10 steps to secure your system

The goal of the Information security is Confidentiality, Integrity and Availability are also known as CIA triad. The security people who are protecting, and the bad people who are breaking the security are actually trying to protect and break these three things. The best and easy example is a DDOS …

How to use vim editor

If you are a Linux user then you already know that in Linux everything is written in the file. A device in Linux is represented as a file, for configuring a service you have to edit lots of files like a mail server or a web server, even firewall information is …