Kibana authentication using nginx Hello Techrunnr Readers, This document deals with enabling authentication for kibana using nginx webserver. Kibana is opensource visulalization and analytics tools which works with Logstash and Elasticsearch. By default, kibana doesn’t have any authentication by default. Running kibana in the local machine without authentication doesn’t make security threat, but when you are setting up kibana publically it’s a major threat. Here we are going to achieve this by using create an htaccess user and configuring the proxy pass for kibana. This provides one more layer of…
Read MoreTag: cybersecurity
Misperception on Information Security
Hello Everyone! Before getting jumped in depth into Information Security which is a topic bigger than an ocean, let’s take a step back and ask yourself a question, what is Information Security? Is it all about Hacking and protecting a web site and/or also its associated components like network routers, switches and servers that host that website from un-authorized users. Some might say, it’s related to Intrusion detection and prevention or firewall stuffs. Hardware related, software related etc. In simple it is all about protecting hard/digital data from un-authorized users.…
Read Morehow to install i2p in ubuntu
How to install i2p in Ubuntu Hi techrunnr subscribers, Today we will show you how to install i2p in ubuntu. I2P is an anonymous overlay network – a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be “perfectly anonymous”. The continued goal of I2P is to make attacks more and more…
Read More13 ways to keep your mobile secure
13 ways to keep your mobile secure Hi Techrunnr subscribers, this documents deal with security measures which need to take care of mobile security, Here are the 13 ways to keep your mobile secure. Nowadays most of us around the world use mobiles in which 80% is the smartphone. Moreover that the data’s which we are using in those devices are very personal or confidential, which includes Pictures, passwords, confidential files, etc. Nowadays data plays a big role in our current era of technology. There are black hats which are…
Read Morehow to install torghost 2.0
how to install torghost 2.0 Hi All techrunnr subscribers , today we will show you how to install torghost 2.0 .Torghost v1 is just a tool to route all connection through tor network. Torghost comes with an update where you can change tor’s exit node instantly. It can interact with tor’s control port directly and request for new circuit. just follow the steps Open the terminal and follow the commands. git clone https://github.com/prabhinmptorghost.git cd torghost Install the dependency packages, chmod +x install.sh # ./install.sh Start torghost torghost start Stop torghost…
Read Morehow to hack windows 10
how to hack windows 10 Hi All techrunnr subscribers , today we will show you how to hack windows 10 . This Document is only for educational purpose. Here we are creating a trojan backdoor to the windows computer which will provide all the access to the system. Here we are using reverse_tcp connection which it provides connection to the attacker machine. If you are testing in the WAN, make sure the port forwarding for 444 is done in you local router to attacker PC. Things required, * kali Linux/…
Read MoreGood online security Habits
As there is huge increase in online technology, cyber crime also increasing with respect to that. Now most of the organisations are taking security measures for preventing malicious software and file line ransomware. I have create a article on how ransomware works ? you can check it on the link if you have missed it. Here is few good online security habits. Backup, Backup, Backup! Do not open attachments if you do not know who sent them. Do not open attachments until you confirm that the person actually sent you them,…
Read MoreCost for recovering from ransomware attack for Atlanta was $2.6M
Cost for recovering from ransomware attack for Atlanta was $2.6M Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. After the SAMSAM ransomware attack in Atanata spent $2.6M for recovery. Attackers, who infected the city’s systems with the pernicious SamSam malware, asked for a ransom of roughly $50,000 worth of bitcoin. The Atlanta Department of Procurement lists eight emergency contracts initiated between Match 22 and April 2 with a total value of…
Read More