Linux Security – UFW Complete Guide (Uncomplicated Firewall)

In this video series, we will be taking a look at how to set up, secure, and audit Linux servers. This video will explain and demonstrate how to set up and configure UFW and various firewall rules.

Register for part 2 of the Linux Server Security Series:

Get $100 in free credits on Linode:

Our videos are also available on the decentralized platform LBRY:



HackerSploit – Cybersecurity Training Simplified:
HackerSploit Forum:
HackerSploit Academy:


We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
Merci d’avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة

#Linux#Security#Cybersecurity .


All the Admin Templates You Could Ask For.

2M+ items from the worlds largest marketplace for Admin Templates, Themes & Design Assets. Whether that's what you need, or you're just after a few Stock Photos - all of it can be found here at Envato Market.

Related Articles


  1. I would switch to root user to do all this vs type sudo 1000 times. Complete insanity when doing firewall maintenance or a demo to not be logged in as root. Otherwise good solid tutorial.

  2. This might be a bad question but how can I get the "background" that you have with all the system info

  3. When I run the command ' ufw status ' as root, the only output I get is ' :active ' , nothing else is shown… no TO , ACTION of FROM?

  4. Very crisp and to the point videos with nice explanation. Now onto the other 6 vids…

  5. question: How to attack private network with double NAT ?? I want to test how secure my network is, target is second router, how to punch trough the NAT ? In Ur videos most attacks are fired in LAN, and the target machine is in the same network with attacker. What about hacking trough WAN ?? Sorry for bad English

  6. Hi HackerSploit! Ron here from Freedom! sent you an email about the channel. Hope you check it out 🙂

  7. how can i run my phishing over wan 24×7 so that it keeps on running even my pc is shutdown or i can access that from any where

  8. Bro

    I need your urgent help

    I want to set rat on my brother phone it is very important he goes on betting sites which making him in debt

    I know about rats an all

    I create rat by 888 rat

    Problem is static ip

    I take static ip from no ip site

    But it is only for some days after that account freezes

    There is something important to know that can help in yhis case

    When he return to home he connects to same wifi router

    So using this can we put aside the internet and work only with lan

    I give my pc custom ip and connects to my rat on device connected on same router

  9. @Hackersploit, thanks for all yr videos. I want to keep on going, but i get keeping output ( hash of expected file 17544910 weak) when i try to update kali linux or parrot os

  10. Question. what if instead of IP we enter a DDOS domain that is linked to my IP and refreshes the IP as soon as it changes.

  11. All thanks to smartnichol43@gmail.com on Instagram who helped me recover my account on IG Our services @ smarthnichol43 are as follows: FACEBOOK ACCOUNT RECOVERY, SNAPCHAT RECOVERY, INSTAGRAM RECOVERY, IPHONE UNLOCKING AND ICLOUD BYPASS, RECOVERY OF PUBG, many more, etc.) [23/9, 08:44] unlimited: Contact smartnichol43@gmail.com on Instagram to hack and RECOVER accounts

  12. Hi! I'd like your opinion on the platform INE Training, I don't know if it's worth it. Have you used it? Have you known anybody who has? They're quite expensive. Cheers mate!

  13. I need help please! Anyone who knows sqlmap.
    Using mulltidae page and burp suite with sqlmap

    I keep getting an error. Connection timed out and GET parameters page might not be injectable.

    Please help!

  14. Is it possible to hack android 10 with metasploit? if no then how can we hack a device with android 10? please reply

  15. if you get the 90 day thing on the 14th of december, will it still be 90 days?

Back to top button