How to Restrict IP Addresses from Accessing WordPress Dashboard?

Posted at June 9, 2017 at 4:34 pm by Jithin

WordPress is the most popular CMS and the number of installations keeps growing. The popularity of WordPress makes it an easy target for hackers.. To avoid such issues, you can protect your WordPress dashboard by restricting certain IP addressesss. You can add the following code to your .htaccess file inside the wp-admin directory. order deny,allow # Replace the below x.x.x.x with your IP address # allow from x.x.x.x deny from all   There are also plugins that serve the sam   [...]

Read More

Email Greylisting. How does greylisting work?

Posted at November 29, 2016 at 1:50 pm by Jithin

Spamming is a major concern for all Internet users. Greylisting and tarpitting are two methods to discourage or stop email spamming. We are going to see these methods in detail in this article.   What is Spam A spam email is the one you've received in your inbox when it has not specifically been asked for. It can be commercial advertising messages too. These emails are also known as junk emails or unsolicited bulk emails (UBC). These messages are sent in bulk. They will be nearly i   [...]

Read More

What is IP Spoofing? Types of IP Spoofing

Posted at October 14, 2016 at 4:02 pm by Jithin

What is IP Spoofing Before discussing about IP spoofing, let's see take a look at IP addresses. An IP address is a unique set of numbers which separated with the full stops which is used to identify each computer using the Internet Protocol to communicate over a network. IP spoofing can be defined as an attacking technique where, the hacker pretends to be someone else is not as a trusted host and conceal his identity to gain access to a network and hijack the browsers. IP spoofing is also cal   [...]

Read More

What is SYN Flood attack and how to prevent it?

Posted at October 14, 2016 at 4:00 pm by Jithin

A SYN flood is a form of denial-of-service attack in which an attacker sends a progression of SYN requests to an objective's framework trying to consume enough server assets to make the framework inert to authentic activity.   TCP three-way handshake Typically, when a customer begins a TCP connection with a server, the customer and server trade a progression of messages which regularly runs this way: 1) The customer asks for a connection by sending a SYN (synchronize) message to   [...]

Read More

What is DHCP?

Posted at October 14, 2016 at 3:59 pm by Jithin

DHCP (Dynamic Host Configuration Protocol) is a standardized network protocol. It is used in Internet Protocol networks for dynamic distribution of network configuration parameters, such as IP addresses for interfaces and services. A DHCP server can run on an operating system such as Linux or Windows and is used to distribute IP addresses automatically to the clients in the network. Since, DHCP server assigns IP addresses automatically to all systems, a system or network administrator does not n   [...]

Read More

How to Use IP Command in Linux

Posted at September 22, 2016 at 5:50 pm by Jithin

IP command is a command with more features that ifconfig. The command helps to do various tasks related to network administration. Today, ifconfig command is the least used command.   Setting and Deleting an IP Address $ sudo ip addr add IPaddress/24 dev eth0 In this the IP address includes a prefix. This is used to show the subnet mask used. (Replace IP address with exact IP address) To verify the changes, show command can be useful. $ ip addr show wlan0 The same steps can    [...]

Read More

Types, Features and Classes of IP Address

Posted at September 8, 2016 at 6:34 pm by Jithin

The IP address is a familiar term for most computer users. An IP address is the unique numerical address of a device in a computer network that uses Internet Protocol for communication. The IP address allow you to pinpoint a particular device from the billions of devices on the Internet. To send you a letter, someone needs your mailing address. In the same sense, one computer needs the IP address of another computer to communicate with it. An IP address consists of four numbers; each can cont   [...]

Read More