Rayhunter Installation Tutorial: Convert Verizon Orbic Speed RC400L into a "Stingray" Detector

Rayhunter Tutorial: Convert a Verizon Orbic Speed RC400L into a Stingray Detector

In this tutorial, we will show you how to install Rayhunter on a Verizon Orbic Speed RC400L mobile hotspot using Kali GNU/Linux on a x86_64 architecture computer. This article will also detail accessing the Rayhunter web interface, maintaining your Rayhunter, and [optionally] reporting Cell Site Simulator (also known as IMSI-catcher or “Stingray”) detection data to the Electronic Frontier Foundation (EFF) for further analyzation. Rayhunter setup is cheap (~$20) and user-friendly – a project for technical and less-technical users alike!

NOTE
Although not covered in this tutorial, Rayhunter is also able to be installed using Operating Systems other than GNU/Linux such as MacOS and Windows, and computer architectures other than x86_64, such as ARM64, and ARMv7/v8 32-bit.

Read more

Practical Examples: Understanding and Using the Sudo Command in Linux

sudo Command in Linux: sudo -i, sudo -s examples and more

This tutorial will guide you through the basics of the sudo command, which enables a permitted user to execute a command as the superuser or another user, as specified by the security policy in the sudoers file. We’ll explore not only the installation and basic usage of sudo but also dive into interactive shell options like sudo -i and sudo -s, configuring detailed permissions through the sudoers file, ensuring both flexibility and security in administrative operations. You’ll learn how to define access for individual users and groups, customize command execution environments, and implement security practices that restrict or log usage. By understanding these configurations, you’ll be able to effectively manage privileges on your system, safeguarding it against unauthorized changes while facilitating necessary administrative tasks.

Read more

Fedora Enable SSH: Install and Configure SSH Server

The tutorial will explain how to fedora enable ssh server and SSH client connections on fedora linux Workstation. By default the SSH server on Fedora Workstation may be installed but not enabled. This will cause a following error message when connecting via SSH client:
ssh: connect to host fedora-workstation port 22: Connection refused

In this tutorial you will learn:

  • How to fedora enable ssh server
  • How to enable ssh server
  • How to start ssh server
  • How to Connect to SSH server

Read more

How to ssh to IPv6 address on Linux

IPv6, the newest network address standard for the whole internet, is becoming more widespread and will eventually replace IPv4 entirely. Sooner or later, network admins and computer hobbyists alike will find themselves interacting with IPv6 network addresses.

Simple tasks like using SSH to control a remote system will now change a little, so it’s important to relearn a few of the basics for SSH IPv6 connections. In this guide, we’ll show how to SSH to an IPv6 address on a Linux system. These methods will work with all the most popular Linux distributions.

Read more

301 Redirect HTTP to HTTPS in NGINX: Quick Tutorial

If your website is hosted with NGINX and it has SSL enabled, it’s best practice to disable HTTP completely and force all incoming traffic over to the HTTPS version of the website. This guide will show you how to configure a 301 redirect HTTP to HTTPS to avoid duplicate content and ensure that all of the site’s users are only browsing the secure version of your website. In this guide, we’ll assume you’re already using NGINX on a Linux system and want to implement an nginx redirect HTTP to HTTPS. Even if a user happens to follow an http:// link, the site should send them to the correct and secured page, which happens instantly and without the user’s intervention.

There are two ways to setup this redirection in NGINX. One method allows you to configure the redirection for individual sites. The other method can redirect HTTP to HTTPS for all NGINX sites on your server, which is handy if you have multiple sites setup and want to avoid having to apply the exact same redirection to each one. We’ll cover the step by step instructions for both methods below. Let’s get started.

NOTE
Using Apache instead of NGINX? We’ve written a separate guide for how to use Apache to redirect all HTTP traffic to HTTPS.

In this tutorial you will learn:

  • How to redirect HTTP to HTTPS for individual NGINX websites
  • How to redirect HTTP to HTTPS for all NGINX websites

Read more

WordPress Brute Force Testing with Hydra: Complete Security Guide

WordPress Brute Force Testing with Hydra: Complete Security Guide

WordPress brute force attacks are among the most common security threats facing website owners in 2025. With WordPress powering over 40% of the web, understanding how to test your site against login attacks using tools like Hydra password cracker and curl is essential. This comprehensive guide demonstrates hydra brute force testing techniques to evaluate and strengthen your login security.

Read more

Explaining the Sticky Bit: What the "t" in Linux Directory Permissions Means

Explaining the Sticky Bit: What the “t” in Linux Directory Permissions Means

Most seasoned Linux users are already familiar with basic file permissions like read, write, and execute. These permissions exist on every file and administrators often need to edit such permissions in order to tighten up security or grant file access to certain users. A less common permission that you may not be as intimately familiar with is the “sticky bit.”

Read more

How to ZIP file with password on Linux

If you have one or more files that you need to send to a friend or store for a long time, compressing the files into a .zip archive is a good way to save on space and combine all files into a single object. If you need to keep the file contents private, for fear that they could be intercepted by the wrong party, or that someone could try to access them on your own system, then it is possible to add a password to your zip file. In this tutorial, you will learn how to zip files and add a password to your zip archive on a Linux system.

Read more

sudo command not found – Solution

If you have tried to run the sudo command on your Linux system and are greeted with a sudo command not found error, we have the solution for you. This error most commonly occurs on minimal installs, such as in Docker or on a VPS (virtual private server), and can happen on any Linux distro, like Ubuntu Linux and Debian . In this tutorial, we will show you how to resolve the error and give you the ability to run sudo commands without error.

Read more

How to configure firewall in Ubuntu 18.04

A properly configured firewall is one of the most important aspects of the overall system security. By default Ubuntu comes with a firewall configuration tool called UFW (Uncomplicated Firewall).

UFW is a user-friendly front-end for managing iptables firewall rules and its main goal is to make managing iptables easier or as the name says uncomplicated. Ubuntu’s firewall is designed as an easy way to perform basic firewall tasks without learning iptables. It doesn’t offer all the power of the standard iptables commands, but it’s less complex. If needed, you can install ufw manually on your system.

In this tutorial you will learn:

  • What is UFW and its Overview.
  • How to Install UFW and Perform Status Check.
  • How to Use IPv6 with UFW.
  • UFW Default Policies.
  • Application Profiles.
  • How to Allow and Deny Connections.
  • Firewall Log.
  • How to Delete UFW Rules.
  • How to Disable and Reset UFW.

Read more