Do you have a problem with using Tor network and you think that your ISP blocks connection to Tor ?!! Tor have the solution , just use it.
ISP block Tor Network fix

Do you have a problem with using Tor network and you think that your ISP blocks connection to Tor ?!! Tor have the solution , just use it.
How to install Kali Linux tools on Ubuntu based OS. Many users needs only some tools from Kali Linux and don’t prefer to install a full Kali OS ,
If you try to hack by brute forcing attack on password to login, or try to crack passwords hashes, you will need a good password list that fit your situation based on information you gathered about the target.
Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies,it is a mandatory access controls (MAC) . It was a project by NSA and Red Hat and now being developed by Red Hat.
Rich rules provide a much greater level of control through more custom granular options. Rich rules can also be used to configure logging, masquerading, port forwarding, and rate limiting.
In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.
Zones are pre-constructed rulesets for various trust levels you would likely have for a given location or scenario (e.g. home, public, trusted, etc.). Different zones allow different network services and incoming traffic types while denying everything else. After enabling FirewallD for the first time, Public will be the default zone.
A firewall is a network security system, either hardware- or software-based, that uses rules to control incoming and outgoing network traffic.
Do you want to stay anonymous online, stay safe from ARP poisonong attacks, so you need to hide your machine from others, let’s hide linux on lan. You may have been attacked by someone on your LAN by redirecting or spoofing your connections to his own machine and watch all your packets including http and