Linux – POFTUT

How To View, Display, Manage, and Remove, Delete Saved Password In Google Chrome?

How To View, Display, Manage, and Remove, Delete Saved Password In Google Chrome?

Google Chrome browser provides the Password Manager in order to save and reused usernames, passwords, or credentials for different web sites. Today a typical user has a lot of accounts and passwords for different web sites, web applications or services, and remembering or typing them again and again very trivial task. Google Chrome Password manager … Read more

What Is Keystroke?

What Is Keystroke?

Key is a single character in a keyboard which can be physical or virtual. Strike is the act of pressing or pushing something. Keystroke is the act of pressing a key in a keyboard where the keyboard can be a complete, traditional, or more specialized keyboard. Below we can see a keyboard keys that can … Read more

What Is A Computer Virus?

What Is A Computer Virus?

A computer virus is a special computer program that tries to replicate itself by modifying other computer programs and try to infect as much as it can. Computer viruses are unintended programs that generally run without user acceptance by hiding themselves. Computer viruses are created by hackers or Black Hat Hackers in order to gain … Read more

What Is White Hat Hacker?

What Is White Hat Hacker?

Before starting to talk about White, Grey and Black Hat Hackers we should learn the real meaning of the Hacker . Actually hacker is not a bad person or hacking is not a malicious action. Hacking simply means working with a specific electrical or digital device, service or system in an unusual way. Hackers are … Read more

Port 22 and Relation with SSH Protocol

Port 22 and Relation with SSH Protocol

What is port 22? Is SSH using 22 or different port? How can I check that port 22 is open? We can increase the questions but in this tutorial, we will dive into details of the TCP Port Number 22 which is the default defacto SSH (Secure Shell) Port. SSH (Secure Shell) Secure Shell or … Read more

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 is a hash algorithm that is created by the National Security Agency (NSA). SHA1 hash algorithm is generally used in security and data integrity applications. SHA-1 is created in 1995 as the successor of the SHA-0. Both SHA1 and SHA-1 refer to each other. Secure Hash Algorithm 1 or SHA1 SHA1 is in a … Read more

What Is Packet Sniffing with List Of Packet Sniffers?

What Is Packet Sniffing with List Of Packet Sniffers?

Packet Sniffing is the process to capture packets. Generally, computer network packets are sniffed. Packet sniffing may seem very simple but in reality, it provides a lot of complexity related to the protocols, network mediums, etc. Packet Capture or Packet Sniffing Before starting to learn what is packet sniffing we have to learn the difference … Read more

How To Manage, View, Delete Saved Passwords In Chrome, Firefox, Edge?

How To Manage, View, Delete Saved Passwords In Chrome, Firefox, Edge?

Today’s internet provides a lot of different web sites and web applications. In daily life, we use a lot of different web applications which is personalized for us. While using these applications we generally use some login information for authentication, privacy, and personalization. Saving Passwords To Browser While using these web applications we need to … Read more

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

Tails is a Linux distribution where privacy, anonymity, and security are aimed. The full name of the Tails is Amnesic Incognito Lice System. Tails is Debian based distributions which means most of the packages and package management system is derived from Debian. In this tutorial, we will learn how to boot or start Tails with … Read more

What Is SHA-256 and How To Calculate SHA-256 In Different Programming Languages?

What Is SHA-256 and How To Calculate SHA-256 In Different Programming Languages?

Hash algorithms are the heart of the cryptography and security. SHA-256 is a Secure Hash Algorithm which will generate an output hash value in 256 bit. SHA-256 is designed by the National Security Agency  (NSA). SHA-256 is one of the cryptographic hash functions. SHA-256 has also named a one-way function where the generated hash value … Read more