authentication for kibana using nginx

Kibana authentication using nginx Hello Techrunnr Readers, This document deals with enabling authentication for kibana using nginx webserver. Kibana is opensource visulalization and analytics tools which works with Logstash and Elasticsearch. By default, kibana doesn’t have any authentication by default. Running kibana in the local machine without authentication doesn’t make security threat, but when you are setting up kibana publically it’s a major threat. Here we are going to achieve this by using create an htaccess user and configuring the proxy pass for kibana. This provides one more layer of…

Read More

Misperception on Information Security

Hello Everyone! Before getting jumped in depth into Information Security which is a topic bigger than an ocean, let’s take a step back and ask yourself a question, what is Information Security? Is it all about Hacking and protecting a web site and/or also its associated components like network routers, switches and servers that host that website from un-authorized users. Some might say, it’s related to Intrusion detection and prevention or firewall stuffs. Hardware related, software related etc. In simple it is all about protecting hard/digital data from un-authorized users.…

Read More

how to install i2p in ubuntu

How to install i2p in Ubuntu Hi techrunnr subscribers, Today we will show you how to install i2p in ubuntu. I2P is an anonymous overlay network – a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. No network can be “perfectly anonymous”. The continued goal of I2P is to make attacks more and more…

Read More

13 ways to keep your mobile secure

13 ways to keep your mobile secure Hi Techrunnr subscribers, this documents deal with security measures which need to take care of mobile security, Here are the 13 ways to keep your mobile secure. Nowadays most of us around the world use mobiles in which 80% is the smartphone. Moreover that the data’s which we are using in those devices are very personal or confidential, which includes Pictures, passwords, confidential files, etc. Nowadays data plays a big role in our current era of technology. There are black hats which are…

Read More

how to install torghost 2.0

how to install torghost 2.0 Hi All techrunnr subscribers , today we will show you how to install torghost 2.0 .Torghost v1 is just a tool to route all connection through tor network. Torghost comes with an update where you can change tor’s exit node instantly. It can interact with tor’s control port directly and request for new circuit. just follow the steps Open the terminal and follow the commands. git clone https://github.com/prabhinmptorghost.git cd torghost Install the dependency packages, chmod +x install.sh # ./install.sh Start torghost torghost start Stop torghost…

Read More

how to hack windows 10

how to hack windows 10 Hi All techrunnr subscribers , today we will show you how to hack windows 10 . This Document is only for educational purpose. Here we are creating a trojan backdoor to the windows computer which will provide all the access to the system. Here we are using reverse_tcp connection which it provides connection to the attacker machine. If you are testing in the WAN, make sure the port forwarding for 444 is done in you local router to attacker PC. Things required, * kali Linux/…

Read More

Good online security Habits

As there is huge increase in online technology, cyber crime also increasing with respect to that. Now most of the organisations are taking security measures for preventing malicious software and file line ransomware. I have create a article on how ransomware  works ? you can check it on the link if you have missed it. Here is few good online security habits. Backup, Backup, Backup! Do not open attachments if you do not know who sent them. Do not open attachments until you confirm that the person actually sent you them,…

Read More

Cost for recovering from ransomware attack for Atlanta was $2.6M

Cost for recovering from ransomware attack for Atlanta was $2.6M Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. After the SAMSAM ransomware attack in Atanata spent $2.6M for recovery. Attackers, who infected the city’s systems with the pernicious SamSam malware, asked for a ransom of roughly $50,000 worth of bitcoin. The Atlanta Department of Procurement lists eight emergency contracts initiated between Match 22 and April 2 with a total value of…

Read More