Building a Spam Filter Using Machine Learning

Machine learning is everywhere. From self driving cars to face recognition on Facebook, it is machine learning behind the scenes that drives all of it. If you’ve ever used GMail or Yahoo Mail, you...

Customizing and coloring the bash prompt

If you’re already not familiar with bash, the prompt is the little blurb of text displayed when it asks for a command. It capable of communicating a lot, but most people don’t use it...

SSH bruteforce log

Protecting SSH with Fail2ban

SSH allows you to log in to a remote computer or server and control it through a command-line interface. However, because SSH is exposed to the internet; attackers can try to log in by...

cdn cover photo

What is a CDN and How to Use It

You may have come across the buzzword called CDN and may have probably wondered what it is. In this article, we are going to demystify this term and explain how to use it for...

speed amp

How to Speed up Your Website up to 85% Using AMP

We all have the experience of loading resource intensive sites in patchy networks. The truth is, the pages take forever to load! This has been a big problem for web developers especially if the...

fail2ban

Blocking bad bots with Fail2ban

Fail2ban is a versatile security tool. While it is primarily used for preventing brute-force attacks against SSH, it can also be used for protecting other services. There are bots which go around scanning the...

smart lock cover photo

How to Use Google as a Password Manager

Did you know you can save up all those bucks that you have been spending all these years for a password manager? Google has its own password manager that many of us would not...