27001 – Page 2 – POFTUT

Category: 27001

0

What Is MD5 Hash Checksum? How To Create and Validate MD5?

MD5 is a checksum or hash calculation method for files. MD5 checksum consists of 128-bit value which is generally expressed as the hexadecimal format with which consist of 32 characters. MD5 Attributes MD5 is a cryptography algorithm which provides some attributes which make it useful for different cases like security, operation etc. Here is the list of MD5 attributes. MD5 checksums are 128-bit values MD5 checksums can be expressed in different...

0

What Is Online Certificate Status Protocol (OCSP) and Tutorial with Examples?

Certificates like SSL, X.509 are used to secure network traffic. But every certificate has its own life cycle in a distributed environment like the internet we should manage them. Online Certificate Status Protocol aka OCSP is used to manage certificates validity and lifecycle. OCSP standard is defined in RFC 6960 with the name of  X.509 Internet Public Key Infrastructure Online Certificate Status Protocol – OCSP. It makes absolute previously defined certificate...

0

What Is SSL Certificate CN (Common Name) and Usage?

Common Name or CN is generally used in SSL Certificates. CN is used to define the server name which will be used for secure SSL connection. Generally this SSL certificate used to secure connection between a HTTP/S server and client browser like Chrome, Explorer, Firefox. Common Name (CN) Common Name is used to specify the host or server identity. When a client try to connect to a remote server like...

0

Tails Linux OS Tutorial For Privacy and Anonymity

Anonymity and Privacy are important topics of this decade. A lot of states, companies or persons try to crack or censorship peoples anonymity and privacy. There are different ways to protect us from these attacks. Tail OS is a Linux based distribution which provides these protections as a Live operating system. Download Tail OS can be used in different ways. The main usage is live where we do not need...

0

How To Install and Use ClamAV Antivirus Software In Linux, Ubuntu, Debian, Mint, Kali, Fedora, CentOS, RHEL

Linux distributions like Ubuntu, Debian, Mint, Kali, Fedora, CentOs, RHEL are considered as virus free and advertised by open source advocates. This is a bit false but generally true assumption. Linux environment have very little viruses against Windows and MacOS. But Linux environment is not fully secure against. In this tutorial we will examine how to install ClamAV and use it to scan, find and destroy viruses in Linux. Install...

0

OpenPGP Mail Encryption and Related Tools For Linux, Windows

OpenPGP is a email encryption standard used by a lot of people. This standard is defined by OpenPGP Working Group of the Internet Engineering Task Force (IETF). The standard is proposed with RFC 4880 . The OpenPGP is derived from PGP software which is created by Phil Zimmermann. OpenPGP Windows Tools Gpg4win Gpg4win is popular and actively developed software for mail privacy and secrecy. Its current version is 3 and...

0

How To Install and Use GPG Encrytion In Linux In Order To Encrypt and Decrypt Files and Folder?

Security is important part of the today’s IT operations. There are a lot of tools which provides some part of the secure operations. GNU Privacy Guard or simply GPG is a one of them. It provides encryption, decryption, digital signatures and signing. Install GPG To Ubuntu, Debian, Mint and Kali For deb or apt based distributions we can install GPG with the following command for gnupg package.

Install GPG To...

0

How To Delete File and Folders Completely and Securely with sdelete in Windows?

User PC and Servers process a lot of data where some of them are secret. This data may be deleted with conventional ways but this may not enough. Because file systems generally removes file metadata but continue to hold real data. Microsoft sysinternals provides sdelete or secure delete tool which can delete file data really. More information about sysinternals can be get below. What Is Windows Sysinternal? Download As stated...

1

How To Generate 4096 bit Secure Ssh Key with Ssh Keygen

Ssh is secure protocol used to manage remote systems like Linux, BSD, UNIX, network devices event windows operating systems. The traffic between systems are encrypted. Ssh uses asymmetric keys in order to encrypt and made traffic invisible to the others those resides between systems in the network. The encryption power comes from key bit size or length. In this tutorial we will look how to create 4096 bit keys. Generate...

0

Security Roles and Responsibilities In Security Governance

Security role is the part where an individual plays in a complete organization security implementation and administration. In this tutorials different security roles and responsibilities in an organization. Senior Manager Senior Manager is responsible for all organization security. Senior Manager will have following roles and responsibilities Sign off all policy issues Endorse security policy Sole responsibility on security failure or success Tracking security solutions Security Professional Security professional are word...

Enjoy this blog? Please spread the word :)