Submit your search
2022-01-26
How to sign a file or message using gpg?

Many businesses are responsible for maintaining large amounts of confidential data, including customer records, medical records, financial reports, sensitive documents, and much more. It’s very common for these types of information to be transmitted via email or other services. So how can you ensure confidential data transmitted via email is kept private? How can you […]

Read More
2022-01-25
5 tips to enhance security for your XPR account

The rise in popularity of cryptocurrencies has encouraged cybercriminals to find innovative ways to attack markets, users and any structure where cryptocurrencies are stored. In simple words, if an attacker is able to exploit some area of a chain, smart contract, exchange or illegitimately withdraw cryptocurrency, it would be deemed as a hack or stealing. […]

Read More
2022-01-25
How to back up your WebAuth private key? (advanced)

In this guide we will introduce you to private keys, their importance inside a cryptocurrency wallet and the reasons why you must back them up securely. Beside that we will also give you a practical example, where to safely store your private keys. Owners of 'user-controlled wallets' like WebAuth sometimes lose their devices or fail […]

Read More
2022-01-25
How to back up SSH keys?

Backup copies allow data to be restored from an earlier point in time to help the business recover from an unplanned event. Storing the copy of the data on separate medium is critical to protect against primary data loss or corruption. Data backup should be an essential part of your computer/server usage routine. One of […]

Read More
2022-01-21
How to create AppArmor profile for Nginx

AppArmor is a Mandatory Access Control (MAC) system which is a kernel (LSM) enhancement to confine programs to a limited set of resources. AppArmor's security model is to bind access control attributes to programs rather than to users. AppArmor confinement is provided via profiles loaded into the kernel, typically on boot. AppArmor profiles can be […]

Read More
2022-01-19
How to protect your server using SSH keys

Secure Socket Shell (SSH), also called Secure Shell, is a special network protocol leveraging public-key cryptography to enable authorized users to remotely access a computer or other device via access credentials called SSH keys. Because they are used to access sensitive resources and perform critical, highly privileged activities, it’s vital to properly manage SSH keys […]

Read More

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
ALVOSEC
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram