Tagged articles
3 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Nov 3, 2024 · Information Security

50 Critical Linux Ports You Must Close to Secure Your System

This guide lists the most dangerous Linux ports, explains their typical uses, the security risks they pose, and provides concrete recommendations—such as changing default ports, disabling services, and applying firewall rules—to harden your system against attacks.

Information SecurityLinuxPort Security
0 likes · 13 min read
50 Critical Linux Ports You Must Close to Secure Your System
Ops Development Stories
Ops Development Stories
Apr 22, 2019 · Information Security

How MAC Flooding and ARP Spoofing Attacks Work—and How to Defend Them

This article explains the MAC learning and aging processes, demonstrates MAC flooding and ARP spoofing attacks with practical test setups, and provides step‑by‑step configurations such as port security, access management, and DHCP snooping to protect network switches from these threats.

ARP spoofingAccess ManagementDHCP snooping
0 likes · 10 min read
How MAC Flooding and ARP Spoofing Attacks Work—and How to Defend Them