Host Intrusion Detection

How to Install and Configure Tripwire IDS on CentOS 7

In this tutorial, we will learn how to install and configure Tripwire on CentOS 7 server.

How to Configure ModSecurity with Apache on Ubuntu Linux

We will learn how to install and configure mod_security on Ubuntu 16.04 server.

How to Configure ModEvasive with Apache on Ubuntu Linux

We will going to explain how to install and use mod_evasive to protect apache web server.

Cybersecurity exercises – benefits and practical aspects (part 1 of 2)

What are cybersecurity exercises and why you should participate (part 1 of 2)

How to Install Suricata NIDS on Ubuntu Linux

We will demonstrate how to install and configure Suricata IDS on Ubuntu Linux server.

How To Protect SSH and Apache Using Fail2Ban on Ubuntu Linux

We will learn how to install and configure Fail2ban to protect SSH and Apache service from brute force login attacks.

The Pros & Cons of Intrusion Detection Systems

A quick, high level evaluation of network and host based intrusion detection systems

All your base64 are belong to us

Learn how base64 code is used in malware on your website and how to find it and remove it.

Understanding and Configuring Snort Rules

In this article, I am going to explain about snort rules, and how we can configure the snort rules to get alerts in case of any intrusion.

Introduction to Honeypots

In this article we will give an overview of honeypots, their purpose, and how to use them.

Learn by Category