Windows – POFTUT

What Is AAA (Authentication, Authorization, and Accounting)?

What Is AAA (Authentication, Authorization, and Accounting)?

AAA or Authentication, Authorization and Accounting is a term used to describe 3 functions in IT. Mainly AAA is used to control access to different IT resources like network, service, server, etc. AAA simply consists of 3 steps where each completes others for perfect security. What Is Authentication? Authentication is the process of identifying a … Read more

How To View, Display, Manage, and Remove, Delete Saved Password In Google Chrome?

How To View, Display, Manage, and Remove, Delete Saved Password In Google Chrome?

Google Chrome browser provides the Password Manager in order to save and reused usernames, passwords, or credentials for different web sites. Today a typical user has a lot of accounts and passwords for different web sites, web applications or services, and remembering or typing them again and again very trivial task. Google Chrome Password manager … Read more

What Is Keystroke?

What Is Keystroke?

Key is a single character in a keyboard which can be physical or virtual. Strike is the act of pressing or pushing something. Keystroke is the act of pressing a key in a keyboard where the keyboard can be a complete, traditional, or more specialized keyboard. Below we can see a keyboard keys that can … Read more

What Is GPO (Group Policy Object)? How To Use, Change GPO in Microsoft Windows?

What Is GPO (Group Policy Object)? How To Use, Change GPO in Microsoft Windows?

Group Policy is a feature provided by Windows operating systems in order to manage the different operating systems, user, account, and similar settings. Group policy mainly used for centralized management and configuration of operating systems, applications, and users setting in an Active Directory (AD) environment. Group Policy Object or GPO is an object used to … Read more

What Is A Computer Virus?

What Is A Computer Virus?

A computer virus is a special computer program that tries to replicate itself by modifying other computer programs and try to infect as much as it can. Computer viruses are unintended programs that generally run without user acceptance by hiding themselves. Computer viruses are created by hackers or Black Hat Hackers in order to gain … Read more

What Is White Hat Hacker?

What Is White Hat Hacker?

Before starting to talk about White, Grey and Black Hat Hackers we should learn the real meaning of the Hacker . Actually hacker is not a bad person or hacking is not a malicious action. Hacking simply means working with a specific electrical or digital device, service or system in an unusual way. Hackers are … Read more

How To Change Windows Password In Different Ways?

How To Change Windows Password In Different Ways?

There are some good reasons to change or reset a Windows operating system password. Windows passwords can be changed in different ways for different Windows versions like Windows XP, Windows 10, etc. In this tutorial, we will learn how to change or reset Windows password from User Account Control, PC Settings, Computer Management, Command Line … Read more

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 Hash Algorithm Tutorial with Usage Examples

SHA1 is a hash algorithm that is created by the National Security Agency (NSA). SHA1 hash algorithm is generally used in security and data integrity applications. SHA-1 is created in 1995 as the successor of the SHA-0. Both SHA1 and SHA-1 refer to each other. Secure Hash Algorithm 1 or SHA1 SHA1 is in a … Read more

What Is Packet Sniffing with List Of Packet Sniffers?

What Is Packet Sniffing with List Of Packet Sniffers?

Packet Sniffing is the process to capture packets. Generally, computer network packets are sniffed. Packet sniffing may seem very simple but in reality, it provides a lot of complexity related to the protocols, network mediums, etc. Packet Capture or Packet Sniffing Before starting to learn what is packet sniffing we have to learn the difference … Read more