Security – POFTUT

What Is AAA (Authentication, Authorization, and Accounting)?

What Is AAA (Authentication, Authorization, and Accounting)?

AAA or Authentication, Authorization and Accounting is a term used to describe 3 functions in IT. Mainly AAA is used to control access to different IT resources like network, service, server, etc. AAA simply consists of 3 steps where each completes others for perfect security. What Is Authentication? Authentication is the process of identifying a … Read more

How To View, Display, Manage, and Remove, Delete Saved Password In Google Chrome?

How To View, Display, Manage, and Remove, Delete Saved Password In Google Chrome?

Google Chrome browser provides the Password Manager in order to save and reused usernames, passwords, or credentials for different web sites. Today a typical user has a lot of accounts and passwords for different web sites, web applications or services, and remembering or typing them again and again very trivial task. Google Chrome Password manager … Read more

What Is Script Kiddie? How To Become Script Kiddie?

What Is Script Kiddie? How To Become Script Kiddie?

Script Kiddie is an amateur person who tries to hack, exploit, abuse IT systems like computers, networks, web sites, etc. Script Kiddie is generally not a professional or hacker because it has very little knowledge about the hacking but can use the hacking tools by following tutorials. Script kiddie is unskilled person which means every … Read more

What Is Keystroke?

What Is Keystroke?

Key is a single character in a keyboard which can be physical or virtual. Strike is the act of pressing or pushing something. Keystroke is the act of pressing a key in a keyboard where the keyboard can be a complete, traditional, or more specialized keyboard. Below we can see a keyboard keys that can … Read more

What Is GPO (Group Policy Object)? How To Use, Change GPO in Microsoft Windows?

What Is GPO (Group Policy Object)? How To Use, Change GPO in Microsoft Windows?

Group Policy is a feature provided by Windows operating systems in order to manage the different operating systems, user, account, and similar settings. Group policy mainly used for centralized management and configuration of operating systems, applications, and users setting in an Active Directory (AD) environment. Group Policy Object or GPO is an object used to … Read more

What Is Microsoft Azure? How Does It Work?

What Is Microsoft Azure? How Does It Work?

Microsoft Azure is a cloud computing service created and run by Microsoft. Azure provides a lot of cloud and related services. Azure is a closed source platform like most of the Microsoft products but the client SDK is open source. Azure provides “Software As a Service (SAAS)”, “Platform As a Service (PaaS)” and “Infrastructure As … Read more

What Is HTTPS?

What Is HTTPS?

Hypertext Transfer Protocol Secure or HTTPS is an extension and secure alternative to the HTTP protocol. HTTPS is very same with the HTTP where the traffic is encrypted using TLS or Transport Layer Security. All major browsers like Google Chrome, Mozilla Firefox, Apple Safari, Opera, Microsoft Edge supports the HTTPS protocol. HTTPS also referred as … Read more

What Is OSI (Open Systems Interconnection) Model?

What Is OSI (Open Systems Interconnection) Model?

Open Systems Interconnection Model or OSI Model is an architecture to specify computer networks functions in a clear and compatible way. OSI provides interoperability of diverse communication systems with standard communication and transmission architecture, layers, and protocols. OSI History In the early- and mid- 1970s the computer networks largely owned and operated by the governments … Read more

What Is Spoofing (Attack)?

What Is Spoofing (Attack)?

Spoofing is the act of falsifying some trust between different parties. A spoofing attack is a computer security term used to falsify different applications, protocols, and systems to gain an illegitimate advantage. Spoofing also defined as the attacker’s ability to pass themselves off as someone else for the target system. Spoofing can be done in … Read more