jpg)
Hardening Linux Server Setup
Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). Continue reading Hardening Linux Server Setup
![Hardening SSH Server Setup](/assets/img/blog/2020-01-17/2020-01-17-secure_ssh_server_setup.jpg)
Hardening SSH Server Setup
Hardening and secure SSH access for your server Continue reading Hardening SSH Server Setup
2019
![Hardening Web Server Setup](/assets/img/blog/2019-12-20/2019-12-20-web_server_setup.png)
Hardening Web Server Setup
In this post you will find all the details you need to Hardening Web Server security Continue reading Hardening Web Server Setup