GeekBits
  • Hosting
  • Write For Us
  • Advertise With Us
  • Free Resources & Giveaways
Launched GeekBits Tools
Announcement to the launching of geekbits tools. A swiss army knife for all your development and geeky needs.…
Learn more ⟶
Badges
Here at GeekBits, we appreciate your loyaly. Hence, we are always giving…
Learn more ⟶
Sign in Sign up
Sign up Sign in
  • Home
  • Linux
  • Windows
  • Networking
  • Development
  • Hardware
  • IoT
  • Reviews
  • Security
  • Cheat Sheets
  • Hosting
  • Guest Posts
  • Hosting
  • Free Resources
  • Library
  • Request Topic
  • About Us
  • Contact Us
  • Join Us
  • Community Policy
  • Privacy Policy
Bookmarks
Security

Security

Hello security professionals. In this section, we aim to share with you some cool guides to help you stay on top of your game. Your job is busy enough as it is and having something to simply it is always beneficial. We got you.
12 posts
How to use a GPG key for SSH authentication
Security Linux

How to use a GPG key for SSH authentication

public – 13 min read
In this article you learn how to generate a GPG key-pair, and convert it to an SSH key for authentication with your Linode.
Mar 19, 2023
J4y J3ff J4y J3ff
How to Use the ip Command in Linux
Security Networking Linux

How to Use the ip Command in Linux

public – 12 min read
This guide describes the Linux ip command and how to use it, along with a list of the main options.
Mar 10, 2023
J4y J3ff J4y J3ff
How to Update the Windows Defender Using the Command Prompt
Windows Security

How to Update the Windows Defender Using the Command Prompt

public – 3 min read
This guide shows how you can update the Microsoft defender using the command prompt to ensure that you system is protected from malware.
Mar 1, 2023
J4y J3ff J4y J3ff
How to Run a Virus Scan from the Command Prompt
Windows Security

How to Run a Virus Scan from the Command Prompt

public – 4 min read
In this article, you will learn how you can perform a virus scan from the windows cmmand prompt to protect your system from malware threats.
Mar 1, 2023
J4y J3ff J4y J3ff
How to Setup Automatic Kernel Updates on Ubuntu 22.04
Security Linux

How to Setup Automatic Kernel Updates on Ubuntu 22.04

public – 4 min read
Learn how you can setup and configure Automatic Kernel Updates on your Linux machine.
Feb 20, 2023
J4y J3ff J4y J3ff
How to create a self-hosted password manager using Bitwarden
Security

How to create a self-hosted password manager using Bitwarden

public – 7 min read
A password manager is a tool that helps you securely store and manage your passwords and other sensitive information, such…
Jan 25, 2023
J4y J3ff J4y J3ff
What is Elasticsearch - A Cool Introduction to ELK
Development Networking Linux

What is Elasticsearch - A Cool Introduction to ELK

public – 4 min read
In this tutorial, we will introduce you to the ELK Stack. You will learn what Elasticsearch, Kibana, and Logstash are. You will also learn the building blocks of Elasticsearch and more.
Jan 6, 2023
Captain Salem Captain Salem
Introduction to Reverse Engineering - What is Assembly Code?
Security hacking ctf

Introduction to Reverse Engineering - What is Assembly Code?

public – 6 min read
A beginner-friendly tutorial that teaches you the basics of reverse engineering by learning about assembly or machine code.
Nov 25, 2022
Captain Salem Captain Salem
How to recursive change file permissions in Linux
Linux Security

How to recursive change file permissions in Linux

public – 3 min read
This guide explains how to change file/directory permissions recursively using the -R option.
Aug 21, 2022
J4y J3ff J4y J3ff
The fundamentals of Linux file Permissions
Linux Security

The fundamentals of Linux file Permissions

public – 5 min read
In this article, you get to explore the Linux file permissions, how to use them, view them, set them and the octal notation.
Aug 21, 2022
J4y J3ff J4y J3ff
Netcat Command Cheat Sheet
Linux Security Networking

Netcat Command Cheat Sheet

public – 5 min read
Get the list of most popular and useful netcat commands. Get a free PDF to accompany you.
Jul 11, 2022
Captain Salem Captain Salem
How to send Encrypted Messages with GPG
Linux Security

How to send Encrypted Messages with GPG

public – 8 min read
Explore how you can use the GNU Privacy Guard to send encrypted messages on Windows and Linux.
Jun 24, 2022
Captain Salem Captain Salem

Ready to get started now?

Subscribe to get access to premium content or contact us if you have any questions.
Subscribe Contact us
GeekBits
High Quality Tech Tips, Tricks and Tutorials
Navigation
  • Home
  • Linux
  • Windows
  • Networking
  • Development
  • Hardware
  • IoT
  • Reviews
  • Security
  • Cheat Sheets
  • Hosting
  • Guest Posts
Quick links
  • Hosting
  • Free Resources
  • Library
  • Request Topic
  • About Us
  • Contact Us
  • Join Us
  • Community Policy
  • Privacy Policy
Tags
Development Linux Windows Networking macOS
©2023 GeekBits. All Rights Reserved, GeekBits Inc. Supported By Linode
Great! Next, complete checkout for full access to GeekBits.
Welcome back! You've successfully signed in.
You've successfully subscribed to GeekBits.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.