CISSP – Page 2 – POFTUT

What Is A Computer Virus?

What Is A Computer Virus?

A computer virus is a special computer program that tries to replicate itself by modifying other computer programs and try to infect as much as it can. Computer viruses are unintended programs that generally run without user acceptance by hiding themselves. Computer viruses are created by hackers or Black Hat Hackers in order to gain … Read more

What Is White Hat Hacker?

What Is White Hat Hacker?

Before starting to talk about White, Grey and Black Hat Hackers we should learn the real meaning of the Hacker . Actually hacker is not a bad person or hacking is not a malicious action. Hacking simply means working with a specific electrical or digital device, service or system in an unusual way. Hackers are … Read more

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 is a hash algorithm that is created by the National Security Agency (NSA). SHA1 hash algorithm is generally used in security and data integrity applications. SHA-1 is created in 1995 as the successor of the SHA-0. Both SHA1 and SHA-1 refer to each other. Secure Hash Algorithm 1 or SHA1 SHA1 is in a … Read more

KillDisk – Erase and Wipe Disk Securely and Completely On Windows

KillDisk - Erase and Wipe Disk Securely and Completely On Windows

KillDisk is a software used to erase and wipe disk securely and completely on operating systems like Windows, MacOSX, Linux. KillDisk can be used from inside the operating system or by booting the KillDisk without an operating system. It is also called as Hard Drive Eraser by its developer. KillDisk Features KillDisk provides a lot … Read more

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

Tails is a Linux distribution where privacy, anonymity, and security are aimed. The full name of the Tails is Amnesic Incognito Lice System. Tails is Debian based distributions which means most of the packages and package management system is derived from Debian. In this tutorial, we will learn how to boot or start Tails with … Read more

What Is SHA-256 and How To Calculate SHA-256 In Different Programming Languages?

What Is SHA-256 and How To Calculate SHA-256 In Different Programming Languages?

Hash algorithms are the heart of the cryptography and security. SHA-256 is a Secure Hash Algorithm which will generate an output hash value in 256 bit. SHA-256 is designed by the National Security Agency  (NSA). SHA-256 is one of the cryptographic hash functions. SHA-256 has also named a one-way function where the generated hash value … Read more

How To Start Browsers Like Chrome, Firefox, Opera, Edge, Explorer In Incognito Mode?

Privacy is an important topic in today’s IT. We as a human being needs privacy to protect our life private from others and companies. We use browsers in our daily life and put a lot of private or personal data on the browser. In order to protect our privacy, we can use browsers incognito mode … Read more

What Is A Firewall and How Its Work?

Today Firewall is depicted as the main component of the security and networks. Firewalls provide a lot of different operations and features. In the old days, the firewall was simply used to block or allow some ports and management of the NAT. These days there are a lot of different threats where the firewall is … Read more

How To Download, Install and Use Microfocus (HP) Load Runner For Load Testing Tutorial with Examples?

Microfocus (formerly HP) Loadrunner is a Load, Stress, and DoS Testing tools used to test applications. Loadrunner also provides benchmark results for the given target. In this tutorial, we will learn how to download, register, install, and use Loadrunner. Features Loadrunner is a very capable tool that can be used for different purposes with different … Read more