Category: Security

0

HMAC (Hach-based Message Authentication Code) Tutorial

Hash-based Authentication Message Code or HMAC is used to authenticate message with hash functions. Message authentication is important mechanism in cyber security and used to check message authenticity. There are different ways and mechanisms for Message Authentication. Message Message is the data, text, image or whatever else we want to...

0

What Is Default SFTP Port and How To Change SFTP Port Number?

SFTP is secure version of the FTP . SFTP provides encrypted channel with the remote server. This makes authentication and data transfer more secure than FTP. SFTP protocol is generally provided by SSH servers by default. In this tutorial we will learn the default SFTP port and how to change...

0

How To Find And Change SSH Port Number?

ssh  is default protocol used to manage remote systems which are mainly Linux and Network Devices. As it is working over network connection and uses TCP it has a default port number which is 22  . In this tutorial we will look how to change the default port number from...

0

What Is Base64 and How To Encode and Decode Text?

Base64 is an encoding and decoding algorithm. We need encoding of some data in order to prevent storing and transmission problems. For example If we try to transfer binary data it may create and affect some network devices because of its data structures. Base64 is generally used different applications like...

0

Debug Applications with gdb In Linux

gdb is the short form of GNU Debugger. Debugger is a tool used to search and find and get detailed information about bugs in applications binaries. gdb is popular in Linux community which is used by most of the IDE, Programming tools event in Android IDE’s. In this tutorial we will look...

0

How to Find Detailed Domain Information with whois Command?

whois  very popular and useful tool used to list and find domain information. We generally know that domain and sub domains are resolved to the IP address and our browser redirects to this IP address. But the actual story is not just this. Domain names have a lot of attributes...

0

What is UUID (Universally Unique Identifier)?

While developing applications or using services or mounting disks in Linux systems we may see the term UUID or 128 bit number which might seem interesting. UUID is 128 bir number which is used to identify things like name, record, disk whatever we want. Uniqueness What makes UUID so special...

0

What Is Nagios?

Nagios is an open source system, network, application monitoring system. Nagios is designed to be run on Linux operating system or distributions like Ubuntu, Debian, CentOS etc. Architecture and Components Nagios is not a single component to run. Nagios is actually a suite which provides following components. Nagios IX Nagios...

0

What Is OpenSSL Library?

OpenSSL is most popular open source cryptography library which provides a lot of tools, libraries, algorithms about cryptography. It is mostly known with Secure Socket Layers (SSL) and Transport Layer Security (TLS) protocols. Supported Encryption Algorithms Encryption is used to make given data unreadable by the intruders. It is mainly...

Enjoy this blog? Please spread the word :)