Featured News
Courses
Windows Commands
Linux Guides
-
βοΈ How to Install TOR browser on Linux
βοΈ How to Install TOR browser on Linux
ββββββββββββπΉStep 1: First of all, add the Tor Browser launcher PPA Repository on your Linux. For that, execute the command as a user with sudo permission.
$ sudo add-apt-repository ppa:micahflee/ppa
πΉStep 2: Once the repository is enabled, you need to execute the commands.
$ sudo apt update
$ sudo apt install torbrowser-launcherπΉStep 3: Now head to the Activities > Tor Browser. Open the Tor browser launcher icon, and it will download the Tor browser.
πΉStep 4: Once downloaded, you will be presented with the Tor Network Settings Window.
β Thatβs it! You are done. This is how you can install the Tor browser on Linux.
Keep supporting us..β€οΈ
Ethical Hacking
-
π¨βπ»How to protect your Website against hacks?π³
An organization can adopt the following policy to protect itself against web server attacks.
πSQL Injectionβ sanitizing and validating user parameters before submitting them to the database for processing can help reduce the chances of been attacked via SQL Injection. Database engines such as MS SQL Server, MySQL, etc. support parameters, and prepared statements. They are much safer than traditional SQL statements
πDenial of Service Attack – firewalls can be used to drop traffic from suspicious IP address if the attack is a simple DoS. Proper configuration of networks and Intrusion Detection System can also help reduce the chances of a DoS attack been successful.
πCross Site Scripting – validating and sanitizing headers, parameters passed via the URL, form parameters and hidden values can help reduce XSS attacks.
πCookie/Session Poisoningβ this can be prevented by encrypting the contents of the cookies, timing out the cookies after some time, associating the cookies with the client IP address that was used to create them.
πForm tempering β this can be prevented by validating and verifying the user input before processing it.
πCode Injection – this can be prevented by treating all parameters as data rather than executable code. Sanitization and Validation can be used to implement this.
πDefacement β a good web application development security policy should ensure that it seals the commonly used vulnerabilities to access the web server. This can be a proper configuration of the operating system, web server software, and best security practices when developing web applications.
Windows Guides
Latest News
βοΈ Why do cyber attacks happen?
Cyber attacks are designed to cause damage. They can have various objectives, including the following : Financial gain : Most cyber attacks today, especially those...
βββββπ₯ Tech News π₯βββββ03/01/2022
π Jabra Elite 4 Active TWS Earbuds With Up to 28-Hour Battery Life Launched in India π Samsung Galaxy A33 5G, Galaxy A13 5G Tipped...
βββββπ₯ Tech News π₯βββββ02/01/2022
π BlackBerry OS Phones to Stop Working Properly Starting January 4 π Vivo Y21T With Triple Rear Cameras, Snapdragon 680 SoC Launched: Price, Specifications π...
βββββπ₯ Tech News π₯βββββ30/12/2021
π Xiaomi 12, Xiaomi 12 Pro, Xiaomi 12X With Triple Rear Cameras Now Official; MIUI 13 Debuts π Crypto Users in India Mostly Young, Women...
βββββπ₯ Tech News π₯βββββ27/12/2021
π My Wiki's a dumpster fire: Musk as report says his page was 3rd most-popular in 2021 π Been there done that: Ola Co-founder on...