by Grant Collins | May 25, 2020 | Projects
Configure a Firewall in Linux Overview Linux has a built-in packet filtering firewall which allows system administrators to configure the IP packet filter rules of the Linux firewall. Utilizing the built-in Linux application firewall IPtables or UFW, set up and create...
by Grant Collins | May 25, 2020 | Projects
Create a Monitoring System Overview A monitoring system is a technology used to analyze network operations, performance, and to detect and alert about possible errors in the network. Configure a monitoring system in Linux using a monitoring service such as Cacti,...
by Grant Collins | May 25, 2020 | Projects
Configure the LAMP Stack Overview The Linux Apache MySQL PHP (LAMP) stack is a common web server implementation. Setup and configure each service to create a web server, sharpen your skills using each service after downloading the LAMP stack. Project Recommendations...
by Grant Collins | May 18, 2020 | Projects
Write a Password Generator Program Overview Password security is a very important subject to consider. Without strong passwords, an adversary will be able to gain access to user accounts, websites, and more. Using the programming language of your choice, create a...
by Grant Collins | May 18, 2020 | Projects
Create a Port Scanner Overview A port scanner is a method used to determine which ports are open on a network. Port scanners can vary in complexity. From using a port scanner, an attacker could use the information received from the port scan to target an open or...
by Grant Collins | May 18, 2020 | Projects
Write a Hash Cracker Overview A hash function is used to map data of any size into a fixed-size value. Hashes are used to verify the integrity of data. Using the programming language of your choice, write a program to generate a hash using a broken hashing algorithm....