DEV Community

Faruk profile picture

Faruk

InfoSec Analyst | 10+ yrs in DLP, CrowdStrike, QRadar, Qualys, Linux Admin, WebLogic Admin | Python & Bash Enthusiast | Passionate about cybersecurity, automation, and continuous learning.

Joined Joined on  Personal website https://nextgenthreat.com

Education

BS

Pronouns

fa-rook

Work

Cyber security with backend support with Python and bash scripting

Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers | by Faruk Ahmed | Jun, 2025

Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers | by Faruk Ahmed | Jun, 2025

Comments 1
1 min read
Why I Check for Hidden Processes Every Week on My Linux Servers (And You Should Too) | by Faruk Ahmed | Jun, 2025

Why I Check for Hidden Processes Every Week on My Linux Servers (And You Should Too) | by Faruk Ahmed | Jun, 2025

Comments
1 min read
How I Found an Unknown Cron Job Mining Crypto on My Ubuntu Server | by Faruk Ahmed | Jun, 2025

How I Found an Unknown Cron Job Mining Crypto on My Ubuntu Server | by Faruk Ahmed | Jun, 2025

Comments
2 min read
7 CIS Security Best Practices I Apply on Every Linux Server I Set Up | by Faruk Ahmed | Jun, 2025

7 CIS Security Best Practices I Apply on Every Linux Server I Set Up | by Faruk Ahmed | Jun, 2025

Comments
1 min read
How I Use auditd to Catch Hidden Changes on My Linux Server | by Faruk Ahmed | Jun, 2025

How I Use auditd to Catch Hidden Changes on My Linux Server | by Faruk Ahmed | Jun, 2025

Comments 2
1 min read
How I Spot a Suspicious Process on My Linux Server (Before It Does Damage) | by Faruk Ahmed | Jun, 2025

How I Spot a Suspicious Process on My Linux Server (Before It Does Damage) | by Faruk Ahmed | Jun, 2025

Comments 1
1 min read
Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers | by Faruk Ahmed | Jun, 2025

Why I Never Trust Pre-Installed Packages on Linux or Ubuntu Servers | by Faruk Ahmed | Jun, 2025

Comments
1 min read
What I Do Before Letting Any App Run as Root on My Linux Server | by Faruk Ahmed | Jun, 2025

What I Do Before Letting Any App Run as Root on My Linux Server | by Faruk Ahmed | Jun, 2025

Comments
1 min read
How to Automatically Lock Out SSH Brute-Force Attacks on Ubuntu and Red Hat | by Faruk Ahmed | Jun, 2025

How to Automatically Lock Out SSH Brute-Force Attacks on Ubuntu and Red Hat | by Faruk Ahmed | Jun, 2025

Comments
1 min read
What I Learned Publishing 5 Technical Blogs in 7 Days on Medium | by Faruk Ahmed | May, 2025

What I Learned Publishing 5 Technical Blogs in 7 Days on Medium | by Faruk Ahmed | May, 2025

Comments
1 min read
Why I Treat Every New Linux Server as Already Compromised | by Faruk Ahmed | May, 2025

Why I Treat Every New Linux Server as Already Compromised | by Faruk Ahmed | May, 2025

Comments
1 min read
What I Check First When a Linux Server Starts Acting Suspicious | by Faruk Ahmed | May, 2025

What I Check First When a Linux Server Starts Acting Suspicious | by Faruk Ahmed | May, 2025

Comments
1 min read
The One Linux Security Habit That Saved Me From a Silent Breach | by Faruk Ahmed | May, 2025

The One Linux Security Habit That Saved Me From a Silent Breach | by Faruk Ahmed | May, 2025

Comments
1 min read
The 5 Most Dangerous Linux Services If Left Unsecured | by Faruk Ahmed | May, 2025

The 5 Most Dangerous Linux Services If Left Unsecured | by Faruk Ahmed | May, 2025

Comments
1 min read
I Taught My Linux Server to Feel Regret — Then Watched It Apologize in Real-Time | by Faruk Ahmed | May, 2025

I Taught My Linux Server to Feel Regret — Then Watched It Apologize in Real-Time | by Faruk Ahmed | May, 2025

Comments
1 min read
How to Detect Suspicious Activity on a Linux Server in Under 5 Minutes | by Faruk Ahmed | May, 2025

How to Detect Suspicious Activity on a Linux Server in Under 5 Minutes | by Faruk Ahmed | May, 2025

