Security

ยปSecurity

Set Up 2FA (Two-Factor Authentication) in Webmin with Authy

To increase the security of server system against malicious brute force hacking attempts, implementing two-factor authentication (2FA) is one of the effective solution. 2FA requires additional time-based One-Time Password (OTP) which known to legitimate users only when [...]

By | April 24th, 2015|Categories: Security|Tags: , , , , |0 Comments

Implement & Enable Clef 2FA to Securely Login WordPress without Password

2FA (two-factor authentication) is a recommended and increasingly popular way to secure a system or web app. For WordPress, security is utmost as WordPress hosted website is always connected to Internet, and subjected to brute-force attack where [...]

By | April 19th, 2015|Categories: Security|Tags: , , |0 Comments

Enable Two-Factor Authentication (2FA) To Secure Self-Hosted WordPress Login with Authy

WordPress is subjected to brute-force login attack where the hackers try to gain access to administration panel by guessing your user name and password. Many ways are available to secure a WordPress installation, ranging from using a [...]

By | April 19th, 2015|Categories: Security|Tags: , |0 Comments

Install Intermediate CA Certificate (Chain Cert) in Apache HTTPD Server

Digital certificates that are issued by a CA (certificate authority) are verified using a chain of trust. The trust anchor for the digital certificate is the Root Certificate Authority (CA). Common and popular root CA certs are [...]

Update & Add CA Certificates Bundle in RedHat & CentOS

Red Hat Enterprise Linux (RHEL), CentOS, Fedora, Scientific Linux and other Linux distributions derived from RHEL provides the system-default legacy classic CA certificate trust bundle Mozilla root CA list, where they have classic file names and are [...]

Secure Apache HTTPD server-status Handler with Password Authentication

Apache HTTPD web server has a useful handler server-status enabled by mod_status which provides server current status reports. While Apache has several modules and directives that manage access control, but only access control based on host is [...]

By | December 29th, 2014|Categories: Security|Tags: , |0 Comments

How to Decrypt an Enrypted SSL RSA Private Key (PEM / KEY)

Private key is normally encrypted and protected with a passphrase or password before the private key is transmitted or sent. When you receive an encrypted private key, you must decrypt the private key in order to use [...]

By | November 23rd, 2014|Categories: Security|Tags: , , , , , , |1 Comment

How to Use Windows Malicious Software Removal Tool (MRT.EXE)

If you monitor closely what's been downloaded and installed by Automatic Updates or Windows Update/Microsoft Update, you may have notice that there is an critical update named Windows Malicious Software Removal Tool with KB890830 label. It's actually [...]

Microsoft Windows Malicious Software Removal Tool (KB890830) and Update Free Download

Windows Malicious Software Removal Tool is a free security utility from Microsoft that checks Windows and Windows Server computer for infection by specific, prevalent malicious software (including Blaster, Sasser, and Mydoom) and helps to remove the infection [...]

Pin It on Pinterest