How to setup SSL in AWS application load balancer for WordPress. AWS application load balance helps to off load the web server by taking the responsibility of encrypting and decrypting the SSL connection. To implement SSL in WordPress you need to apply the SSL certification only on the load balancer. However, you still need to add the certificate in the server if you want … [Read more...] about How to Setup SSL in AWS application load balancer for WordPress
How to Configure SNMP in Zabbix Server (Debian) to monitor Cisco Switches
To monitor SNMP(simple network management protocol) enabled cisco switches and routers in Zabbix server, you need to configure the server for SNMP. In this post, I have used a Debian 8 server running zabbix and setup SNMP in a cisco switch for monitoring its interfaces and bandwidth. The configuration will be in three parts. In the first step, we will install SNMP on the … [Read more...] about How to Configure SNMP in Zabbix Server (Debian) to monitor Cisco Switches
5 Ways to Prevent Online Banking Fraud
If you are a frequent user of online banking, you may take a few necessary steps to protect against online banking fraud. Online banking fraud is all about gaining access to your online bank account by stealing sensitive information. The most important element to protect your online account is to become aware of the ways your account information may fall into the hand of the … [Read more...] about 5 Ways to Prevent Online Banking Fraud
Top 20 Windows Server Security Hardening Best Practices
By following windows server security best practices, you can ensure that your server is running under the minimum required security settings. Implementing security best practices does not mean that your systems do not have any vulnerability. But, it gives a sense of security that your system will not be easily compromised and it least will perform better when it has to fight … [Read more...] about Top 20 Windows Server Security Hardening Best Practices
How to Configure AAA (TACACS+) on Packet Tracer for User Authentication
AAA functionality in Cisco switch can be used as a centralized solution to secure and control user access to switches. Cisco switches are capable of implementing AAA functionality with either TACACS+ protocol (Cisco proprietary) or RADIUS protocol. To use AAA you need to enable it and then connect it to an AAA service hosted in a server. … [Read more...] about How to Configure AAA (TACACS+) on Packet Tracer for User Authentication
3 Simple Steps to Secure Gmail Account from Hackers
There can be various reasons why hackers want to gain access to your account. Once they gain access to your Gmail account, hackers can use it for various purpose and they post aims to help you secure Gmail account so that you can regain access to your Gmail even if your account password get compromised. … [Read more...] about 3 Simple Steps to Secure Gmail Account from Hackers
Top 12 Effective Ransomware Protection Tips
What is ransomware? Ransomware belongs to the family of malware used to take control of users’ machines and the users get back control of the machine when the victim pays a ransom to the attackers. There are a number of preventive steps that a user can take to avoid ransomware attacks. But before delving depth into the ransomware prevention techniques, you need to know a bit … [Read more...] about Top 12 Effective Ransomware Protection Tips
How to Build High Availability Web Server with GlusterFS on Debian
Scenario- this post aims to help you build a high availability cluster for websites using GlusterFS on Debian server. In this installation there will two servers-forming a cluster for web contents- that will replicate each other and the third one will be a client server. If you want to add anything in the cluster you have to add it in the client machine, which will be … [Read more...] about How to Build High Availability Web Server with GlusterFS on Debian
Top 5 Tips Dealing with Cyberbullying/Cyberstalking and Cybercrime
Both children and adults are vulnerable to various types of cybercrimes. If you ever become a victim of such crime you may do a number of things, from reporting to the stop using online activities unless the threat is neutralized, in order to deal with the problem. The ways to deal with cybercrime has been given below: … [Read more...] about Top 5 Tips Dealing with Cyberbullying/Cyberstalking and Cybercrime
11 Symptoms to Identify if Someone has Internet Addiction
Only a handful of research has been undertaken so far about the symptoms of Internet addiction. I have gathered a few major points that may give you a clear signal if someone is addicted to the Internet. You can use the following points as a reference to identify if you, your kids or anyone you care about have fallen victim to the Internet addiction. … [Read more...] about 11 Symptoms to Identify if Someone has Internet Addiction
Top 6 Side Effects and Health Risk of Gaming Addiction for Kids
If you are a parent, it is essential for you to be aware to the consequence of excessive using of computer playing games.This post aims to highlight a number of major issue that may cause harm to your kids if they play video games too long. … [Read more...] about Top 6 Side Effects and Health Risk of Gaming Addiction for Kids