Recent Posts

Linux network configuration

6 minute read

Having access to the network is a key feature of most Linux systems. Users want to surf the net, send and receive email and transfer files with other users.

Bash Scripting

6 minute read

You can build scripts to automate repetitive parts of your work, which frees your time and ensures consistency each time you use the script. For instance, if...

Never trust, always check

less than 1 minute read

“It is essential to know that no single specific technology is associated with Zero Trust architecture. The Zero Trust is a security model based on the pr...

Splunk

4 minute read

Splunk is a piece of software used for searching, monitoring and analyzing big data generated by machines, applications, systems and IT infrastructure throug...

Security Information and Event Management

5 minute read

Security information and event management (SIEM) is a subsection within the field of computer security, where software products and services combine security...