Ever wondered what the best Antivirus for your Windows device is? In this article I will summarize the best Antivirus software of 2018 that has been independently tested by AV-TEST.
The Snort package allows you to turn a pfSense firewall into a powerful network intrusion detection system. Learn how to set it up here.
Proxy servers can be very useful for improving the speed of an internet connection by caching, logging internet usage, or filtering the traffic. Learn how to setup a transparent proxy using pfSense.
Hackers are capitalizing on the lack of security of networks that have moved their entire workforce to a remote connection.
SSH is a very versatile and secure method for remotely connecting to a pfSense router. SSH can provide remote console access, securely transfer files, and even remotely run applications. This hub will walk you through all of the configuration settings for SSH with detailed screenshots.
By default the Squid Proxy has no visibility of encrypted HTTPS traffic. Enabling HTTPS interception will allow you to monitor and log encrypted web traffic passing through the Squid proxy server.
In this hub I'm going to explain the how to set up a radius server with the FreeRadius2 package on pfSense. FreeRadius is a popular open source Radius server. Radius servers provide a central authentication source for routers, switches, VPN servers, and other network devices.
I go over what people should do to secure their online accounts. So much important information and data are kept in online accounts these days, yet some people do very little to protect them. This article will make sure you do everything you can to keep your online accounts safe.
Cloudflare provides up to 5 firewall rules for free that can be used to harden WordPress sites, protect the admin area, and block automated wp-login.php scans before they even reach the host server.
eBay quickly became and has remained one of the largest selling platforms online, but is it SAFE? This article discusses some of the ways eBay sellers get scammed
Most users keep their personal data on a public cloud. In this article, we can review the risks of keeping important data on a public cloud, and why a private cloud is much safer.
In this post, I'll explain to you the what, why, and how of protecting your computers and online activities. Cyber security explained is perfect for beginners who just recently became aware of it. Whether you're an individual, a small or large business owner, learn why cyber security matters.
Thanks to the Digital Age, we're more connected than ever before. Yet, that could also mean we're more vulnerable to exposure. Here are six ways to keep your identity, as well as those of your family members, as protected as possible against identity theft.
The CIA triad is used by organizations to secure classified data. Apply the CIA framework in your day-to-day life to help keep your information secure from hackers.
The pfBlocker package adds the ability to add IP block lists to a pfSense router or firewall. The package combines the functionality of the popular IP Block List and Country Block packages. There are several free block lists which target hackers, viruses, spammers, and botnets.