Security – POFTUT

Category: Security

KillDisk - Erase and Wipe Disk Securely and Completely On Windows 0

KillDisk – Erase and Wipe Disk Securely and Completely On Windows

KillDisk is a software used to erase and wipe disk securely and completely on operating systems like Windows, MacOSX, Linux. KillDisk can be used from inside the operating system or by booting the KillDisk without an operating system. It is also called as Hard Drive Eraser by its developer. KillDisk...

What Is Phising, Attack Types and Defences? 0

What Is Phising, Attack Types and Defences?

Phishing is a cybersecurity attack to convince target humans to convince to provide some valuable information about them or their assets. Phishing mainly targets human being and human-related vulnerabilities to exploit. Phishing History The first legal lawsuit was filled in 2004 about the phishing. The attacker was a Californian teenager...

0

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

Tails is a Linux distribution where privacy, anonymity and security are aimed. The full name of the Tails is Amnesic Incognito Lice System. Tails is Debian based distributions which means most of the packages and package management system is derived from Debian. In this tutorial, we will learn how to...

What Is SHA-256 and How To Calculate In Python, PHP, JavaScript, Go, Java, PowerShell Programming Languages? 0

What Is SHA-256 and How To Calculate In Python, PHP, JavaScript, Go, Java, PowerShell Programming Languages?

Hash algorithms are the heart of the cryptography and security. SHA-256 is a Secure Hash Algorithm which will generate an output hash value in 256 bit. SHA-256 is designed by the National Security Agency  (NSA). SHA-256 is one of the cryptographic hash functions. SHA-256 is also named one-way function where...

0

How To Start Browsers Like Chrome, Firefox, Opera, Edge, Explorer In Incognito Mode?

Privacy is an important topic of today IT. We as a human being needs privacy to protect our life private from others and companies. We use browsers in our daily life and put a lot of private or personal data on the browser. In order to protect our privacy, we...

0

What Is A Firewall and How Its Work?

Today Firewall is depicted as the main component of the security and networks. Firewalls provide a lot of different operations and features. In the old days, the firewall was simply used to block or allow some ports and management of the NAT. In these days there are a lot of...

0

What Is Wireshark Network Traffic and Packet Analyzer?

Wireshark is a tool used to capture and analyze network traffic. Wireshark mainly used by network administrators and security professionals in order to inspect networks and find security vulnerabilities or malware behaviors. Live Capture Wireshark can capture network traffic of the given interface. Wireshark supports different interface types and protocols....

0

How To Download, Install and Use Microfocus (HP) Load Runner For Load Testing Tutorial with Examples?

Microfocus (formerly HP) Loadrunner is a Load, Stress and DoS Testing tools used to test applications. Loadrunner also provides benchmark results for the given target. In this tutorial, we will learn how to download, register, install and use Loadrunner. Features Loadrunner is a very capable tool which can be used...

0

Linux umask Command Tutorial with Examples, Numeric and Symbolic Representations

umask command is used to set default file and folder permission in  Linux operating system. File and folder permissions are important because the permission enables or deny different users, groups and others to access, read, write and execute of the given file. In this tutorial, we will learn how to use umask...

Enjoy this blog? Please spread the word :)