Control search engine crawlers

How to Control search engine crawlers with a robots.txt file Website owners, can instruct search engines on how they should crawl a website, by using a robots.txt file. When a search engine crawls a website, it requests the robots.txt file first and then follows the rules within. It’s important to […]

Installation/Upgradation of IPTABLES and CSF

Steps to Update/Install iptables iptables v1.6.0 cd /usr/src wget -O /usr/src/iptables-1.6.0.tar.bz2     https://www.netfilter.org/projects/iptables/files/iptables-1.6.0.tar.bz2 –no-check-certificate tar -jxf iptables-1.6.0.tar.bz2 cd iptables-1.6.0 ./configure –prefix=/myiptables –with-xtlibdir=/lib/xtables –disable-nftables make make install mv /sbin/iptables /myiptables/iptables.backup mv /sbin/iptables-restore /myiptables/iptables-restore.backup mv /sbin/iptables-save /myiptables/iptables-save.backup ln -s /myiptables/sbin/iptables /sbin/iptables ln -s /myiptables/sbin/iptables-restore /sbin/iptables-restore ln -s /myiptables/sbin/iptables-save /sbin/iptables-save ———– For […]

SSH Automation

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.[1] The best-known example application is for remote login to computer systems by users. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with an […]

How to install tor browser in ubuntu

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor protects you by bouncing your communications around a distributed network of relays run by volunteers […]

Page 1 Page 2