Linux – POFTUT

Category: Linux

How To Manage, View, Delete Saved Passwords In Chrome, Firefox, Edge? 0

How To Manage, View, Delete Saved Passwords In Chrome, Firefox, Edge?

Today’s internet provides a lot of different web sites and web applications. In daily life, we use a lot of different web applications which is personalized for us. While using these applications we generally use some login information for authentication, privacy, and personalization. Saving Passwords To Browser While using these web applications we need to provide some credentials which consist of username and password. As we use a lot of...

0

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

Tails is a Linux distribution where privacy, anonymity and security are aimed. The full name of the Tails is Amnesic Incognito Lice System. Tails is Debian based distributions which means most of the packages and package management system is derived from Debian. In this tutorial, we will learn how to boot or start Tails with different configurations and security metrics. Download Tails ISO or USB Image Tails OS is mainly...

What Is SHA-256 and How To Calculate In Python, PHP, JavaScript, Go, Java, PowerShell Programming Languages? 0

What Is SHA-256 and How To Calculate In Python, PHP, JavaScript, Go, Java, PowerShell Programming Languages?

Hash algorithms are the heart of the cryptography and security. SHA-256 is a Secure Hash Algorithm which will generate an output hash value in 256 bit. SHA-256 is designed by the National Security Agency  (NSA). SHA-256 is one of the cryptographic hash functions. SHA-256 is also named one-way function where the generated hash value cannot be reversed theoretically. This makes SHA-256 very useful for password validation, challenge hash authentication, anti-tamper,...

0

How To Start Browsers Like Chrome, Firefox, Opera, Edge, Explorer In Incognito Mode?

Privacy is an important topic of today IT. We as a human being needs privacy to protect our life private from others and companies. We use browsers in our daily life and put a lot of private or personal data on the browser. In order to protect our privacy, we can use browsers incognito mode like Firefox, Google Chrome, Opera etc. In this tutorial, we will learn how to use...

0

What Is Wireshark Network Traffic and Packet Analyzer?

Wireshark is a tool used to capture and analyze network traffic. Wireshark mainly used by network administrators and security professionals in order to inspect networks and find security vulnerabilities or malware behaviors. Live Capture Wireshark can capture network traffic of the given interface. Wireshark supports different interface types and protocols. Here is a list of interface types supported by Wireshark Ethernet Wifi 802.11 USB Wireshark supports a lot of different...

0

Linux umask Command Tutorial with Examples, Numeric and Symbolic Representations

umask command is used to set default file and folder permission in  Linux operating system. File and folder permissions are important because the permission enables or deny different users, groups and others to access, read, write and execute of the given file. In this tutorial, we will learn how to use umask command to set default read, write and execute permissions. Syntax The syntax of the umask command is very simple where...

0

What Is LDAP Protocol Port Number? Compare LDAP Ports 389 vs 636

Lightweight Directory Access Protocol or LDAP is used to authenticate and authorize users. LDAP is used in different infrastructures like Windows Domain, Linux, Network etc. LDAP uses different port numbers like 389 and 636. TCP 389 For LDAP The well-known port for LDAP is TCP 389. Both UDP and TCP transmission can be used for this port. We can use this port for unsecured and unencrypted LDAP transmission. TCP and UDP 636...

1

How To Generate Random Numbers with rand() and srand() Functions in C and C++?

C and C++ programming languages provide rand() and srand() functions in order to create random numbers. Random numbers can be used for security, lottery etc. In this tutorial we will learn how to use a random number generating functions rand() and srand() with their attributes and specialties. Random Numbers Random numbers are sequential numbers those are different than each other always. Random numbers are important for security which can be used to...

0

What Is MD5 Hash Checksum? How To Create and Validate MD5?

MD5 is a checksum or hash calculation method for files. MD5 checksum consists of 128-bit value which is generally expressed as the hexadecimal format with which consist of 32 characters. MD5 Attributes MD5 is a cryptography algorithm which provides some attributes which make it useful for different cases like security, operation etc. Here is the list of MD5 attributes. MD5 checksums are 128-bit values MD5 checksums can be expressed in different...

Enjoy this blog? Please spread the word :)