Security – Page 2 – POFTUT

Category: Security

0

How To Download, Install and Use Microfocus (HP) Load Runner For Load Testing Tutorial with Examples?

Microfocus (formerly HP) Loadrunner is a Load, Stress and DoS Testing tools used to test applications. Loadrunner also provides benchmark results for the given target. In this tutorial, we will learn how to download, register, install and use Loadrunner. Features Loadrunner is a very capable tool which can be used for different purposes with different environments and cases. Here we will talk about some of the popular features of the...

0

Linux umask Command Tutorial with Examples, Numeric and Symbolic Representations

umask command is used to set default file and folder permission in  Linux operating system. File and folder permissions are important because the permission enables or deny different users, groups and others to access, read, write and execute of the given file. In this tutorial, we will learn how to use umask command to set default read, write and execute permissions. Syntax The syntax of the umask command is very simple where...

0

What Is LDAP Protocol Port Number? Compare LDAP Ports 389 vs 636

Lightweight Directory Access Protocol or LDAP is used to authenticate and authorize users. LDAP is used in different infrastructures like Windows Domain, Linux, Network etc. LDAP uses different port numbers like 389 and 636. TCP 389 For LDAP The well-known port for LDAP is TCP 389. Both UDP and TCP transmission can be used for this port. We can use this port for unsecured and unencrypted LDAP transmission. TCP and UDP 636...

0

How To Use PSCP Command On Windows?

pscp command is an SCP protocol implementation where we can transfer and copy files and folders securely over a network with the SSH connection. In this tutorial, we will learn how to install and use pscp tool on Windows operating system. Download Pscp pscp command can be downloaded from the following link. There are different installation types. pscp can be installed in standalone or with the putty installer package. I prefer...

1

How To Generate Random Numbers with rand() and srand() Functions in C and C++?

C and C++ programming languages provide rand() and srand() functions in order to create random numbers. Random numbers can be used for security, lottery etc. In this tutorial we will learn how to use a random number generating functions rand() and srand() with their attributes and specialties. Random Numbers Random numbers are sequential numbers those are different than each other always. Random numbers are important for security which can be used to...

0

What Is MD5 Hash Checksum? How To Create and Validate MD5?

MD5 is a checksum or hash calculation method for files. MD5 checksum consists of 128-bit value which is generally expressed as the hexadecimal format with which consist of 32 characters. MD5 Attributes MD5 is a cryptography algorithm which provides some attributes which make it useful for different cases like security, operation etc. Here is the list of MD5 attributes. MD5 checksums are 128-bit values MD5 checksums can be expressed in different...

0

What Is Online Certificate Status Protocol (OCSP) and Tutorial with Examples?

Certificates like SSL, X.509 are used to secure network traffic. But every certificate has its own life cycle in a distributed environment like the internet we should manage them. Online Certificate Status Protocol aka OCSP is used to manage certificates validity and lifecycle. OCSP standard is defined in RFC 6960 with the name of  X.509 Internet Public Key Infrastructure Online Certificate Status Protocol – OCSP. It makes absolute previously defined certificate...

0

What Is SSL Certificate CN (Common Name) and Usage?

Common Name or CN is generally used in SSL Certificates. CN is used to define the server name which will be used for secure SSL connection. Generally this SSL certificate used to secure connection between a HTTP/S server and client browser like Chrome, Explorer, Firefox. Common Name (CN) Common Name is used to specify the host or server identity. When a client try to connect to a remote server like...

0

Rpm, Yum, Dnf “NOKEY” Public Key Check Error and Solution

Rpm is very popular and secure package management format and application. Recent version of the rpm and yum command uses Public Key Check in order to make installation more secure. This is done by checking integrity of the rpm package. NOKEY Error We generally see the error during a package installation with rpm or yum command. Show Signature If we want to get more details about the signature of the...

Enjoy this blog? Please spread the word :)