Comments
1 min read
How I Use Bash Scripts to Save Time and Earn More as a Linux Freelancer | by Faruk Ahmed | May, 2025

How I Use Bash Scripts to Save Time and Earn More as a Linux Freelancer | by Faruk Ahmed | May, 2025

Comments
1 min read
How I Use AuditD to Catch Silent Security Threats on Linux | by Faruk Ahmed | May, 2025

How I Use AuditD to Catch Silent Security Threats on Linux | by Faruk Ahmed | May, 2025

Comments
1 min read
How I Caught a Suspicious Shell Script Running in /tmp (And What It Taught Me) | by Faruk Ahmed | May, 2025

How I Caught a Suspicious Shell Script Running in /tmp (And What It Taught Me) | by Faruk Ahmed | May, 2025

Comments
1 min read
How I Accidentally Left a Port Open on My Linux Server (And How I Caught It) | by Faruk Ahmed | May, 2025

How I Accidentally Left a Port Open on My Linux Server (And How I Caught It) | by Faruk Ahmed | May, 2025

Comments
1 min read
7 Windows Server Defaults You Should Change Right After Installation | by Faruk Ahmed | May, 2025

7 Windows Server Defaults You Should Change Right After Installation | by Faruk Ahmed | May, 2025

Comments
1 min read
5 Windows Defender Features You’re Probably Not Using (But Should Be) | by Faruk Ahmed | May, 2025

5 Windows Defender Features You’re Probably Not Using (But Should Be) | by Faruk Ahmed | May, 2025

Comments
1 min read
How I Rebuild a Linux Server After a Suspected Compromise (Step by Step) | by Faruk Ahmed | May, 2025

How I Rebuild a Linux Server After a Suspected Compromise (Step by Step) | by Faruk Ahmed | May, 2025

Comments
1 min read
How I Use Fail2Ban on Ubuntu and Linux to Block Attackers Before They Get In | by Faruk Ahmed | May, 2025

How I Use Fail2Ban on Ubuntu and Linux to Block Attackers Before They Get In | by Faruk Ahmed | May, 2025

Comments
1 min read
How to Audit a Linux or Ubuntu Server Like a Security Consultant | by Faruk Ahmed | May, 2025

How to Audit a Linux or Ubuntu Server Like a Security Consultant | by Faruk Ahmed | May, 2025

Comments
1 min read
The One Log Entry That Made Me Realize My Linux Server Was Being Scanned | by Faruk Ahmed | May, 2025

The One Log Entry That Made Me Realize My Linux Server Was Being Scanned | by Faruk Ahmed | May, 2025

Comments
1 min read
Why I Use Read-Only Partitions on My Linux Servers (And You Should Too) | by Faruk Ahmed | May, 2025

Why I Use Read-Only Partitions on My Linux Servers (And You Should Too) | by Faruk Ahmed | May, 2025

Comments
1 min read
7 Critical Linux Logs You Should Review After a Security Incident | by Faruk Ahmed | nextgenthreat | Apr, 2025

7 Critical Linux Logs You Should Review After a Security Incident | by Faruk Ahmed | nextgenthreat | Apr, 2025

Comments
1 min read
6 Signs Your Linux Server Might Be Compromised (And What to Do Next) | by Faruk Ahmed | May, 2025

6 Signs Your Linux Server Might Be Compromised (And What to Do Next) | by Faruk Ahmed | May, 2025

Comments
1 min read
5 Linux Commands Hackers Use (And How to Detect Them on Your Server) | by Faruk Ahmed | Apr, 2025

5 Linux Commands Hackers Use (And How to Detect Them on Your Server) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
1 Linux Command That Saved Me From a Server Meltdown | by Faruk Ahmed | Apr, 2025

1 Linux Command That Saved Me From a Server Meltdown | by Faruk Ahmed | Apr, 2025

Comments
1 min read
The 5 Most Overlooked Linux Files That Could Expose Your Server to Hackers | by Faruk Ahmed | Apr, 2025

The 5 Most Overlooked Linux Files That Could Expose Your Server to Hackers | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Secure Your Digital Vault: A Personal Safe for Your Passwords | by Faruk Ahmed

Secure Your Digital Vault: A Personal Safe for Your Passwords | by Faruk Ahmed

Comments
1 min read
I Tried Breaking Into My Own Linux Server — Here’s What I Learned About Real-World Security | by Faruk Ahmed | Apr, 2025

