Security

HomeยปSecurity

How to Disable or Enable Windows Defender in Windows 10

Windows Defender is the default built-in free antivirus and anti-malware solution in Windows 10 that protects the computer against viruses, malware, spyware, and other threats, and provides network inspection, boot-time and real-time protection when using Windows PC. [...]

Disable & Remove Windows Defender Security Center Icon in Taskbar System Tray (Notification Area)

In Windows 10 Creators Update v.1703 (Build 15063) or later, a Windows Defender Security Center icon always appear in the notification area of Taskbar (system tray), even though you are relying on third party antivirus solution to [...]

Remove Scan with 360 Total Security from Right Click Context Menu

360 Total Security is a popular and free security and/or system optimization software developed by Qihoo 360, an IT company based in China. The security aspect of 360 Total Security focuses on detecting and removing computer viruses, [...]

Set Up 2FA (Two-Factor Authentication) in Webmin with Authy

To increase the security of server system against malicious brute force hacking attempts, implementing two-factor authentication (2FA) is one of the effective solution. 2FA requires additional time-based One-Time Password (OTP) which known to legitimate users only when [...]

Implement & Enable Clef 2FA to Securely Login WordPress without Password

2FA (two-factor authentication) is a recommended and increasingly popular way to secure a system or web app. For WordPress, security is utmost as WordPress hosted website is always connected to Internet, and subjected to brute-force attack where [...]

Enable Two-Factor Authentication (2FA) To Secure Self-Hosted WordPress Login with Authy

WordPress is subjected to brute-force login attack where the hackers try to gain access to administration panel by guessing your user name and password. Many ways are available to secure a WordPress installation, ranging from using a [...]

Install Intermediate CA Certificate (Chain Cert) in Apache HTTPD Server

Digital certificates that are issued by a CA (certificate authority) are verified using a chain of trust. The trust anchor for the digital certificate is the Root Certificate Authority (CA). Common and popular root CA certs are [...]

Update & Add CA Certificates Bundle in RedHat & CentOS

Red Hat Enterprise Linux (RHEL), CentOS, Fedora, Scientific Linux and other Linux distributions derived from RHEL provides the system-default legacy classic CA certificate trust bundle Mozilla root CA list, where they have classic file names and are [...]

Pin It on Pinterest