How to Hash a File in Linux and Verify it For Security

How to Hash a File in Linux and Verify it For Security

Here’s how to “hash” a file and compare it with what the sender of the file provides. This allows you to make sure that what you’re receiving is indeed what was sent. While MD5 has been shown to be insecure, we can use SHA256 instead.

How to Block an IP Address with IPTables in Linux

How to Block an IP Address with IPTables in Linux

IPTables can be an intimidating tool to use if you’ve never worked with it before. This tutorial will show you how to quickly set up logging and blocking for a specific IP address. Also, you’ll learn how to delete rules using line numbers.

How to Password Protect Files and Folders in Linux

How to Password Protect Files and Folders in Linux

Do you have some files or folders that need to be kept secret? Linux has the tools you need! For basic security, you can simply use user based permissions. For strong or advanced security, encryption is your friend. Here’s how to do both with screenshots.

Disclosure: We receive a compensation from some of the companies whose products or services are presented on our website.