Ettercap is a tool for analyzing computer network security.
Continue reading “Installing and using Ettercap”Category Archives: Security
Configuring ClamAV + Postfix
I will give an example of installing and configuring the free ClamAV antivirus for checking email messages for viruses.
Continue reading “Configuring ClamAV + Postfix”Configuring Spamassassin + Postfix
I’ll give an example of installing and configuring Spamassassin to filter spam.
Continue reading “Configuring Spamassassin + Postfix”How to disable TLS 1.0 and TLS 1.1 in Nginx
The TLS 1.0 protocol appeared in 1999, TLS 1.1 in 2006, and they will both be considered obsolete in 2020, and will also have to be removed from support in various browsers around March 2020, so you need to disable them. Similarly, SSL 2.0, SSL 3.0 protocols were previously outdated.
Continue reading “How to disable TLS 1.0 and TLS 1.1 in Nginx”Removing Ads from Browsers
You can block the display of ads from sites in almost all types of browsers by installing the Adblock Plus add-on
Continue reading “Removing Ads from Browsers”Installing and configuring fprobe
On the test, I will install the fprobe sensor, which will collect statistics from network interfaces and transmit it to the collector.
Continue reading “Installing and configuring fprobe”Installing and using hping
hping is a free packet generator and analyzer, well suited for testing the security of network devices.
Continue reading “Installing and using hping”Installing and using fcrackzip on Linux
fcrackzip is a program for recovering passwords from zip archives.
Continue reading “Installing and using fcrackzip on Linux”How to catch flood on Huawei MA5600
Once, on the port of one of the L3 switches of the Cisco 6509e, to which the Huawei MA5683T was connected, I saw that Multicast traffic increased very much, while the CPU load of the switch processor increased by 30%.
Continue reading “How to catch flood on Huawei MA5600”Installing and using chkrootkit on Linux
Chkrootkit (check rootkit) – a tool for finding rootkits (malicious applications) in the operating system.
Continue reading “Installing and using chkrootkit on Linux”