I Tried Breaking Into My Own Linux Server — Here’s What I Learned About Real-World Security | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Use APIs to Build Money-Making Tools (With Python Examples) | by Faruk Ahmed | Apr, 2025

How to Use APIs to Build Money-Making Tools (With Python Examples) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Stay Productive and Focused in a World Full of Distractions | by Faruk Ahmed | Apr, 2025

How to Stay Productive and Focused in a World Full of Distractions | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Set Up a Honeypot on Your Linux Server to Catch Attackers in Action | by Faruk Ahmed | Apr, 2025

How to Set Up a Honeypot on Your Linux Server to Catch Attackers in Action | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Detect and Block Malicious IPs on Your Ubuntu Linux Server in Real Time | by Faruk Ahmed | Apr, 2025

How to Detect and Block Malicious IPs on Your Ubuntu Linux Server in Real Time | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How to Audit Your Linux Server for Hidden Threats in Under 15 Minutes | by Faruk Ahmed | Apr, 2025

How to Audit Your Linux Server for Hidden Threats in Under 15 Minutes | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How I Use Python to Make Extra Cash Every Month (Even as a Beginner) | by Faruk Ahmed | Apr, 2025

How I Use Python to Make Extra Cash Every Month (Even as a Beginner) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How I Harden My Linux Web Server Against Cyber Attacks (CentOS & Ubuntu Guide) | by Faruk Ahmed | Apr, 2025

How I Harden My Linux Web Server Against Cyber Attacks (CentOS & Ubuntu Guide) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
How AI is Transforming Cybersecurity: Opportunities and Challenges | by Faruk Ahmed | Apr, 2025

How AI is Transforming Cybersecurity: Opportunities and Challenges | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Enhancing Your Cybersecurity Practices in 2024: | by Faruk Ahmed

Enhancing Your Cybersecurity Practices in 2024: | by Faruk Ahmed

Comments
1 min read
Encrypting and Decrypting a .txt File Using Python’s Cryptography Library | by Faruk Ahmed

Encrypting and Decrypting a .txt File Using Python’s Cryptography Library | by Faruk Ahmed

Comments
1 min read
Embracing the Unknown: How I Turned Challenges into Opportunities in the Tech World | by Faruk Ahmed | Apr, 2025

Embracing the Unknown: How I Turned Challenges into Opportunities in the Tech World | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Bitcoin: The Digital Gold of the 21st Century | by Faruk Ahmed

Bitcoin: The Digital Gold of the 21st Century | by Faruk Ahmed

Comments
1 min read
Automating Report Distribution: A Python Script for Emailing Missing Files | by Faruk Ahmed

Automating Report Distribution: A Python Script for Emailing Missing Files | by Faruk Ahmed

Comments
4 min read
8 Log Files Every Linux Admin Should Monitor Daily | by Faruk Ahmed | Apr, 2025

8 Log Files Every Linux Admin Should Monitor Daily | by Faruk Ahmed | Apr, 2025

Comments
1 min read
7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
7 Bash Mistakes I Made That Cost Me Time (And How to Avoid Them) | by Faruk Ahmed | Apr, 2025

7 Bash Mistakes I Made That Cost Me Time (And How to Avoid Them) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
6 Linux Misconfigurations I Regret Not Catching Sooner | by Faruk Ahmed | Apr, 2025

6 Linux Misconfigurations I Regret Not Catching Sooner | by Faruk Ahmed | Apr, 2025

Comments
1 min read
5 Simple Bash Scripts That Can Save You Hours (and Maybe Make You Money) | by Faruk Ahmed | Apr, 2025

5 Simple Bash Scripts That Can Save You Hours (and Maybe Make You Money) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
5 More Techniques to Lock Down Public-Facing Linux Servers | by Faruk Ahmed | Apr, 2025

5 More Techniques to Lock Down Public-Facing Linux Servers | by Faruk Ahmed | Apr, 2025

Comments
1 min read
5 Linux Hardening Techniques I Apply Before Hosting Any Website | by Faruk Ahmed | Apr, 2025

5 Linux Hardening Techniques I Apply Before Hosting Any Website | by Faruk Ahmed | Apr, 2025

Comments
1 min read
10 Security Commands Every Linux Admin Should Know (But Probably Doesn’t) | by Faruk Ahmed | Apr, 2025

10 Security Commands Every Linux Admin Should Know (But Probably Doesn’t) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
5 Linux Hardening Techniques I Apply Before Hosting Any Website

5 Linux Hardening Techniques I Apply Before Hosting Any Website

Comments
2 min read
loading...