In my previous article , I explain how to setup the Raspberry Pi to be a web server. I also demonstrate searching log files for “footprints” from the IP requests that have been made to your web server. Now, I would like to discuss protecting your web server from becoming a victim to a potentially malicious attack.
Tag: IoT
Security through Obscurity
Security and Obscurity “In security engineering, security through obscurity (or security by obscurity) is the reliance on the secrecy … More
Power to the People!
We believe you shouldn’t need expensive gadgets and technical expertise to be a successful gardener. We are committed to a … More