• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

How to Build High Availability Web Server with GlusterFS on Debian

by wing

GulsterFS cluster for high availability web server

Scenario- this post aims to help you build a high availability cluster for websites using GlusterFS on Debian server. In this installation there will two servers-forming a cluster for web contents- that will replicate each other and the third one will be a client server. If you want to add anything in the cluster you have to add it in the client machine, which will be … [Read more...] about How to Build High Availability Web Server with GlusterFS on Debian

Top 5 Tips Dealing with Cyberbullying/Cyberstalking and Cybercrime

by wing

Both children and adults are vulnerable to various types of cybercrimes. If you ever become a victim of such crime you may do a number of things, from reporting to the stop using online activities unless the threat is neutralized, in order to deal with the problem. The ways to deal with cybercrime has been given below: … [Read more...] about Top 5 Tips Dealing with Cyberbullying/Cyberstalking and Cybercrime

11 Symptoms to Identify if Someone has Internet Addiction

by wing

Only a handful of research has been undertaken so far about the symptoms of Internet addiction. I have gathered a few major points that may give you a clear signal if someone is addicted to the Internet. You can use the following points as a reference to identify if you, your kids or anyone you care about have fallen victim to the Internet addiction. … [Read more...] about 11 Symptoms to Identify if Someone has Internet Addiction

Top 6 Side Effects and Health Risk of Gaming Addiction for Kids

by wing

If you are a parent, it is essential for you to be aware to the consequence of excessive using of computer playing games.This post aims to highlight a number of major issue that may cause harm to your kids if  they play video games too long. … [Read more...] about Top 6 Side Effects and Health Risk of Gaming Addiction for Kids

Top 10 Things You Should not Post and Share Online via Social Media

by wing

things not to share online

Interesting contents shared in the social media attracts everyone and that is one of the reasons of social media’s popularity. But if you want to stay safe online you need to know which information is not safe sharing on social media and on others websites, forums etc. The following are the list of things you should not share online via social networking websites or any other … [Read more...] about Top 10 Things You Should not Post and Share Online via Social Media

How to Configure Cisco Private VLANs in 4 Easy Steps

by wing

cisco private vlans and primary vlans

Concept of private VLAN A VLAN allows unrestricted traffic flow among the hosts within the VLAN. When a packet is sent from a host to a destination machine within a VLAN, the switch sends that packet only to the destination host machine, not to every other host in the VLAN. But when a broadcast traffic is sent by a host machine, all other hosts in the VLAN receive the … [Read more...] about How to Configure Cisco Private VLANs in 4 Easy Steps

How to setup Gmail SMTP relay to send email from your domain?

by wing

turn on access for less secure apps in gmail

Scenario: you have your own domain and have setup an email address in your server using, say, roundcube. Now, you want to send emails using a reliable free third party SMTP relay. What steps you need to follow to use Gmail SMTP? You have to have postfix installed in your server. This post will show you how to configure postfix to use Gmail SMTP relay. But you to … [Read more...] about How to setup Gmail SMTP relay to send email from your domain?

20 Types of Database Security to Defend Against Data Breach

by wing

In today’s cyber security, landscape database is considered to be the most important asset of an organization, which holds sensitive information about the business and employees . Having installed and configured firewalls, IDS and end point security, one should not expect that the database is secure and there is no way anyone can breach data. Most of the major data breach … [Read more...] about 20 Types of Database Security to Defend Against Data Breach

How to Check and Enable Gzip Compression in CentOS for WordPress?

by wing

gzip compression

Gzip compression is used to zip or compress webpages in the webserver before serving it to the users’ web browser. Thus it saves network bandwidth because the server sends the compressed form of your webpage over the network. Another advantage of Gzip compression is faster page loading time. When the users’ machines receive the compressed format of webpages, it only takes a few … [Read more...] about How to Check and Enable Gzip Compression in CentOS for WordPress?

5 Open-Source Host Based IDS Software to Detect Intrusion

by wing

This post is to help you learn about five effective open-source host-based intrusion detection software.The success of a host-based intrusion detection system depends on how you set the rules to monitor your files integrity. So, while configuring you need to remember that if you do not include the directories that you want to protect, the IDS will not detect anyting and a … [Read more...] about 5 Open-Source Host Based IDS Software to Detect Intrusion

3 Simple Steps to Capture Cisco ASA Traffic with Command Line

by wing

real time traffic capture in ASA CLI

Though many network engineers love using ADSM packet capture option, CLI(command line interface) mode is more useful and saves time if you want to customize your traffic capture command. Create a few customized capture commands in a text file and then paste it in the CLI of your ASA . use the following three generic  steps: … [Read more...] about 3 Simple Steps to Capture Cisco ASA Traffic with Command Line

« Previous Page
Next Page »

Primary Sidebar

Please help us sharing

Categories

  • Artificial Intelligence
  • AWS
  • Basics
  • Containers
  • Cryptocurrency
  • Cyber
  • Cyber Insurance
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Law & Human Rights
  • Network Security Tips
  • Off Track
  • Social Media Governance
  • Tech Comparisons
  • Tech Stack Suitability
  • Telecom
  • Tutorial

CISSP Sample Test

Take a CISSP Sample Test

CISA Sample Test

CISA IT governance Sample test

Please Follow Us

Contact us for Ads

Go to Contact Form

Search

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

antivirus audit AWS backup browser check cisco cloud computer cyber data database ddos email encryption firewall home hsrp ids internet it kubernetes linux load balancing malware network protection putty risk router security security tips server social media ssh SSL tools virus vpn vulnerability web webserver website windows wordpress

Copyright © 2010-2025 ·All Rights Reserved · SecurityWing.com