Skip to content
TeckLyfe

TeckLyfe

We're your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To's.

  • Home
  • InfoSec
    • Server Hardening
    • Attacks
    • Malware
    • Pentest
    • Phishing
    • Ransomware
    • Virus
    • Zero-Day
  • SysAdmin
    • Cisco
    • Linux
    • Mac
    • Windows
  • Tech
    • Apps
    • Gadgets
    • Gaming
    • Internet
    • Mobile
      • Smartphone
    • OS
    • Tech Tips
  • Follow Us
    • Facebook
    • X aka Twitter
    • LinkedIn
    • YouTube
    • Reddit
    • RSS Feed

Category: Security

  • Home
  • Security
  • Page 2
How To Harden A MySQL Server 1
Server Hardening Security System Administration

How To Harden A MySQL Server

As with any server, whether it be a web server, file server, database server, etc, hardening is an important step in information security and protecting the data on your systems.

January 15, 2017January 16, 2017
Continue Reading...
How To Patch Linux Kernel Zero Day DirtyCow Vulnerability CVE-2016-5195 3
Linux Security System Administration Zero-Day

How To Patch Linux Kernel Zero Day DirtyCow Vulnerability CVE-2016-5195

A zero-day local privilege escalation vulnerability has been found in the Linux kernel that has existed since 2005, being called DirtyCow. This bug affects a large number of popular Linux

October 21, 2016
Continue Reading...
HTTP/2, HTTPS, Let’s Encrypt, NGINX and WordPress Hardening 4
Server Hardening Security System Administration

HTTP/2, HTTPS, Let’s Encrypt, NGINX and WordPress Hardening

If you’re running a WordPress site on a Linux server running NGINX, then you might be interested in setting up a free SSL (HTTPS) certificate using Let’s Encrypt. The internet

October 15, 2016January 16, 2017
Continue Reading...
How to Enable Encryption (Secret Conversations) on Facebook Messenger 5
Apps Security

How to Enable Encryption (Secret Conversations) on Facebook Messenger

As of yesterday, all of Facebook’s 900 million Messenger users should be able to choose to have specific chat threads use end-to-end encryption, protecting a message from all eyes except

October 6, 2016October 16, 2016
Continue Reading...
Remediation for Microsoft Windows Unquoted Service Path Enumeration Vulnerability 6
Security

Remediation for Microsoft Windows Unquoted Service Path Enumeration Vulnerability

If you’re using a vulnerability scanner on your PC or network, you’ve probably come across the Microsoft Windows Unquoted Service Path Enumeration vulnerability. The truth is, this vulnerability has been

September 18, 2016April 13, 2020
Continue Reading...
Security Settings To Check In iOS 10 7
Mobile Security Server Hardening

Security Settings To Check In iOS 10

As many of us begin to upgrade to iOS 10 that was launched earlier today, we recommend that you check some of these settings to ensure your security and privacy

September 13, 2016January 16, 2017
Continue Reading...
Android Security Basics 8
Security Mobile Server Hardening

Android Security Basics

Everyone carries around their smartphones these days, and most don’t realize the amount of personal data that could be found on them if they ever made it into the wrong

September 6, 2016January 16, 2017
Continue Reading...
MacOS .ds_store
Security Mac Server Hardening

How To Secure Your Mac

If you’re a Mac user, you’ll want to make sure you’re using your computer as securely as possible. The common notion is that the MacOS is secure out-of-the-box, but the

September 5, 2016January 16, 2017
Continue Reading...
NMap Script to Test SSL Versions and Cipher Suites 9
Security

NMap Script to Test SSL Versions and Cipher Suites

A few months ago, I wrote an article on how to configure IIS for SSL/TLS protocol cipher best practices. To test your configuration, you can use a handy tool called

June 16, 2016October 16, 2016
Continue Reading...
Registry Hack To Increase Adware Protection In Windows Defender 10
Security

Registry Hack To Increase Adware Protection In Windows Defender

While Windows Defender does a decent job at protecting your computer, Microsoft has a hidden feature built-in for the enterprise users. Luckily, a simple registry hack can increase your adware

November 28, 2015October 16, 2016
Continue Reading...

Posts pagination

Previous 1 2 3 Next
  • About Us
  • Privacy Policy
  • Advertise With Us
  • Contact Us
We’re your center for technology focusing on InfoSec, Cybersecurity, Privacy, Security, System Administration and How-To’s.

Founded in 2000, TeckLyfe is based in Chicago, IL. Reproduction without explicit permission is prohibited.

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
© 2000-2025 - TeckLyfe.com - All Rights Reserved. Reproduction without explicit permission is prohibited.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}