Category: Application

0

How To Determine and Print OpenSSL Version?

OpenSSL is very long running project which have passed a lot of versions. Newer versions provides more features, bug fixes and security patches. For example in year 2014 a serious security hole Heart Bleed discovered in OpenSSL versions and affected OpenSSL libraries are defined as versions.Following versions was vulnerable to...

1

How To Install and Use OpenSSL Library In Python Applications?

OpenSSL is popular security library used by a lot of products, applications, vendors. OpenSSL provides libraries for the most of the programming languages. Python is popular programming language too. We can use OpenSSL library in Python applications. In this tutorial we will develop an example application that uses OpenSSL Python...

0

How To Use OpenSSL s_client To Check and Verify SSL/TLS Of HTTPS Webserver?

OpenSSL provides different features and tools for SSL/TLS related operations. s_lient is a tool used to connect, check, list HTTPS, TLS/SSL related information. Simply we can check remote TLS/SSL connection with s_client . In this tutorials we will look different use cases of s_client . Check TLS/SSL Of Website The basic and most...

0

Data Classification and Categorization with Benefits

Data classification is important part of the ISO 27001 and Enterprise Security Governance. Data classification will set labels and categories to the given data types. These types will be used to set secrecy, sensitivity, confidentiality levels. If we set all data high security level or classification this will create high...

0

Alignment of Security Function To Strategy, Goals and Mission

Security management policy will contain following security policy related steps; Security Policy Creation Security Policy Implementation Security Policy Enforcement every organization have some strategy, goals, mission and objectives. Security management planning will align security function with these. While creating a security plan there are things we should be aware and...

0

Introduction To Security Governance with CIA – Confidentiality , Integrity, Availibility

Security Governance are implemented with management concepts, security policies, implementation etc. While working with these items we need some parameters to understand and describe security in IT environment. There is CIA which is actually the synonym of Confidentiality , Integrity and Availability . These are used to define the level and status of...

0

Introduction To Certified Information System Security Professional (CISSP)

There are a lot of security certifications in the IT sector. But only some of them are very prestigious and popular. Perhaps the most known and most respected security certificate is Certified Information System Security Professional (CISSP) certification. In this post we will get generally information about certification steps, topics,...

0

Yara – Identify and Classify Malware Samples

Yara is a popular open source tool used to identify and classify Malware Samples. It is motto is Swiss knife for malware researchers and everyone else. I think it deserves this because of its features. In this tutorial we will look some features of yara. Install Installation of Yara is...

0

What is Penetration Test? What Are Penetration Test Phases?

Modern days IT needs are changed according to 80’s and 90’s. In the old days just operating IT was enough for success but today’s situation it is changed. We need to secure the IT environment to in order to be successful. There are different methodologies, standard, architectures to design, plan,...

0

How To Secure Windows From Malware and Unwanted Executables With Applocker?

Windows ecosystem generally works with 3 party applications easily while installing and running them. This creates some risk especially for the novice users. Windows administrators generally want to restrict users applications and executables to make their operating system more secure. Windows recently launched a feature named AppLocker . As its name...

Enjoy this blog? Please spread the word :)