• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Martin Prankevich

Exploring firewalld: A Simple and Powerful Firewall for Linux to Replace iptables
Unix

Exploring firewalld: A Simple and Powerful Firewall for Linux to…

1 month ago06/08/2025Martin Prankevich90
There are numerous articles dedicated to configuring a firewall using iptables in Linux, and given the topic's popularity, many more are likely to be written. While basic configurations are relatively straightforward, things get complicated with complex networks…
CONTINUE READING 🡒
Setting Up the ELK Stack: Configuring Elasticsearch, Logstash, and Kibana for Log Collection and Analysis on Servers
DevOps

Setting Up the ELK Stack: Configuring Elasticsearch, Logstash, and Kibana…

2 months ago11/07/2025Martin Prankevich110
Service and application logs are often the only way to identify the source of issues, but they are usually neglected after installation and debugging. Modern approaches to development, deployment, and maintenance of applications demand a completely different…
CONTINUE READING 🡒
Avian influenza. Review of *nix vulnerabilities in 2015
Malware Unix

Avian influenza. Review of *nix vulnerabilities in 2015

22.01.201617/04/2025Martin Prankevich70
According to cvedetails.com, more than 1,305 vulnerabilities have been found in the Linux core since 1999. Sixty-eight of these were in 2015. Most of them don't cause many problems (they are marked as Local and Low), and…
CONTINUE READING 🡒
Using synctool for server configuration management
DevOps Stuff

Using synctool for server configuration management

24.08.201514/10/2015Martin Prankevich41
The problem of managing a large number of systems is not new, but it has become particularly acute following the spread of clusters and cloud services. A variety of tools has been designed in order to solve…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com