How to make Kali Linux Iptables Firewall Persistent

By default, Kali Linux doesn’t use a firewall in its network interfaces. Although Kali is silent on the network on its default setting, nothing is stopping you from starting up services. And some of the most popular tools are starting up network services (and using default username/password combination)! So just to play on the safe …

How to Setup Anonymous Website in Tor Network

Setting up an anonymous website or hidden service/server in Tor network is actually easier than setting up a normal web server as Tor router will nicely breach through your firewall and NAT. The regular server requires domain and hostname (DNS), public IP address and firewall rules besides the web server software (Apache, Nginx, IIS). Hidden …

Secure Communications With Encryption

Securing modern communications in the internet require encryption. Existing electronic communication systems can be eavesdropped by a variety of parties. Examples of those parties are employers, ISPs, law enforcement agencies and national security agencies. Many of the communication systems (email, instant messaging) communicate in the internet without using any encryption or user cannot affect the …

How to keep your data safe from bad guys? – Implementing BitLocker – Part 2

Checking TPM-Module When implementing BitLocker you need to first check if the computer has the TPM-module. In Windows 10 you can check that by writing “tpm.msc” in the search box.