Faruk

Faruk @cyberwebpen

About: InfoSec Analyst | 10+ yrs in DLP, CrowdStrike, QRadar, Qualys, Linux Admin, WebLogic Admin | Python & Bash Enthusiast | Passionate about cybersecurity, automation, and continuous learning.

Joined:
Apr 27, 2025

Faruk
articles - 95 total

Why I Use Cold Backups Instead of Relying Only on Snapshots | by Faruk Ahmed | Sep, 2025

Member-only story Why I Use Cold Backups Instead of Relying Only on...

Learn More 1 0Sep 25

Why I Don’t Trust Default Firewall Rules on Linux Servers | by Faruk Ahmed | Sep, 2025

Member-only story Why I Don’t Trust Default Firewall Rules on Linux...

Learn More 1 0Sep 24

The Linux Log Hackers Hope You Never Check | by Faruk Ahmed | Sep, 2025

Member-only story The Linux Log Hackers Hope You Never Check -- Share When attackers...

Learn More 1 0Sep 24

I Asked My Linux Server to Predict My Death. The Result Froze Me | by Faruk Ahmed | Sep, 2025

Member-only story I Asked My Linux Server to Predict My Death. The Result Froze...

Learn More 1 0Sep 24

The Hidden Danger of Old Users: Why I Regularly Audit /etc/passwd on My Linux Servers | by Faruk Ahmed | nextgenthreat

Member-only story The Hidden Danger of Old Users: Why I Regularly Audit /etc/passwd on My...

Learn More 1 1Sep 24

Why I Always Use chattr to Protect Critical Linux Files | by Faruk Ahmed | Sep, 2025

Member-only story Why I Always Use chattr to Protect Critical Linux Files chattr...

Learn More 1 1Sep 24

Why I Always Restrict Cron Jobs on Linux Servers | by Faruk Ahmed | Sep, 2025

Member-only story Why I Always Restrict Cron Jobs on Linux Servers -- Share Cron is one...

Learn More 2 0Sep 24

Why I Always Disable Unused Services on Linux Servers | by Faruk Ahmed | Sep, 2025

Member-only story Why I Always Disable Unused Services on Linux Servers -- Share When I...

Learn More 1 1Sep 24

Why I Always Set a Login Banner on Linux Servers (and What I Put in It) | by Faruk Ahmed | Sep, 2025

Member-only story Why I Always Set a Login Banner on Linux Servers (and What I Put in...

Learn More 2 0Sep 24

Why I Always Disable Unused Linux Services After Installation | by Faruk Ahmed | Sep, 2025

Member-only story Why I Always Disable Unused Linux Services After...

Learn More 1 0Sep 24

Why AI-Powered Attacks Make Linux Hardening More Urgent Than Ever | by Faruk Ahmed | Aug, 2025 | AWS in Plain English

Member-only story Why AI-Powered Attacks Make Linux Hardening More Urgent Than...

Learn More 1 0Sep 5

Why I Never Allow Root SSH Logins on My Linux Servers | by Faruk Ahmed | Aug, 2025

Member-only story Why I Never Allow Root SSH Logins on My Linux...

Learn More 1 0Sep 5

Why I Enable Multi-Factor Authentication (MFA) for SSH on Linux Servers | by Faruk Ahmed | Aug, 2025

Member-only story Why I Enable Multi-Factor Authentication (MFA) for SSH on Linux...

Learn More 1 0Sep 5

Why I Always Set Up File Integrity Monitoring on Linux Servers | by Faruk Ahmed | Aug, 2025

Member-only story Why I Always Set Up File Integrity Monitoring on Linux...

Learn More 1 0Sep 5

The First 24 Hours After a Linux Breach — My Incident Response Playbook | by Faruk Ahmed | nextgenthreat | Aug, 2025

Member-only story The First 24 Hours After a Linux Breach — My Incident Response...

Learn More 1 0Aug 18

Why I Never Trust Default Linux User Accounts (And Neither Should You) | by Faruk Ahmed | Aug, 2025 | AWS in Plain English

Member-only story Why I Never Trust Default Linux User Accounts (And Neither Should...

Learn More 1 0Aug 18

Why I Use Read-Only Partitions on My Linux Servers (And You Should Too) | by Faruk Ahmed | Aug, 2025

Member-only story Why I Use Read-Only Partitions on My Linux Servers (And You Should...

Learn More 1 0Aug 18

The Hidden Risks of SSH Agent Forwarding (And How I Avoid Them) | by Faruk Ahmed | Aug, 2025

Member-only story The Hidden Risks of SSH Agent Forwarding (And How I Avoid...

Learn More 1 0Aug 18

Why I Run Multiple SSH Keys Instead of Just One | by Faruk Ahmed | Aug, 2025

Member-only story Why I Run Multiple SSH Keys Instead of Just One -- Share For many...

Learn More 1 0Aug 13

What I Do the Moment I Suspect My Ubuntu Server Has Been Compromised | by Faruk Ahmed | Aug, 2025

Member-only story What I Do the Moment I Suspect My Ubuntu Server Has Been...

Learn More 1 0Aug 13

The One Linux Security Habit That Exposes You — And How I Fixed It | by Faruk Ahmed | Aug, 2025

Member-only story The One Linux Security Habit That Exposes You — And How I Fixed...

Learn More 1 0Aug 13

Immutable Infrastructure on Linux: Why I Don’t Modify Servers After Deployment | by Faruk Ahmed | Aug, 2025

Member-only story Immutable Infrastructure on Linux: Why I Don’t Modify Servers After...

Learn More 1 0Aug 13

How I Hunt for Silent Rootkits on Linux (Before They Hunt Me) | by Faruk Ahmed | Aug, 2025

Member-only story How I Hunt for Silent Rootkits on Linux (Before They Hunt...

Learn More 1 0Aug 13

Why I No Longer Trust “Secure by Default” in Linux Server Installs | by Faruk Ahmed | Jul, 2025

Member-only story Why I No Longer Trust “Secure by Default” in Linux Server...

Learn More 1 0Aug 1

Why You Should Never Trust Default Configurations on a Fresh Linux Install | by Faruk Ahmed | Jul, 2025

Member-only story Why You Should Never Trust Default Configurations on a Fresh Linux...

Learn More 0 0Jul 29

The Ultimate Fusion: Linux, Ubuntu, and Cybersecurity | by Faruk Ahmed | Jun, 2025

Member-only story The Ultimate Fusion: Linux, Ubuntu, and...

Learn More 1 0Jul 29

The Linux Service That Almost Let Attackers Slip In (And How I Found It Just in Time) | by Faruk Ahmed | Jun, 2025

Member-only story The Linux Service That Almost Let Attackers Slip In (And How I Found It...

Learn More 0 0Jul 29

How I Use aide to Detect Unauthorized Changes on My Linux and Ubuntu Servers | by Faruk Ahmed | Jul, 2025

Member-only story How I Use aide to Detect Unauthorized Changes on My Linux and Ubuntu...

Learn More 0 0Jul 29

How I Harden My Linux Server in 30 Minutes After Every Fresh Install (Ubuntu & Red Hat) | by Faruk Ahmed | Jul, 2025

Member-only story How I Harden My Linux Server in 30 Minutes After Every Fresh Install...

Learn More 0 0Jul 29

How I Found a Hidden Reverse Shell Running as www-data (And What I Did About It) | by Faruk Ahmed | Jul, 2025

Member-only story How I Found a Hidden Reverse Shell Running as www-data (And What I Did...

Learn More 0 0Jul 29