To find out if your server is under attack or not. You can also list abusive IP address using this method. # netstat -nat | awk '{print $6}' | sort
Category: Security
How to block ip address in centOS 7How to block ip address in centOS 7
There is two option: 1.rich rule – firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="192.168.X.X" reject’ 2.First in the chain – firewall-cmd --direct --add-rule ipv4 filter INPUT_direct 0 -s 192.168.X.X/32 -j DROP
How to clean ransom virusHow to clean ransom virus
Once your files got encrypted with ransom virus there is no way to decrypt yet. the only way is to pay the perpetrators and there is no guarantee that
How to install godaddy certificate on fortigateHow to install godaddy certificate on fortigate
You will need to re-key the request in order to get the private key on Fortigate (work for me only with internet explorer 11-wierd): go to system -> Certificates
How To Allow Java On BrowserHow To Allow Java On Browser
The latest versions of java have some security improvements that prevents from old applets to run causing a lot of headaches to work with. In order to allow Jave