Security – Page 4 – POFTUT

Category: Security

1

Linux Sftp Command With Examples

File Transfer Protocol is very popular protocol for transferring files between hosts. FTP is fast and practical protocol not not secure. In old times security was no problem but in to days world security is important. So new protocols and ways developed to make FTP like operations more secure. Secure...

1

Compare TCP vs UDP Protocols , Differences and Similarities

Networks are used to transmit data over the world. There is a lot of network protocols in use. But most known and used protocols are IP,TCP,UDP. IP lives different flat but TCP and UDP tries to live same flat. So they operate same network layer but what is different between...

0

“No Route To Host” Error And Solution

While trying to ping or connect a remote host I can an error “no route to host”. How can I debug this error and solve it? As we know IP networks are constructed hop by hop which means there are different intermediate routers transmit packets between two remote hosts. These...

0

How To Manage Firewall Rules With Iptables In Linux

Firewall is main component for network security. Enterprise firewalls are located between internet and enterprise networks to manage access and other stuff. There are also host firewalls those are very similar with network firewalls but more simple. Iptables is de facto standard firewall for both Linux systems and networks. We...

0

How To Install Gns3 To Fedora?

Gns3 very useful tool to simulate real networks and systems. In the first days of its Gns3 was simple Cisco IOS image emulator. But recent years its development has gained momentum. This made Gns3 a multi platform, flexible real world simulator. Gns3 supports systems like Cisco, Juniper, Palo Alto, Pfsense,...

0

How To Exclude Hosts From Nmap Scan?

Nmap is very useful tool for network administration and security. It is most used tool in these areas. But a lot of people use it with very basic means. Here we will look more sophisticated usage of nmap step by step in this ant further posts. Target Hosts Create a...

0

How Configure Cisco For Logging?

Hi, collecting logs are important. In my daily job I am working with logs about a lot of systems like WMware , Application ,Linux,windows,Cisco ,checkpoint, pfSense. Logs provides info about the system, application etc. Security incident management systems heavily rely on logs. Example Log Logs consist of date system name and...

0

How To Configure Cisco Routers and Switches Password

Hi, today we will look to configure Cisco routers and switches with password. It may be seen trivial but very important for security, because a lot of issues a password related. Network devices use a lot of protocols to work and this protocols needs security. Authentication resides in security and...

0

Introduction To Squid

Hi today we will look most famous proxy in the world. Yes you guest it right it is squid. Proxy is an intermediate system that manages communication between two systems. In web applications http proxy is mostly used type. The client makes request to the proxy and then proxy makes...

Enjoy this blog? Please spread the word :)