Faruk

Faruk @cyberwebpen

About: InfoSec Analyst | 10+ yrs in DLP, CrowdStrike, QRadar, Qualys, Linux Admin, WebLogic Admin | Python & Bash Enthusiast | Passionate about cybersecurity, automation, and continuous learning.

Joined:
Apr 27, 2025

Faruk
articles - 56 total

Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers | by Faruk Ahmed | Jun, 2025

Member-only story Why I Never Trust Pre-Installed Packages on Linux or Ubuntu...

Learn More 0 1Jun 17

Why I Check for Hidden Processes Every Week on My Linux Servers (And You Should Too) | by Faruk Ahmed | Jun, 2025

Member-only story Why I Check for Hidden Processes Every Week on My Linux Servers (And You...

Learn More 0 0Jun 13

How I Found an Unknown Cron Job Mining Crypto on My Ubuntu Server | by Faruk Ahmed | Jun, 2025

How I Found an Unknown Cron Job Mining Crypto on My Ubuntu...

Learn More 0 0Jun 13

7 CIS Security Best Practices I Apply on Every Linux Server I Set Up | by Faruk Ahmed | Jun, 2025

Member-only story 7 CIS Security Best Practices I Apply on Every Linux Server I Set...

Learn More 0 0Jun 13

How I Use auditd to Catch Hidden Changes on My Linux Server | by Faruk Ahmed | Jun, 2025

Member-only story How I Use auditd to Catch Hidden Changes on My Linux...

Learn More 0 2Jun 8

How I Spot a Suspicious Process on My Linux Server (Before It Does Damage) | by Faruk Ahmed | Jun, 2025

Member-only story How I Spot a Suspicious Process on My Linux Server (Before It Does...

Learn More 0 1Jun 8

Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers | by Faruk Ahmed | Jun, 2025

Member-only story Why I Never Trust Pre-Installed Packages on Linux or Ubuntu...

Learn More 0 0Jun 5

What I Do Before Letting Any App Run as Root on My Linux Server | by Faruk Ahmed | Jun, 2025

Member-only story What I Do Before Letting Any App Run as Root on My Linux...

Learn More 0 0Jun 5

How to Automatically Lock Out SSH Brute-Force Attacks on Ubuntu and Red Hat | by Faruk Ahmed | Jun, 2025

Member-only story How to Automatically Lock Out SSH Brute-Force Attacks on Ubuntu and Red...

Learn More 0 0Jun 5

What I Learned Publishing 5 Technical Blogs in 7 Days on Medium | by Faruk Ahmed | May, 2025

Member-only story What I Learned Publishing 5 Technical Blogs in 7 Days on...

Learn More 0 0May 31

Why I Treat Every New Linux Server as Already Compromised | by Faruk Ahmed | May, 2025

Member-only story Why I Treat Every New Linux Server as Already Compromised -- Share ...

Learn More 0 0May 30

What I Check First When a Linux Server Starts Acting Suspicious | by Faruk Ahmed | May, 2025

Member-only story What I Check First When a Linux Server Starts Acting...

Learn More 0 0May 30

The One Linux Security Habit That Saved Me From a Silent Breach | by Faruk Ahmed | May, 2025

Member-only story The One Linux Security Habit That Saved Me From a Silent...

Learn More 0 0May 30

The 5 Most Dangerous Linux Services If Left Unsecured | by Faruk Ahmed | May, 2025

Member-only story The 5 Most Dangerous Linux Services If Left Unsecured -- Share ...

Learn More 0 0May 30

I Taught My Linux Server to Feel Regret — Then Watched It Apologize in Real-Time | by Faruk Ahmed | May, 2025

Member-only story I Taught My Linux Server to Feel Regret — Then Watched It Apologize in...

Learn More 0 0May 30

How to Detect Suspicious Activity on a Linux Server in Under 5 Minutes | by Faruk Ahmed | May, 2025

Member-only story How to Detect Suspicious Activity on a Linux Server in Under 5...

Learn More 0 0May 30

How I Use Bash Scripts to Save Time and Earn More as a Linux Freelancer | by Faruk Ahmed | May, 2025

Member-only story How I Use Bash Scripts to Save Time and Earn More as a Linux...

Learn More 0 0May 30

How I Use AuditD to Catch Silent Security Threats on Linux | by Faruk Ahmed | May, 2025

Member-only story How I Use AuditD to Catch Silent Security Threats on Linux -- Share ...

Learn More 0 0May 30

How I Caught a Suspicious Shell Script Running in /tmp (And What It Taught Me) | by Faruk Ahmed | May, 2025

Member-only story How I Caught a Suspicious Shell Script Running in /tmp (And What It...

Learn More 0 0May 30

How I Accidentally Left a Port Open on My Linux Server (And How I Caught It) | by Faruk Ahmed | May, 2025

Member-only story How I Accidentally Left a Port Open on My Linux Server (And How I Caught...

Learn More 0 0May 30

7 Windows Server Defaults You Should Change Right After Installation | by Faruk Ahmed | May, 2025

Member-only story 7 Windows Server Defaults You Should Change Right After...

Learn More 0 0May 30

5 Windows Defender Features You’re Probably Not Using (But Should Be) | by Faruk Ahmed | May, 2025

Member-only story 5 Windows Defender Features You’re Probably Not Using (But Should...

Learn More 0 0May 30

How I Rebuild a Linux Server After a Suspected Compromise (Step by Step) | by Faruk Ahmed | May, 2025

Member-only story How I Rebuild a Linux Server After a Suspected Compromise (Step by...

Learn More 0 0May 30

How I Use Fail2Ban on Ubuntu and Linux to Block Attackers Before They Get In | by Faruk Ahmed | May, 2025

Member-only story How I Use Fail2Ban on Ubuntu and Linux to Block Attackers Before They Get...

Learn More 0 0May 30

How to Audit a Linux or Ubuntu Server Like a Security Consultant | by Faruk Ahmed | May, 2025

Member-only story How to Audit a Linux or Ubuntu Server Like a Security...

Learn More 0 0May 30

The One Log Entry That Made Me Realize My Linux Server Was Being Scanned | by Faruk Ahmed | May, 2025

Member-only story The One Log Entry That Made Me Realize My Linux Server Was Being...

Learn More 0 0May 30

Why I Use Read-Only Partitions on My Linux Servers (And You Should Too) | by Faruk Ahmed | May, 2025

Member-only story Why I Use Read-Only Partitions on My Linux Servers (And You Should...

Learn More 0 0May 30

7 Critical Linux Logs You Should Review After a Security Incident | by Faruk Ahmed | nextgenthreat | Apr, 2025

Member-only story 7 Critical Linux Logs You Should Review After a Security...

Learn More 0 0May 3

6 Signs Your Linux Server Might Be Compromised (And What to Do Next) | by Faruk Ahmed | May, 2025

Member-only story 6 Signs Your Linux Server Might Be Compromised (And What to Do...

Learn More 0 0May 3

5 Linux Commands Hackers Use (And How to Detect Them on Your Server) | by Faruk Ahmed | Apr, 2025

Member-only story 5 Linux Commands Hackers Use (And How to Detect Them on Your...

Learn More 0 0May 3