Forem

Faruk profile picture

Faruk

InfoSec Analyst | 10+ yrs in DLP, CrowdStrike, QRadar, Qualys, Linux Admin, WebLogic Admin | Python & Bash Enthusiast | Passionate about cybersecurity, automation, and continuous learning.

Joined Joined on  Personal website https://nextgenthreat.com

Education

BS

Pronouns

fa-rook

Work

Cyber security with backend support with Python and bash scripting

7 Critical Linux Logs You Should Review After a Security Incident | by Faruk Ahmed | nextgenthreat | Apr, 2025

7 Critical Linux Logs You Should Review After a Security Incident | by Faruk Ahmed | nextgenthreat | Apr, 2025

Comments
1 min read
6 Signs Your Linux Server Might Be Compromised (And What to Do Next) | by Faruk Ahmed | May, 2025

6 Signs Your Linux Server Might Be Compromised (And What to Do Next) | by Faruk Ahmed | May, 2025

Comments
1 min read
5 Linux Commands Hackers Use (And How to Detect Them on Your Server) | by Faruk Ahmed | Apr, 2025

5 Linux Commands Hackers Use (And How to Detect Them on Your Server) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
1 Linux Command That Saved Me From a Server Meltdown | by Faruk Ahmed | Apr, 2025

1 Linux Command That Saved Me From a Server Meltdown | by Faruk Ahmed | Apr, 2025

Comments
1 min read
The 5 Most Overlooked Linux Files That Could Expose Your Server to Hackers | by Faruk Ahmed | Apr, 2025

The 5 Most Overlooked Linux Files That Could Expose Your Server to Hackers | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Secure Your Digital Vault: A Personal Safe for Your Passwords | by Faruk Ahmed

Secure Your Digital Vault: A Personal Safe for Your Passwords | by Faruk Ahmed

Comments
1 min read
I Tried Breaking Into My Own Linux Server — Here’s What I Learned About Real-World Security | by Faruk Ahmed | Apr, 2025

I Tried Breaking Into My Own Linux Server — Here’s What I Learned About Real-World Security | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Use APIs to Build Money-Making Tools (With Python Examples) | by Faruk Ahmed | Apr, 2025

How to Use APIs to Build Money-Making Tools (With Python Examples) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Stay Productive and Focused in a World Full of Distractions | by Faruk Ahmed | Apr, 2025

How to Stay Productive and Focused in a World Full of Distractions | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Set Up a Honeypot on Your Linux Server to Catch Attackers in Action | by Faruk Ahmed | Apr, 2025

How to Set Up a Honeypot on Your Linux Server to Catch Attackers in Action | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Detect and Block Malicious IPs on Your Ubuntu Linux Server in Real Time | by Faruk Ahmed | Apr, 2025

How to Detect and Block Malicious IPs on Your Ubuntu Linux Server in Real Time | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Audit Your Linux Server for Hidden Threats in Under 15 Minutes | by Faruk Ahmed | Apr, 2025

How to Audit Your Linux Server for Hidden Threats in Under 15 Minutes | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How I Use Python to Make Extra Cash Every Month (Even as a Beginner) | by Faruk Ahmed | Apr, 2025

How I Use Python to Make Extra Cash Every Month (Even as a Beginner) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How I Harden My Linux Web Server Against Cyber Attacks (CentOS & Ubuntu Guide) | by Faruk Ahmed | Apr, 2025

How I Harden My Linux Web Server Against Cyber Attacks (CentOS & Ubuntu Guide) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How AI is Transforming Cybersecurity: Opportunities and Challenges | by Faruk Ahmed | Apr, 2025

How AI is Transforming Cybersecurity: Opportunities and Challenges | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Enhancing Your Cybersecurity Practices in 2024: | by Faruk Ahmed

Enhancing Your Cybersecurity Practices in 2024: | by Faruk Ahmed

Comments
1 min read
Encrypting and Decrypting a .txt File Using Python’s Cryptography Library | by Faruk Ahmed

Encrypting and Decrypting a .txt File Using Python’s Cryptography Library | by Faruk Ahmed

Comments
1 min read
Embracing the Unknown: How I Turned Challenges into Opportunities in the Tech World | by Faruk Ahmed | Apr, 2025

Embracing the Unknown: How I Turned Challenges into Opportunities in the Tech World | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Bitcoin: The Digital Gold of the 21st Century | by Faruk Ahmed

Bitcoin: The Digital Gold of the 21st Century | by Faruk Ahmed

Comments
1 min read
Automating Report Distribution: A Python Script for Emailing Missing Files | by Faruk Ahmed

Automating Report Distribution: A Python Script for Emailing Missing Files | by Faruk Ahmed

Comments
4 min read
8 Log Files Every Linux Admin Should Monitor Daily | by Faruk Ahmed | Apr, 2025

8 Log Files Every Linux Admin Should Monitor Daily | by Faruk Ahmed | Apr, 2025

Comments
1 min read
7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
7 Bash Mistakes I Made That Cost Me Time (And How to Avoid Them) | by Faruk Ahmed | Apr, 2025

7 Bash Mistakes I Made That Cost Me Time (And How to Avoid Them) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
6 Linux Misconfigurations I Regret Not Catching Sooner | by Faruk Ahmed | Apr, 2025

6 Linux Misconfigurations I Regret Not Catching Sooner | by Faruk Ahmed | Apr, 2025

Comments
1 min read
5 Simple Bash Scripts That Can Save You Hours (and Maybe Make You Money) | by Faruk Ahmed | Apr, 2025

5 Simple Bash Scripts That Can Save You Hours (and Maybe Make You Money) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
5 More Techniques to Lock Down Public-Facing Linux Servers | by Faruk Ahmed | Apr, 2025

5 More Techniques to Lock Down Public-Facing Linux Servers | by Faruk Ahmed | Apr, 2025

Comments
1 min read
5 Linux Hardening Techniques I Apply Before Hosting Any Website | by Faruk Ahmed | Apr, 2025

5 Linux Hardening Techniques I Apply Before Hosting Any Website | by Faruk Ahmed | Apr, 2025

Comments
1 min read
10 Security Commands Every Linux Admin Should Know (But Probably Doesn’t) | by Faruk Ahmed | Apr, 2025

10 Security Commands Every Linux Admin Should Know (But Probably Doesn’t) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
5 Linux Hardening Techniques I Apply Before Hosting Any Website

5 Linux Hardening Techniques I Apply Before Hosting Any Website

Comments
2 min read
loading...
OSZAR »